0:000 > db 7FF7 '93FC5B19--->>> 00007ff7' 93fc5b19 00BP USER32! RegisterClassExWgModLoad: 00007ff8 '18840000 00007ff8' 1886e000 X:\windows\System32\IMM32. DLLModLoad: 00007ff8 '18f60000 00007ff8' 190bb000 X:\windows\System32\MSCTF.dllBreakpoint 0 hit0:000 > db 7FF7 '93FC5B19--->>> 00007ff7' 93fc5b19 01
0:010> u 00007ff6`01c96a74explorer!CTray::v_WndProc+0xf94:00007ff6`01c96a74 397d88 cmp dword ptr [rbp-78h],edi00007ff6`01c96a77 0f8526660700 jne explorer!`TileBadgeProviderLogging::Instance'::`2'::`dynamic atexit destructor for 'wrapper''+0x15123 (00007ff6`01d0d0a3)00007ff6`01c96a7d 8bc7 mov eax,edi00007ff6`01c96a7f 418887f9020000 mov byte ptr [r15+2F9h],al >>>>>>>>>>>>>>>>> on retrouve bien l'adresse du ba00007ff6`01c96a86 84c0 test al,al00007ff6`01c96a88 0f851f660700 jne explorer!`TileBadgeProviderLogging::Instance'::`2'::`dynamic atexit destructor for 'wrapper''+0x1512d (00007ff6`01d0d0ad)00007ff6`01c96a8e 4138bff8020000 cmp byte ptr [r15+2F8h],dil00007ff6`01c96a95 0f8512660700 jne explorer!`TileBadgeProviderLogging::Instance'::`2'::`dynamic atexit destructor for 'wrapper''+0x1512d (00007ff6`01d0d0ad)0:010> uexplorer!CTray::v_WndProc+0xfbb:00007ff6`01c96a9b 440fb6c0 movzx r8d,al00007ff6`01c96a9f 4533c9 xor r9d,r9d00007ff6`01c96aa2 ba0c040000 mov edx,40Ch00007ff6`01c96aa7 498b8fa0000000 mov rcx,qword ptr [r15+0A0h] DESTINATAIRE INCONNU unknow dest but but but .....00007ff6`01c96aae ff15c4431800 call qword ptr [explorer!_imp_SendMessageW (00007ff6`01e1ae78)]00007ff6`01c96ab4 e918f3ffff jmp explorer!CTray::v_WndProc+0x2f1 (00007ff6`01c95dd1)
USER32!PostMessageW:00007ff9`610dafa0 48895c2410 mov qword ptr [rsp+10h],rbx ss:00000000`0326ef88=00007ff6a3496890:010> rrax=0000000000000000 rbx=00007ff6a3496860 rcx=000000000005021erdx=00000000000005ba rsi=0000000000000004 rdi=0000000000000000rip=00007ff9610dafa0 rsp=000000000326ef78 rbp=000000000326efd0 r8=0000000000000000 r9=0000000000000000 r10=00000fff28e681dar11=0000000004010000 r12=00007ff6a3429040 r13=000000000005021er14=0000000000000000 r15=0000000000000003iopl=0 nv up ei pl zr na po nccs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246USER32!PostMessageW:00007ff9`610dafa0 48895c2410 mov qword ptr [rsp+10h],rbx ss:00000000`0326ef88=00007ff6a34968900:010> k # Child-SP RetAddr Call Site00 00000000`0326ef78 00007ff6`a32ba651 USER32!PostMessageW01 00000000`0326ef80 00007ff6`a32b76d0 explorer!CTray::_RegisterForNotifications+0xf502 00000000`0326f000 00007ff6`a32f2b27 explorer!CTray::StartTaskbar+0xf403 00000000`0326f050 00007ff6`a32b7880 explorer!CTray::_StartTaskbarApiSurface+0x3704 00000000`0326f080 00007ff6`a32b7a79 explorer!CTray::_StartParallelTasks+0xd805 00000000`0326f0c0 00007ff6`a32b6425 explorer!CTray::_HandleStartupProgress+0x15506 00000000`0326f100 00007ff6`a32b4112 explorer!CTray::v_WndProc+0x94507 00000000`0326f630 00007ff9`610d1c24 explorer!CImpWndProc::s_WndProc+0xe208 00000000`0326f680 00007ff9`610d156c USER32!UserCallWinProcCheckWow+0x27409 00000000`0326f7e0 00007ff6`a32bac69 USER32!DispatchMessageWorker+0x1ac0a 00000000`0326f860 00007ff6`a32f7ae3 explorer!CTray::_MessageLoop+0x1490b 00000000`0326f8f0 00007ff9`5eef5aad explorer!CTray::MainThreadProc+0x430c 00000000`0326f920 00007ff9`60e88364 SHCORE!Microsoft::WRL::Details::RuntimeClass<Microsoft::WRL::Details::InterfaceList<CRandomAccessStreamBase,Microsoft::WRL::Details::InterfaceList<Windows::Storage::Streams::IRandomAccessStreamWithContentType,Microsoft::WRL::Details::InterfaceList<Windows::Storage::Streams::IContentTypeProvider,Microsoft::WRL::Details::InterfaceList<Microsoft::WRL::Implements<Microsoft::WRL::RuntimeClassFlags<3>,Microsoft::WRL::CloakedIid<IRandomAccessStreamMode>,Microsoft::WRL::CloakedIid<IRandomAccessStreamFileAccessMode>,Microsoft::WRL::CloakedIid<IObjectWithDeferredInvoke>,Microsoft::WRL::CloakedIid<IObjectWithFileHandle>,Microsoft::WRL::CloakedIid<IUnbufferedFileHandleProvider>,Microsoft::WRL::CloakedIid<IRandomAccessStreamPrivate>,Microsoft::WRL::CloakedIid<ITransactedModeOverride>,Microsoft::WRL::CloakedIid<CFTMCrossProcServer>,Microsoft::WRL::Details::Nil>,Microsoft::WRL::Details::Nil> > > >,Microsoft::WRL::RuntimeClassFlags<3>,1,1,0>::~RuntimeClass<Microsoft::WRL::Details::InterfaceList<CRandomAccessStreamBase,Microsoft::WRL::Details::InterfaceList<Windows::Storage::Streams::IRandomAccessStreamWithContentType,Microsoft::WRL::Details::InterfaceList<Windows::Storage::Streams::IContentTypeProvider,Microsoft::WRL::Details::InterfaceList<Microsoft::WRL::Implements<Microsoft::WRL::RuntimeClassFlags<3>,Microsoft::WRL::CloakedIid<IRandomAccessStreamMode>,Microsoft::WRL::CloakedIid<IRandomAccessStreamFileAccessMode>,Microsoft::WRL::CloakedIid<IObjectWithDeferredInvoke>,Microsoft::WRL::CloakedIid<IObjectWithFileHandle>,Microsoft::WRL::CloakedIid<IUnbufferedFileHandleProvider>,Microsoft::WRL::CloakedIid<IRandomAccessStreamPrivate>,Microsoft::WRL::CloakedIid<ITransactedModeOverride>,Microsoft::WRL::CloakedIid<CFTMCrossProcServer>,Microsoft::WRL::Details::Nil>,Microsoft::WRL::Details::Nil> > > >,Microsoft::WRL::RuntimeClassFlags<3>,1,1,0>+0x1350d 00000000`0326fa10 00007ff9`61a470d1 KERNEL32!BaseThreadInitThunk+0x140e 00000000`0326fa40 00000000`00000000 ntdll!RtlUserThreadStart+0x21
explorer!CTray::_RegisterForNotifications+0xc6:00007ff6`a32ba622 488b4df0 mov rcx,qword ptr [rbp-10h]00007ff6`a32ba626 488b01 mov rax,qword ptr [rcx]00007ff6`a32ba629 488d5538 lea rdx,[rbp+38h]00007ff6`a32ba62d 488b4018 mov rax,qword ptr [rax+18h]00007ff6`a32ba631 ff15b1191800 call qword ptr [explorer!_guard_dispatch_icall_fptr (00007ff6`a343bfe8)]00007ff6`a32ba637 85c0 test eax,eax00007ff6`a32ba639 7817 js explorer!CTray::_RegisterForNotifications+0xf6 (00007ff6`a32ba652)00007ff6`a32ba63b 4c634538 movsxd r8,dword ptr [rbp+38h]0:010> uexplorer!CTray::_RegisterForNotifications+0xe3:00007ff6`a32ba63f 4533c9 xor r9d,r9d00007ff6`a32ba642 baba050000 mov edx,5BAh >>>>>>>>>>>>>>>>>>>>> breakpoint00007ff6`a32ba647 488b4b08 mov rcx,qword ptr [rbx+8]00007ff6`a32ba64b ff158f071800 call qword ptr [explorer!_imp_PostMessageW (00007ff6`a343ade0)]00007ff6`a32ba651 90 nop00007ff6`a32ba652 488d4df0 lea rcx,[rbp-10h]00007ff6`a32ba656 e80534fcff call explorer!Microsoft::WRL::ComPtr<Windows::Foundation::IAsyncOperation<Windows::Foundation::Collections::IVectorView<Windows::ApplicationModel::StartupTask * __ptr64> * __ptr64> >::InternalRelease (00007ff6`a327da60)00007ff6`a32ba65b 4c897540 mov qword ptr [rbp+40h],r14
explorer!CTray::_RegisterForNotifications+0x29:00007ff6`083eb005 e8dea6ffff call explorer!CTray::_EnsureImmersiveShellPointer (00007ff6`083e56e8)0:010> pexplorer!CTray::_RegisterForNotifications+0x2e:00007ff6`083eb00a 85c0 test eax,eax0:010> rrax=0000000080040154 rbx=00007ff6085c5820 rcx=0000000000000000rdx=0000000080040154 rsi=0000000000000004 rdi=0000000000000000rip=00007ff6083eb00a rsp=000000000361eeb0 rbp=000000000361ef00 r8=000000000361e9c8 r9=00000000000021f5 r10=0000000000000000r11=000000000361ec30 r12=00007ff608550d20 r13=0000000000030114r14=0000000000000000 r15=0000000000000003iopl=0 nv up ei pl nz na pe nccs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000202explorer!CTray::_RegisterForNotifications+0x2e:00007ff6`083eb00a 85c0 test eax,eax00007ff6`083eb00c 0f8860010000 js explorer!CTray::_RegisterForNotifications+0x196 (00007ff6`083eb172) [br=1]
0:010> u explorer!CTray::_EnsureImmersiveShellPointerexplorer!CTray::_EnsureImmersiveShellPointer:00007ff6`083e56e8 4883ec38 sub rsp,38h00007ff6`083e56ec 4881c158030000 add rcx,358h00007ff6`083e56f3 33c0 xor eax,eax00007ff6`083e56f5 483901 cmp qword ptr [rcx],rax00007ff6`083e56f8 0f84fc5c0700 je explorer!`TileBadgeProviderLogging::Instance'::`2'::`dynamic atexit destructor for 'wrapper''+0x13bba (00007ff6`0845b3fa)00007ff6`083e56fe 4883c438 add rsp,38h00007ff6`083e5702 c3 ret00007ff6`083e5703 cc int 3explorer!`TileBadgeProviderLogging::Instance'::`2'::`dynamic atexit destructor for 'wrapper''+0x13bba:00007ff6`0845b3fa 48894c2420 mov qword ptr [rsp+20h],rcx00007ff6`0845b3ff 4c8d0d92381100 lea r9,[explorer!GUID_6d5140c1_7436_11ce_8034_00aa006009fa (00007ff6`0856ec98)]00007ff6`0845b406 488d0d139c1100 lea rcx,[explorer!GUID_c2f03a33_21f5_47fa_b4bb_156362a2f239 (00007ff6`08575020)]00007ff6`0845b40d 33d2 xor edx,edx00007ff6`0845b40f 41b804040000 mov r8d,404h00007ff6`0845b415 ff159dee1000 call qword ptr [explorer!_imp_CoCreateInstance (00007ff6`0856a2b8)]00007ff6`0845b41b 90 nop00007ff6`0845b41c e9dda2f8ff jmp explorer!CTray::_EnsureImmersiveShellPointer+0x16 (00007ff6`083e56fe)
rcx = explorer!GUID_c2f03a33_21f5_47fa_b4bb_156362a2f239 -->> HKCR/c2f03a33_21f5_47fa_b4bb_156362a2f239/default=Immersive Shell, APPID={316cded5-e4ae-4b15-9113-7055d84dcc97} ( appid/runas=Interactive User )rdx = NULLr8 = 404h -->>> CLSCTX_LOCAL_SERVER = 0x4 CLSCTX_NO_CODE_DOWNLOAD = 0x400,r9 = explorer!GUID_6d5140c1_7436_11ce_8034_00aa006009fa --------------->>>>>>>>>>>>> ?????????????[HKEY_CLASSES_ROOT\CLSID\{c2f03a33-21f5-47fa-b4bb-156362a2f239}]@="Immersive Shell""AppID"="{316cded5-e4ae-4b15-9113-7055d84dcc97}"[HKEY_CLASSES_ROOT\AppID\{316CDED5-E4AE-4B15-9113-7055D84DCC97}]@="Immersive Shell""RunAs"="Interactive User"[HKEY_CLASSES_ROOT\Interface\{6D5140C1-7436-11CE-8034-00AA006009FA}]@="IServiceProvider"[HKEY_CLASSES_ROOT\Interface\{6D5140C1-7436-11CE-8034-00AA006009FA}\ProxyStubClsid32]@="{A6FF50C0-56C0-71CA-5732-BED303A59628}"[HKEY_CLASSES_ROOT\CLSID\{A6FF50C0-56C0-71CA-5732-BED303A59628}]@="PSFactoryBuffer"[HKEY_CLASSES_ROOT\CLSID\{A6FF50C0-56C0-71CA-5732-BED303A59628}\InProcServer32]@="C:\\Windows\\System32\\OneCoreCommonProxyStub.dll" ------------------------------>>>>>>>>>>>>> ?????????????"ThreadingModel"="Both"
Yes, winPeSe got it since a long time with the use of "wind.exe and MsgHook.dll".And Yes, this solution is not a good idea because with the next version of winpe, the address will be modify.