winlogon!StateMachineRun函数里面的kernel32!WaitForSingleObject函数分析kd> g Breakpoint 16 hit winlogon!StateMachineRun+0x3b4: 001b:009ef194 8b150c40a000 mov edx,dword ptr [winlogon!WPP_GLOBAL_Control (00a0400c)] kd> p winlogon!StateMachineRun+0x3ba: 001b:009ef19a 837b0800 cmp dword ptr [ebx+8],0 kd> p winlogon!StateMachineR