OK, hatte ich falsch verstanden, sorry.
Nachfolgend zunächst der Bericht von Kaspersky. Code:
Gefundenes Objekt (Datei) wurde desinfiziert C:\Documents and Settings\xxx\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\LiveComm\07baea26d15af240\120712-0049\Att\2000567c\Nicht gedeckten Lastschrift Ihrer Bestellung Amazon vom 11.10.2014.zip C:\Documents and Settings\xxx\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\LiveComm\07baea26d15af240\120712-0049\Att\2000567c\Nicht gedeckten Lastschrift Ihrer Bestellung Amazon vom 11.10.2014.zip Unbekannte Bedrohung Gestern, 18:58
Gefundenes Objekt (Datei) wurde desinfiziert C:\Documents and Settings\xxx\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\LiveComm\07baea26d15af240\120712-0049\Att\20005297\Nicht gedeckten Buchung Ihrer Bestellung Ebay vom 24.09.2014.zip C:\Documents and Settings\xxx\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\LiveComm\07baea26d15af240\120712-0049\Att\20005297\Nicht gedeckten Buchung Ihrer Bestellung Ebay vom 24.09.2014.zip Unbekannte Bedrohung 13.10.2014, 15:44
Gefundenes Objekt (Datei) wurde gelöscht C:\Documents and Settings\xxx\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\LiveComm\07baea26d15af240\120712-0049\Att\2000567c\Nicht gedeckten Lastschrift Ihrer Bestellung Amazon vom 11.10.2014.zip//Forderung stornierten Buchung Ihrer Bestellung Amazon vom 11.10.2014.zip//Ausgleich 11.10.2014 - Inkasso Abteilung Amazon GmbH.com C:\Documents and Settings\xxx\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\LiveComm\07baea26d15af240\120712-0049\Att\2000567c\Nicht gedeckten Lastschrift Ihrer Bestellung Amazon vom 11.10.2014.zip//Forderung stornierten Buchung Ihrer Bestellung Amazon vom 11.10.2014.zip//Ausgleich 11.10.2014 - Inkasso Abteilung Amazon GmbH.com Trojan-Banker.Win32.Agent.ubo Trojanisches Programm Gestern, 18:58
Gefundenes Objekt (Datei) wurde gelöscht C:\Documents and Settings\xxx\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\LiveComm\07baea26d15af240\120712-0049\Att\20005297\Nicht gedeckten Buchung Ihrer Bestellung Ebay vom 24.09.2014.zip//Forderung stornierten Buchung Ihrer Bestellung Ebay vom 24.09.2014.zip//Forderung 24.09.2014 - Inkasso Ebay AG.com C:\Documents and Settings\xxx\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\LiveComm\07baea26d15af240\120712-0049\Att\20005297\Nicht gedeckten Buchung Ihrer Bestellung Ebay vom 24.09.2014.zip//Forderung stornierten Buchung Ihrer Bestellung Ebay vom 24.09.2014.zip//Forderung 24.09.2014 - Inkasso Ebay AG.com Trojan.Win32.Yakes.ghny Trojanisches Programm 13.10.2014, 15:44
Nachfolgend der erste Teil der Gmer.txt-Datei, für den zweiten eröffne ich einen eigenen Beitrag (hoffe, dass Du dies so gemeint hast). Code:
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-10-19 12:18:09
Windows 6.2.9200 x64 \Device\Harddisk0\DR0 -> \Device\00000034 HGST_HTS541010A9E680 rev.JA0OA560 931,51GB
Running: Gmer-19357.exe; Driver: C:\Users\xxx\AppData\Local\Temp\pfdyifob.sys
---- User code sections - GMER 2.1 ----
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNEL32.DLL!K32GetModuleInformation 00007ffa1b0228c0 7 bytes JMP 00007ffb1a3902d0
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNEL32.DLL!RegQueryValueExW 00007ffa1b0243d8 7 bytes JMP 00007ffb1a390308
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNEL32.DLL!RegSetValueExA 00007ffa1b0d1f20 7 bytes JMP 00007ffb1a390378
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNEL32.DLL!RegSetValueExW 00007ffa1b0d40b4 7 bytes JMP 00007ffb1a3903b0
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNEL32.DLL!RegDeleteValueW 00007ffa1b0d4510 7 bytes JMP 00007ffb1a390340
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNEL32.DLL!K32GetModuleFileNameExW 00007ffa1b0d4af0 7 bytes JMP 00007ffb1a390260
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNEL32.DLL!K32EnumProcessModulesEx 00007ffa1b0fcea0 7 bytes JMP 00007ffb1a390228
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNEL32.DLL!K32GetMappedFileNameW 00007ffa1b0fcf10 7 bytes JMP 00007ffb1a390298
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNELBASE.dll!GetModuleHandleW 00007ffa1a3a299c 7 bytes JMP 00007ffb1a3900d8
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNELBASE.dll!FreeLibrary 00007ffa1a3a54c8 5 bytes JMP 00007ffb1a390180
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNELBASE.dll!LoadLibraryExW 00007ffa1a3a55b0 5 bytes JMP 00007ffb1a390148
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\KERNELBASE.dll!GetModuleHandleExW 00007ffa1a3a5e58 5 bytes JMP 00007ffb1a390110
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\USER32.dll!CreateWindowExW 00007ffa1a96b6f4 10 bytes JMP 00007ffb1a390490
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\USER32.dll!EnumDisplayDevicesW 00007ffa1a9745e8 5 bytes JMP 00007ffb1a390458
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\USER32.dll!DisplayConfigGetDeviceInfo 00007ffa1a974760 1 byte JMP 00007ffb1a3903e8
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\USER32.dll!DisplayConfigGetDeviceInfo + 2 00007ffa1a974762 7 bytes {JMP 0xffffffffffa1bc88}
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\USER32.dll!EnumDisplayDevicesA 00007ffa1a984fc0 5 bytes JMP 00007ffb1a390420
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\GDI32.dll!D3DKMTGetDisplayModeList 00007ffa1aed1500 8 bytes JMP 00007ffb1a3901b8
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\system32\GDI32.dll!D3DKMTQueryAdapterInfo 00007ffa1aed1750 8 bytes JMP 00007ffb1a3901f0
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\System32\dxgi.dll!CreateDXGIFactory1 00007ffa18577a88 5 bytes JMP 00007ffb183f0110
.text C:\WINDOWS\System32\dwm.exe[7256] C:\WINDOWS\System32\dxgi.dll!CreateDXGIFactory 00007ffa18584990 5 bytes JMP 00007ffb183f00d8
.text C:\WINDOWS\system32\nvvsvc.exe[4640] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007ffa1b87169a 4 bytes [87, 1B, FA, 7F]
.text C:\WINDOWS\system32\nvvsvc.exe[4640] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007ffa1b8716a2 4 bytes [87, 1B, FA, 7F]
.text C:\WINDOWS\system32\nvvsvc.exe[4640] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118 00007ffa1b87181a 4 bytes [87, 1B, FA, 7F]
.text C:\WINDOWS\system32\nvvsvc.exe[4640] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142 00007ffa1b871832 4 bytes [87, 1B, FA, 7F]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffa1cf62bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffa1cf62d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffa1cf62ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffa1cf63757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffa1cf63878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffa1cf6425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffa1cf64a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffa1cf64a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffa1cf64cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffa1cf65030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffa1cf6511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffa1cf66693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffa1cf66964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffa1cf66b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffa1cf6740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffa1cf675c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffa1cf6a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffa1cf6a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffa1cf6a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffa1cf6ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffa1cf6b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffa1cf6b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffa1cf6b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffa1cf6b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffa1cf6b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffa1cf6b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffa1cf6bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffa1cf6be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffa1cfe1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffa1cfe18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffa1cfe18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffa1cfe1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffa1cfe1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffa1cfe2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffa1cfe2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffa1cfe2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 00000000772c137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 00000000772c1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000772c1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 00000000772c1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 00000000772c1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000772c17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000772c17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 00000000772c1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 00000000772c1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 00000000772c1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000772c2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000772c2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe[8124] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 00000000772c2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffa1cf62bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffa1cf62d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffa1cf62ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffa1cf63757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffa1cf63878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffa1cf6425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffa1cf64a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffa1cf64a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffa1cf64cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffa1cf65030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffa1cf6511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffa1cf66693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffa1cf66964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffa1cf66b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffa1cf6740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffa1cf675c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffa1cf6a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffa1cf6a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffa1cf6a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffa1cf6ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffa1cf6b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffa1cf6b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffa1cf6b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffa1cf6b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffa1cf6b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffa1cf6b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffa1cf6bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffa1cf6be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffa1cfe1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffa1cfe18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffa1cfe18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffa1cfe1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffa1cfe1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffa1cfe2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffa1cfe2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffa1cfe2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 00000000772c137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 00000000772c1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000772c1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 00000000772c1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 00000000772c1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000772c17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000772c17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 00000000772c1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 00000000772c1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 00000000772c1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000772c2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000772c2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\ASUS\P4G\InsOnWMI.exe[7876] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 00000000772c2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffa1cf62bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffa1cf62d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffa1cf62ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffa1cf63757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffa1cf63878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffa1cf6425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffa1cf64a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffa1cf64a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffa1cf64cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffa1cf65030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffa1cf6511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffa1cf66693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffa1cf66964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffa1cf66b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffa1cf6740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffa1cf675c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffa1cf6a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffa1cf6a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffa1cf6a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffa1cf6ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffa1cf6b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffa1cf6b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffa1cf6b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffa1cf6b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffa1cf6b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffa1cf6b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffa1cf6bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffa1cf6be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffa1cfe1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffa1cfe18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffa1cfe18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffa1cfe1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffa1cfe1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffa1cfe2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffa1cfe2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffa1cfe2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 00000000772c137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 00000000772c1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000772c1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 00000000772c1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 00000000772c1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000772c17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000772c17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 00000000772c1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 00000000772c1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 00000000772c1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000772c2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000772c2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\KBFiltr.exe[3960] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 00000000772c2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffa1cf62bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffa1cf62d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffa1cf62ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffa1cf63757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffa1cf63878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffa1cf6425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffa1cf64a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffa1cf64a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffa1cf64cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffa1cf65030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffa1cf6511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffa1cf66693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffa1cf66964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffa1cf66b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffa1cf6740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffa1cf675c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffa1cf6a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffa1cf6a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffa1cf6a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffa1cf6ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffa1cf6b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffa1cf6b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffa1cf6b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffa1cf6b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffa1cf6b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffa1cf6b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffa1cf6bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffa1cf6be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffa1cfe1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffa1cfe18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffa1cfe18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffa1cfe1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffa1cfe1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffa1cfe2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffa1cfe2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffa1cfe2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 00000000772c137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 00000000772c1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000772c1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 00000000772c1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 00000000772c1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000772c17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000772c17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 00000000772c1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 00000000772c1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 00000000772c1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000772c2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000772c2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe[6632] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 00000000772c2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffa1cf62bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffa1cf62d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffa1cf62ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffa1cf63757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffa1cf63878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffa1cf6425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffa1cf64a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffa1cf64a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffa1cf64cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffa1cf65030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffa1cf6511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffa1cf66693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffa1cf66964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffa1cf66b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffa1cf6740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffa1cf675c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffa1cf6a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffa1cf6a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffa1cf6a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffa1cf6ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffa1cf6b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffa1cf6b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffa1cf6b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffa1cf6b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffa1cf6b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffa1cf6b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffa1cf6bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffa1cf6be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffa1cfe1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffa1cfe18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffa1cfe18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffa1cfe1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffa1cfe1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffa1cfe2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffa1cfe2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffa1cfe2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 00000000772c137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 00000000772c1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000772c1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 00000000772c1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 00000000772c1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000772c17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000772c17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 00000000772c1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 00000000772c1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 00000000772c1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000772c2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000772c2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe[6608] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 00000000772c2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffa1cf62bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffa1cf62d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffa1cf62ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffa1cf63757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffa1cf63878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffa1cf6425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffa1cf64a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffa1cf64a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffa1cf64cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffa1cf65030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffa1cf6511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffa1cf66693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffa1cf66964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffa1cf66b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffa1cf6740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffa1cf675c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffa1cf6a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffa1cf6a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffa1cf6a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffa1cf6ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffa1cf6b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffa1cf6b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffa1cf6b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffa1cf6b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffa1cf6b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffa1cf6b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffa1cf6bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffa1cf6be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffa1cfe1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffa1cfe18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffa1cfe18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffa1cfe1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffa1cfe1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffa1cfe2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffa1cfe2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffa1cfe2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 00000000772c137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 00000000772c1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000772c1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 00000000772c1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 00000000772c1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000772c17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000772c17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 00000000772c1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 00000000772c1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 00000000772c1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000772c2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000772c2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe[6512] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 00000000772c2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffa1cf62bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffa1cf62d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffa1cf62ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffa1cf63757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffa1cf63878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffa1cf6425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffa1cf64a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffa1cf64a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffa1cf64cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffa1cf65030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffa1cf6511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffa1cf66693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffa1cf66964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffa1cf66b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffa1cf6740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffa1cf675c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffa1cf6a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffa1cf6a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffa1cf6a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffa1cf6ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffa1cf6b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffa1cf6b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffa1cf6b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffa1cf6b648 8 bytes [10, 6A, CA, FE, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffa1cf6b88c 8 bytes [F0, 69, CA, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffa1cf6b98c 8 bytes [E0, 69, CA, FE, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffa1cf6bc38 8 bytes [B0, 69, CA, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffa1cf6be94 8 bytes [A0, 69, CA, FE, 00, 00, 00, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffa1cfe1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffa1cfe18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffa1cfe18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffa1cfe1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffa1cfe1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffa1cfe2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffa1cfe2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffa1cfe2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 00000000772c137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 00000000772c1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000772c1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 00000000772c1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 00000000772c1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000772c17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000772c17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 00000000772c1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 00000000772c1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[1896] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 00000000772c1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ...
|