Auch GMER gibt es in 2 Teilen: Code:
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-06-04 15:33:43
Windows 6.2.9200 x64 \Device\Harddisk0\DR0 -> \Device\00000029 KINGSTON_SV300S37A120G rev.521ABBF0 111,79GB
Running: Gmer-19357.exe; Driver: C:\Users\Manuela\AppData\Local\Temp\fwtdapob.sys
---- User code sections - GMER 2.1 ----
.text C:\Windows\system32\atiesrxx.exe[992] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007ffcd8af169a 4 bytes [AF, D8, FC, 7F]
.text C:\Windows\system32\atiesrxx.exe[992] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007ffcd8af16a2 4 bytes [AF, D8, FC, 7F]
.text C:\Windows\system32\atiesrxx.exe[992] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 118 00007ffcd8af181a 4 bytes [AF, D8, FC, 7F]
.text C:\Windows\system32\atiesrxx.exe[992] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 142 00007ffcd8af1832 4 bytes [AF, D8, FC, 7F]
.text C:\Windows\system32\atieclxx.exe[440] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007ffcd8af169a 4 bytes [AF, D8, FC, 7F]
.text C:\Windows\system32\atieclxx.exe[440] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007ffcd8af16a2 4 bytes [AF, D8, FC, 7F]
.text C:\Windows\system32\atieclxx.exe[440] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 118 00007ffcd8af181a 4 bytes [AF, D8, FC, 7F]
.text C:\Windows\system32\atieclxx.exe[440] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 142 00007ffcd8af1832 4 bytes [AF, D8, FC, 7F]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007ffcda80293c 8 bytes {JMP 0xffffffffffffff8c}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToAverageDWORD + 21 00007ffcda802959 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!WinSqmSetIfMaxDWORD + 95 00007ffcda8029c7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteEndScenario + 220 00007ffcda802aac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEndSession + 272 00007ffcda802bc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 8 00007ffcda803018 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 940 00007ffcda8033bc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 64 00007ffcda803404 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 503 00007ffcda8035bb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007ffcda803fe0 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlVerifyVersionInfo + 835 00007ffcda804933 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 336 00007ffcda804bac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 472 00007ffcda804c34 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 567 00007ffcda80543f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStream + 592 00007ffcda8056b4 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStreamEx + 875 00007ffcda805a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 139 00007ffcda805f8b 8 bytes {JMP 0xffffffffffffffd1}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 224 00007ffcda805fe0 16 bytes {JMP 0xffffffffffffffcf}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventWrite + 119 00007ffcda8060df 8 bytes {JMP 0xffffffffffffffac}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 43 00007ffcda806113 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 628 00007ffcda80635c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateBoundaryDescriptor + 584 00007ffcda806658 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8 00007ffcda806668 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 519 00007ffcda806867 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23 00007ffcda806887 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!A_SHAFinal + 300 00007ffcda806bf0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!A_SHAInit + 44 00007ffcda806c24 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292 00007ffcda809188 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20 00007ffcda8091a4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 352 00007ffcda8092f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeSid + 35 00007ffcda80931b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAce + 339 00007ffcda80950b 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99 00007ffcda809577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103 00007ffcda8095e7 8 bytes {JMP 0xffffffffffffffe6}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 751 00007ffcda80986f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135 00007ffcda809a67 8 bytes {JMP 0xffffffffffffffaa}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43 00007ffcda80a7bf 8 bytes {JMP 0xfffffffffffffff5}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104 00007ffcda80a8e8 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356 00007ffcda80aa78 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64 00007ffcda80d270 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlOpenCurrentUser + 208 00007ffcda80d39c 8 bytes {JMP 0xffffffffffffffa3}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952 00007ffcda80d75c 8 bytes [F0, 69, F3, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlAppendUnicodeToString + 167 00007ffcda80e56b 8 bytes [D0, 69, F3, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthSidAsUnicodeString + 84 00007ffcda80e5c8 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlValidSecurityDescriptor + 243 00007ffcda80e6c3 8 bytes [B0, 69, F3, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAccessAllowedAce + 379 00007ffcda80e847 8 bytes [A0, 69, F3, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffcda88ac50 8 bytes {JMP QWORD [RIP-0x7c8ac]}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffcda88add0 8 bytes {JMP QWORD [RIP-0x7c86b]}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffcda88ae00 8 bytes {JMP QWORD [RIP-0x7db96]}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffcda88af20 8 bytes {JMP QWORD [RIP-0x7d7ca]}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffcda88afd0 8 bytes {JMP QWORD [RIP-0x7dc3a]}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffcda88b690 8 bytes {JMP QWORD [RIP-0x7ce4f]}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffcda88b990 8 bytes {JMP QWORD [RIP-0x7d2d3]}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffcda88c210 8 bytes {JMP QWORD [RIP-0x7dc4e]}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 381 0000000076f6137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 386 0000000076f61512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000076f61551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000076f61577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000076f61784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuThreadInit + 50 0000000076f617c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000076f617e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 0000000076f61834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000076f61841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000076f61a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000076f62ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000076f62c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2892] C:\Windows\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000076f62c43 8 bytes [7C, 68, F3, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007ffcda80293c 8 bytes {JMP 0xffffffffffffff8c}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToAverageDWORD + 21 00007ffcda802959 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!WinSqmSetIfMaxDWORD + 95 00007ffcda8029c7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteEndScenario + 220 00007ffcda802aac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEndSession + 272 00007ffcda802bc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 8 00007ffcda803018 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 940 00007ffcda8033bc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 64 00007ffcda803404 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 503 00007ffcda8035bb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007ffcda803fe0 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlVerifyVersionInfo + 835 00007ffcda804933 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 336 00007ffcda804bac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 472 00007ffcda804c34 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 567 00007ffcda80543f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStream + 592 00007ffcda8056b4 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStreamEx + 875 00007ffcda805a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 139 00007ffcda805f8b 8 bytes {JMP 0xffffffffffffffd1}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 224 00007ffcda805fe0 16 bytes {JMP 0xffffffffffffffcf}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventWrite + 119 00007ffcda8060df 8 bytes {JMP 0xffffffffffffffac}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 43 00007ffcda806113 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 628 00007ffcda80635c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateBoundaryDescriptor + 584 00007ffcda806658 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8 00007ffcda806668 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 519 00007ffcda806867 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23 00007ffcda806887 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!A_SHAFinal + 300 00007ffcda806bf0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!A_SHAInit + 44 00007ffcda806c24 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292 00007ffcda809188 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20 00007ffcda8091a4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 352 00007ffcda8092f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeSid + 35 00007ffcda80931b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAce + 339 00007ffcda80950b 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99 00007ffcda809577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103 00007ffcda8095e7 8 bytes {JMP 0xffffffffffffffe6}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 751 00007ffcda80986f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135 00007ffcda809a67 8 bytes {JMP 0xffffffffffffffaa}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43 00007ffcda80a7bf 8 bytes {JMP 0xfffffffffffffff5}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104 00007ffcda80a8e8 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356 00007ffcda80aa78 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64 00007ffcda80d270 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlOpenCurrentUser + 208 00007ffcda80d39c 8 bytes {JMP 0xffffffffffffffa3}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952 00007ffcda80d75c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlAppendUnicodeToString + 167 00007ffcda80e56b 8 bytes [D0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthSidAsUnicodeString + 84 00007ffcda80e5c8 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlValidSecurityDescriptor + 243 00007ffcda80e6c3 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAccessAllowedAce + 379 00007ffcda80e847 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffcda88ac50 8 bytes {JMP QWORD [RIP-0x7c8ac]}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffcda88add0 8 bytes {JMP QWORD [RIP-0x7c86b]}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffcda88ae00 8 bytes {JMP QWORD [RIP-0x7db96]}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffcda88af20 8 bytes {JMP QWORD [RIP-0x7d7ca]}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffcda88afd0 8 bytes {JMP QWORD [RIP-0x7dc3a]}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffcda88b690 8 bytes {JMP QWORD [RIP-0x7ce4f]}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffcda88b990 8 bytes {JMP QWORD [RIP-0x7d2d3]}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffcda88c210 8 bytes {JMP QWORD [RIP-0x7dc4e]}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 381 0000000076f6137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 386 0000000076f61512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000076f61551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000076f61577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000076f61784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuThreadInit + 50 0000000076f617c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000076f617e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 0000000076f61834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000076f61841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000076f61a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000076f62ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000076f62c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[4216] C:\Windows\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000076f62c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007ffcda80293c 8 bytes {JMP 0xffffffffffffff8c}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToAverageDWORD + 21 00007ffcda802959 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!WinSqmSetIfMaxDWORD + 95 00007ffcda8029c7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteEndScenario + 220 00007ffcda802aac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEndSession + 272 00007ffcda802bc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 8 00007ffcda803018 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 940 00007ffcda8033bc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 64 00007ffcda803404 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 503 00007ffcda8035bb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007ffcda803fe0 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlVerifyVersionInfo + 835 00007ffcda804933 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 336 00007ffcda804bac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 472 00007ffcda804c34 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 567 00007ffcda80543f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStream + 592 00007ffcda8056b4 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStreamEx + 875 00007ffcda805a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 139 00007ffcda805f8b 8 bytes {JMP 0xffffffffffffffd1}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 224 00007ffcda805fe0 16 bytes {JMP 0xffffffffffffffcf}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventWrite + 119 00007ffcda8060df 8 bytes {JMP 0xffffffffffffffac}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 43 00007ffcda806113 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 628 00007ffcda80635c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateBoundaryDescriptor + 584 00007ffcda806658 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8 00007ffcda806668 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 519 00007ffcda806867 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23 00007ffcda806887 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!A_SHAFinal + 300 00007ffcda806bf0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!A_SHAInit + 44 00007ffcda806c24 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292 00007ffcda809188 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20 00007ffcda8091a4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 352 00007ffcda8092f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeSid + 35 00007ffcda80931b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAce + 339 00007ffcda80950b 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99 00007ffcda809577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103 00007ffcda8095e7 8 bytes {JMP 0xffffffffffffffe6}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 751 00007ffcda80986f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135 00007ffcda809a67 8 bytes {JMP 0xffffffffffffffaa}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43 00007ffcda80a7bf 8 bytes {JMP 0xfffffffffffffff5}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104 00007ffcda80a8e8 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356 00007ffcda80aa78 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64 00007ffcda80d270 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlOpenCurrentUser + 208 00007ffcda80d39c 8 bytes {JMP 0xffffffffffffffa3}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952 00007ffcda80d75c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlAppendUnicodeToString + 167 00007ffcda80e56b 8 bytes [D0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthSidAsUnicodeString + 84 00007ffcda80e5c8 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlValidSecurityDescriptor + 243 00007ffcda80e6c3 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAccessAllowedAce + 379 00007ffcda80e847 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffcda88ac50 8 bytes {JMP QWORD [RIP-0x7c8ac]}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffcda88add0 8 bytes {JMP QWORD [RIP-0x7c86b]}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffcda88ae00 8 bytes {JMP QWORD [RIP-0x7db96]}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffcda88af20 8 bytes {JMP QWORD [RIP-0x7d7ca]}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffcda88afd0 8 bytes {JMP QWORD [RIP-0x7dc3a]}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffcda88b690 8 bytes {JMP QWORD [RIP-0x7ce4f]}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffcda88b990 8 bytes {JMP QWORD [RIP-0x7d2d3]}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffcda88c210 8 bytes {JMP QWORD [RIP-0x7dc4e]}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 381 0000000076f6137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 386 0000000076f61512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000076f61551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000076f61577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000076f61784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuThreadInit + 50 0000000076f617c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000076f617e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 0000000076f61834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000076f61841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000076f61a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000076f62ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000076f62c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NETGEAR\WNDA4100\WNDA4100.EXE[5116] C:\Windows\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000076f62c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007ffcda80293c 8 bytes {JMP 0xffffffffffffff8c}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToAverageDWORD + 21 00007ffcda802959 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!WinSqmSetIfMaxDWORD + 95 00007ffcda8029c7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteEndScenario + 220 00007ffcda802aac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEndSession + 272 00007ffcda802bc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 8 00007ffcda803018 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 940 00007ffcda8033bc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 64 00007ffcda803404 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 503 00007ffcda8035bb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007ffcda803fe0 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlVerifyVersionInfo + 835 00007ffcda804933 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 336 00007ffcda804bac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 472 00007ffcda804c34 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 567 00007ffcda80543f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStream + 592 00007ffcda8056b4 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStreamEx + 875 00007ffcda805a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 139 00007ffcda805f8b 8 bytes {JMP 0xffffffffffffffd1}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 224 00007ffcda805fe0 16 bytes {JMP 0xffffffffffffffcf}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventWrite + 119 00007ffcda8060df 8 bytes {JMP 0xffffffffffffffac}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 43 00007ffcda806113 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 628 00007ffcda80635c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateBoundaryDescriptor + 584 00007ffcda806658 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8 00007ffcda806668 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 519 00007ffcda806867 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23 00007ffcda806887 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!A_SHAFinal + 300 00007ffcda806bf0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!A_SHAInit + 44 00007ffcda806c24 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292 00007ffcda809188 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20 00007ffcda8091a4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 352 00007ffcda8092f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeSid + 35 00007ffcda80931b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAce + 339 00007ffcda80950b 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99 00007ffcda809577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103 00007ffcda8095e7 8 bytes {JMP 0xffffffffffffffe6}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 751 00007ffcda80986f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135 00007ffcda809a67 8 bytes {JMP 0xffffffffffffffaa}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43 00007ffcda80a7bf 8 bytes {JMP 0xfffffffffffffff5}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104 00007ffcda80a8e8 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356 00007ffcda80aa78 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64 00007ffcda80d270 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlOpenCurrentUser + 208 00007ffcda80d39c 8 bytes {JMP 0xffffffffffffffa3}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952 00007ffcda80d75c 8 bytes [F0, 69, 0D, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlAppendUnicodeToString + 167 00007ffcda80e56b 8 bytes [D0, 69, 0D, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthSidAsUnicodeString + 84 00007ffcda80e5c8 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlValidSecurityDescriptor + 243 00007ffcda80e6c3 8 bytes [B0, 69, 0D, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAccessAllowedAce + 379 00007ffcda80e847 8 bytes [A0, 69, 0D, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffcda88ac50 8 bytes {JMP QWORD [RIP-0x7c8ac]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffcda88add0 8 bytes {JMP QWORD [RIP-0x7c86b]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffcda88ae00 8 bytes {JMP QWORD [RIP-0x7db96]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffcda88af20 8 bytes {JMP QWORD [RIP-0x7d7ca]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffcda88afd0 8 bytes {JMP QWORD [RIP-0x7dc3a]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffcda88b690 8 bytes {JMP QWORD [RIP-0x7ce4f]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffcda88b990 8 bytes {JMP QWORD [RIP-0x7d2d3]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffcda88c210 8 bytes {JMP QWORD [RIP-0x7dc4e]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 381 0000000076f6137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 386 0000000076f61512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000076f61551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000076f61577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000076f61784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuThreadInit + 50 0000000076f617c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000076f617e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 0000000076f61834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000076f61841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000076f61a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000076f62ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000076f62c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4512] C:\Windows\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000076f62c43 8 bytes [7C, 68, 0D, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007ffcda80293c 8 bytes {JMP 0xffffffffffffff8c}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToAverageDWORD + 21 00007ffcda802959 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!WinSqmSetIfMaxDWORD + 95 00007ffcda8029c7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteEndScenario + 220 00007ffcda802aac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEndSession + 272 00007ffcda802bc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 8 00007ffcda803018 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 940 00007ffcda8033bc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 64 00007ffcda803404 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 503 00007ffcda8035bb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007ffcda803fe0 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlVerifyVersionInfo + 835 00007ffcda804933 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 336 00007ffcda804bac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 472 00007ffcda804c34 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 567 00007ffcda80543f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStream + 592 00007ffcda8056b4 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStreamEx + 875 00007ffcda805a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 139 00007ffcda805f8b 8 bytes {JMP 0xffffffffffffffd1}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 224 00007ffcda805fe0 16 bytes {JMP 0xffffffffffffffcf}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventWrite + 119 00007ffcda8060df 8 bytes {JMP 0xffffffffffffffac}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 43 00007ffcda806113 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 628 00007ffcda80635c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateBoundaryDescriptor + 584 00007ffcda806658 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8 00007ffcda806668 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 519 00007ffcda806867 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23 00007ffcda806887 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!A_SHAFinal + 300 00007ffcda806bf0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!A_SHAInit + 44 00007ffcda806c24 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292 00007ffcda809188 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20 00007ffcda8091a4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 352 00007ffcda8092f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeSid + 35 00007ffcda80931b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAce + 339 00007ffcda80950b 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99 00007ffcda809577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103 00007ffcda8095e7 8 bytes {JMP 0xffffffffffffffe6}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 751 00007ffcda80986f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135 00007ffcda809a67 8 bytes {JMP 0xffffffffffffffaa}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43 00007ffcda80a7bf 8 bytes {JMP 0xfffffffffffffff5}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104 00007ffcda80a8e8 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356 00007ffcda80aa78 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64 00007ffcda80d270 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlOpenCurrentUser + 208 00007ffcda80d39c 8 bytes {JMP 0xffffffffffffffa3}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952 00007ffcda80d75c 8 bytes [F0, 69, BA, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlAppendUnicodeToString + 167 00007ffcda80e56b 8 bytes [D0, 69, BA, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthSidAsUnicodeString + 84 00007ffcda80e5c8 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlValidSecurityDescriptor + 243 00007ffcda80e6c3 8 bytes [B0, 69, BA, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAccessAllowedAce + 379 00007ffcda80e847 8 bytes [A0, 69, BA, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffcda88ac50 8 bytes {JMP QWORD [RIP-0x7c8ac]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffcda88add0 8 bytes {JMP QWORD [RIP-0x7c86b]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffcda88ae00 8 bytes {JMP QWORD [RIP-0x7db96]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffcda88af20 8 bytes {JMP QWORD [RIP-0x7d7ca]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffcda88afd0 8 bytes {JMP QWORD [RIP-0x7dc3a]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffcda88b690 8 bytes {JMP QWORD [RIP-0x7ce4f]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffcda88b990 8 bytes {JMP QWORD [RIP-0x7d2d3]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffcda88c210 8 bytes {JMP QWORD [RIP-0x7dc4e]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 381 0000000076f6137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 386 0000000076f61512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000076f61551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000076f61577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000076f61784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuThreadInit + 50 0000000076f617c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000076f617e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 0000000076f61834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000076f61841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000076f61a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000076f62ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000076f62c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4208] C:\Windows\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000076f62c43 8 bytes [7C, 68, BA, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007ffcda80293c 8 bytes {JMP 0xffffffffffffff8c}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToAverageDWORD + 21 00007ffcda802959 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!WinSqmSetIfMaxDWORD + 95 00007ffcda8029c7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteEndScenario + 220 00007ffcda802aac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEndSession + 272 00007ffcda802bc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 8 00007ffcda803018 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 940 00007ffcda8033bc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 64 00007ffcda803404 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 503 00007ffcda8035bb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007ffcda803fe0 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlVerifyVersionInfo + 835 00007ffcda804933 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 336 00007ffcda804bac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 472 00007ffcda804c34 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 567 00007ffcda80543f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStream + 592 00007ffcda8056b4 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStreamEx + 875 00007ffcda805a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 139 00007ffcda805f8b 8 bytes {JMP 0xffffffffffffffd1}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 224 00007ffcda805fe0 16 bytes {JMP 0xffffffffffffffcf}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventWrite + 119 00007ffcda8060df 8 bytes {JMP 0xffffffffffffffac}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 43 00007ffcda806113 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 628 00007ffcda80635c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateBoundaryDescriptor + 584 00007ffcda806658 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8 00007ffcda806668 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 519 00007ffcda806867 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23 00007ffcda806887 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!A_SHAFinal + 300 00007ffcda806bf0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!A_SHAInit + 44 00007ffcda806c24 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292 00007ffcda809188 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20 00007ffcda8091a4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 352 00007ffcda8092f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeSid + 35 00007ffcda80931b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAce + 339 00007ffcda80950b 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99 00007ffcda809577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103 00007ffcda8095e7 8 bytes {JMP 0xffffffffffffffe6}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 751 00007ffcda80986f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135 00007ffcda809a67 8 bytes {JMP 0xffffffffffffffaa}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43 00007ffcda80a7bf 8 bytes {JMP 0xfffffffffffffff5}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104 00007ffcda80a8e8 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356 00007ffcda80aa78 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64 00007ffcda80d270 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlOpenCurrentUser + 208 00007ffcda80d39c 8 bytes {JMP 0xffffffffffffffa3}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952 00007ffcda80d75c 8 bytes [F0, 69, 3E, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlAppendUnicodeToString + 167 00007ffcda80e56b 8 bytes [D0, 69, 3E, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthSidAsUnicodeString + 84 00007ffcda80e5c8 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlValidSecurityDescriptor + 243 00007ffcda80e6c3 8 bytes [B0, 69, 3E, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAccessAllowedAce + 379 00007ffcda80e847 8 bytes [A0, 69, 3E, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffcda88ac50 8 bytes {JMP QWORD [RIP-0x7c8ac]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffcda88add0 8 bytes {JMP QWORD [RIP-0x7c86b]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffcda88ae00 8 bytes {JMP QWORD [RIP-0x7db96]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffcda88af20 8 bytes {JMP QWORD [RIP-0x7d7ca]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffcda88afd0 8 bytes {JMP QWORD [RIP-0x7dc3a]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffcda88b690 8 bytes {JMP QWORD [RIP-0x7ce4f]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffcda88b990 8 bytes {JMP QWORD [RIP-0x7d2d3]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffcda88c210 8 bytes {JMP QWORD [RIP-0x7dc4e]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 381 0000000076f6137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 386 0000000076f61512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000076f61551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000076f61577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000076f61784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuThreadInit + 50 0000000076f617c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000076f617e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 0000000076f61834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000076f61841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000076f61a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000076f62ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000076f62c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5252] C:\Windows\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000076f62c43 8 bytes [7C, 68, 3E, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007ffcda80293c 8 bytes {JMP 0xffffffffffffff8c}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToAverageDWORD + 21 00007ffcda802959 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!WinSqmSetIfMaxDWORD + 95 00007ffcda8029c7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteEndScenario + 220 00007ffcda802aac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEndSession + 272 00007ffcda802bc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 8 00007ffcda803018 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 940 00007ffcda8033bc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 64 00007ffcda803404 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 503 00007ffcda8035bb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007ffcda803fe0 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlVerifyVersionInfo + 835 00007ffcda804933 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 336 00007ffcda804bac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 472 00007ffcda804c34 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 567 00007ffcda80543f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStream + 592 00007ffcda8056b4 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToStreamEx + 875 00007ffcda805a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 139 00007ffcda805f8b 8 bytes {JMP 0xffffffffffffffd1}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventEnabled + 224 00007ffcda805fe0 16 bytes {JMP 0xffffffffffffffcf}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEventWrite + 119 00007ffcda8060df 8 bytes {JMP 0xffffffffffffffac}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 43 00007ffcda806113 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWrite + 628 00007ffcda80635c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateBoundaryDescriptor + 584 00007ffcda806658 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8 00007ffcda806668 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 519 00007ffcda806867 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23 00007ffcda806887 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!A_SHAFinal + 300 00007ffcda806bf0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!A_SHAInit + 44 00007ffcda806c24 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292 00007ffcda809188 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20 00007ffcda8091a4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 352 00007ffcda8092f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeSid + 35 00007ffcda80931b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAce + 339 00007ffcda80950b 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99 00007ffcda809577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103 00007ffcda8095e7 8 bytes {JMP 0xffffffffffffffe6}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 751 00007ffcda80986f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135 00007ffcda809a67 8 bytes {JMP 0xffffffffffffffaa}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43 00007ffcda80a7bf 8 bytes {JMP 0xfffffffffffffff5}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104 00007ffcda80a8e8 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356 00007ffcda80aa78 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64 00007ffcda80d270 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlOpenCurrentUser + 208 00007ffcda80d39c 8 bytes {JMP 0xffffffffffffffa3}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952 00007ffcda80d75c 8 bytes [F0, 69, 18, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlAppendUnicodeToString + 167 00007ffcda80e56b 8 bytes [D0, 69, 18, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlLengthSidAsUnicodeString + 84 00007ffcda80e5c8 8 bytes {JMP 0xffffffffffffffdc}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlValidSecurityDescriptor + 243 00007ffcda80e6c3 8 bytes [B0, 69, 18, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!RtlAddAccessAllowedAce + 379 00007ffcda80e847 8 bytes [A0, 69, 18, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffcda88ac50 8 bytes {JMP QWORD [RIP-0x7c8ac]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffcda88add0 8 bytes {JMP QWORD [RIP-0x7c86b]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffcda88ae00 8 bytes {JMP QWORD [RIP-0x7db96]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffcda88af20 8 bytes {JMP QWORD [RIP-0x7d7ca]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffcda88afd0 8 bytes {JMP QWORD [RIP-0x7dc3a]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffcda88b690 8 bytes {JMP QWORD [RIP-0x7ce4f]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffcda88b990 8 bytes {JMP QWORD [RIP-0x7d2d3]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffcda88c210 8 bytes {JMP QWORD [RIP-0x7dc4e]}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 381 0000000076f6137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 386 0000000076f61512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000076f61551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000076f61577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000076f61784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuThreadInit + 50 0000000076f617c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000076f617e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 0000000076f61834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000076f61841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000076f61a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000076f62ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000076f62c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5472] C:\Windows\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000076f62c43 8 bytes [7C, 68, 18, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007ffcda80293c 8 bytes {JMP 0xffffffffffffff8c}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!WinSqmAddToAverageDWORD + 21 00007ffcda802959 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!WinSqmSetIfMaxDWORD + 95 00007ffcda8029c7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteEndScenario + 220 00007ffcda802aac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!WinSqmEndSession + 272 00007ffcda802bc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 8 00007ffcda803018 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!WinSqmStartSession + 940 00007ffcda8033bc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 64 00007ffcda803404 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!EtwEventWriteFull + 503 00007ffcda8035bb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007ffcda803fe0 8 bytes {JMP 0xffffffffffffffa9}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!RtlVerifyVersionInfo + 835 00007ffcda804933 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 336 00007ffcda804bac 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2988] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 472 00007ffcda804c34 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... |