Code:
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2015-02-21 15:16:21
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk1\DR1 -> \Device\00000075 SanDisk_ rev.3.2. 117,38GB
Running: Gmer-19357.exe; Driver: C:\Users\TJHHH\AppData\Local\Temp\fgloipow.sys
---- User code sections - GMER 2.1 ----
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\avp.exe[1428] C:\Windows\SysWOW64\ntdll.dll!NtQueryValueKey 000000007732faa8 5 bytes JMP 0000000172812e30
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\avp.exe[1428] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077330038 5 bytes JMP 0000000172812df0
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075f81401 2 bytes JMP 74d7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075f81419 2 bytes JMP 74d7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075f81431 2 bytes JMP 74df8ea9 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000075f8144a 2 bytes CALL 74d548ad C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000075f814dd 2 bytes JMP 74df87a2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000075f814f5 2 bytes JMP 74df8978 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000075f8150d 2 bytes JMP 74df8698 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075f81525 2 bytes JMP 74df8a62 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000075f8153d 2 bytes JMP 74d6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075f81555 2 bytes JMP 74d768ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000075f8156d 2 bytes JMP 74df8f61 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075f81585 2 bytes JMP 74df8ac2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000075f8159d 2 bytes JMP 74df865c C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000075f815b5 2 bytes JMP 74d6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000075f815cd 2 bytes JMP 74d7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000075f816b2 2 bytes JMP 74df8e24 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[2144] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000075f816bd 2 bytes JMP 74df85f1 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075f81401 2 bytes JMP 74d7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075f81419 2 bytes JMP 74d7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075f81431 2 bytes JMP 74df8ea9 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000075f8144a 2 bytes CALL 74d548ad C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000075f814dd 2 bytes JMP 74df87a2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000075f814f5 2 bytes JMP 74df8978 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000075f8150d 2 bytes JMP 74df8698 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075f81525 2 bytes JMP 74df8a62 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000075f8153d 2 bytes JMP 74d6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075f81555 2 bytes JMP 74d768ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000075f8156d 2 bytes JMP 74df8f61 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075f81585 2 bytes JMP 74df8ac2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000075f8159d 2 bytes JMP 74df865c C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000075f815b5 2 bytes JMP 74d6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000075f815cd 2 bytes JMP 74d7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000075f816b2 2 bytes JMP 74df8e24 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[2240] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000075f816bd 2 bytes JMP 74df85f1 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075f81401 2 bytes JMP 74d7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075f81419 2 bytes JMP 74d7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075f81431 2 bytes JMP 74df8ea9 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000075f8144a 2 bytes CALL 74d548ad C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000075f814dd 2 bytes JMP 74df87a2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000075f814f5 2 bytes JMP 74df8978 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000075f8150d 2 bytes JMP 74df8698 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075f81525 2 bytes JMP 74df8a62 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000075f8153d 2 bytes JMP 74d6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075f81555 2 bytes JMP 74d768ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000075f8156d 2 bytes JMP 74df8f61 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075f81585 2 bytes JMP 74df8ac2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000075f8159d 2 bytes JMP 74df865c C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000075f815b5 2 bytes JMP 74d6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000075f815cd 2 bytes JMP 74d7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000075f816b2 2 bytes JMP 74df8e24 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2408] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000075f816bd 2 bytes JMP 74df85f1 C:\Windows\syswow64\kernel32.dll
? C:\Windows\system32\mssprxy.dll [2408] entry point in ".rdata" section 0000000072ed71e6
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 424 0000000077131398 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007713143f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077131594 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007713191e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077131bf8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077131d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077131edf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077131fc5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000771327b0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000771327d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007713282f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 184 0000000077132898 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077132d1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 375 0000000077132d67 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007713323b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 920 00000000771333c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077133a5e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077133ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077133b85 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077134190 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 161 0000000077134241 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 277 00000000771342b5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 214 00000000771343f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 276 0000000077134434 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 408 00000000771345d8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 657 00000000771346d1 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 284 0000000077134a9c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 483 0000000077134b63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 231 0000000077134c57 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 518 0000000077134d76 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlDeactivateActivationContext + 256 0000000077134ea0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContext + 67 0000000077134ef3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContextEx + 501 00000000771350f5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateUserThread + 256 00000000771352f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringExW + 247 00000000771353f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringW + 484 00000000771355e4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseAlpcCompletion + 438 00000000771364d6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!atol + 194 000000007713668e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!qsort + 76 000000007713687c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlLookupElementGenericTableFullAvl + 45 00000000771368bd 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 4 00000000771368d4 8 bytes [70, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 92 000000007713692c 8 bytes [60, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!RtlSubtreePredecessor + 790 0000000077137166 8 bytes [40, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroupMembers + 241 0000000077137dd1 8 bytes [10, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroup + 119 0000000077137e57 8 bytes [00, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077181380 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077181500 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077181530 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077181650 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077181700 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077181d30 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077181f80 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000771827e0 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074bd13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074bd146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074bd16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074bd19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074bd19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5600] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074bd1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 424 0000000077131398 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007713143f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077131594 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007713191e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077131bf8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077131d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077131edf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077131fc5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000771327b0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000771327d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007713282f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 184 0000000077132898 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077132d1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 375 0000000077132d67 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007713323b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 920 00000000771333c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077133a5e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077133ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077133b85 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077134190 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 161 0000000077134241 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 277 00000000771342b5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 214 00000000771343f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 276 0000000077134434 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 408 00000000771345d8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 657 00000000771346d1 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 284 0000000077134a9c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 483 0000000077134b63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 231 0000000077134c57 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 518 0000000077134d76 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlDeactivateActivationContext + 256 0000000077134ea0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContext + 67 0000000077134ef3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContextEx + 501 00000000771350f5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateUserThread + 256 00000000771352f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringExW + 247 00000000771353f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringW + 484 00000000771355e4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseAlpcCompletion + 438 00000000771364d6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!atol + 194 000000007713668e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!qsort + 76 000000007713687c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlLookupElementGenericTableFullAvl + 45 00000000771368bd 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 4 00000000771368d4 8 bytes [70, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 92 000000007713692c 8 bytes [60, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!RtlSubtreePredecessor + 790 0000000077137166 8 bytes [40, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroupMembers + 241 0000000077137dd1 8 bytes [10, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroup + 119 0000000077137e57 8 bytes [00, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077181380 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077181500 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077181530 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077181650 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077181700 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077181d30 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077181f80 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000771827e0 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074bd13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074bd146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074bd16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074bd19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074bd19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074bd1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 424 0000000077131398 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007713143f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077131594 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007713191e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077131bf8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077131d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077131edf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077131fc5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000771327b0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000771327d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007713282f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 184 0000000077132898 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077132d1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 375 0000000077132d67 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007713323b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 920 00000000771333c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077133a5e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077133ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077133b85 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077134190 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 161 0000000077134241 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 277 00000000771342b5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 214 00000000771343f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 276 0000000077134434 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 408 00000000771345d8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 657 00000000771346d1 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 284 0000000077134a9c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 483 0000000077134b63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 231 0000000077134c57 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 518 0000000077134d76 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlDeactivateActivationContext + 256 0000000077134ea0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContext + 67 0000000077134ef3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContextEx + 501 00000000771350f5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateUserThread + 256 00000000771352f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringExW + 247 00000000771353f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringW + 484 00000000771355e4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseAlpcCompletion + 438 00000000771364d6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!atol + 194 000000007713668e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!qsort + 76 000000007713687c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlLookupElementGenericTableFullAvl + 45 00000000771368bd 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 4 00000000771368d4 8 bytes [70, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 92 000000007713692c 8 bytes [60, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!RtlSubtreePredecessor + 790 0000000077137166 8 bytes [40, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroupMembers + 241 0000000077137dd1 8 bytes [10, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroup + 119 0000000077137e57 8 bytes [00, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077181380 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077181500 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077181530 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077181650 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077181700 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077181d30 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077181f80 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000771827e0 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074bd13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074bd146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074bd16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074bd19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074bd19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5904] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074bd1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 424 0000000077131398 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007713143f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077131594 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007713191e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077131bf8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077131d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077131edf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077131fc5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000771327b0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000771327d2 8 bytes {JMP 0x10}
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007713282f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 184 0000000077132898 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077132d1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 375 0000000077132d67 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007713323b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 920 00000000771333c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077133a5e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077133ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077133b85 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077134190 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 161 0000000077134241 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 277 00000000771342b5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 214 00000000771343f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 276 0000000077134434 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 408 00000000771345d8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 657 00000000771346d1 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 284 0000000077134a9c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 483 0000000077134b63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 231 0000000077134c57 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 518 0000000077134d76 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlDeactivateActivationContext + 256 0000000077134ea0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContext + 67 0000000077134ef3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContextEx + 501 00000000771350f5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateUserThread + 256 00000000771352f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringExW + 247 00000000771353f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringW + 484 00000000771355e4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseAlpcCompletion + 438 00000000771364d6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!atol + 194 000000007713668e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!qsort + 76 000000007713687c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlLookupElementGenericTableFullAvl + 45 00000000771368bd 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 4 00000000771368d4 8 bytes [70, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 92 000000007713692c 8 bytes [60, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!RtlSubtreePredecessor + 790 0000000077137166 8 bytes [40, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroupMembers + 241 0000000077137dd1 8 bytes [10, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroup + 119 0000000077137e57 8 bytes [00, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077181380 8 bytes {JMP QWORD [RIP-0x4a220]}
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077181500 8 bytes {JMP QWORD [RIP-0x49cef]}
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077181530 8 bytes {JMP QWORD [RIP-0x4ac62]}
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077181650 8 bytes {JMP QWORD [RIP-0x4a80f]}
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077181700 8 bytes {JMP QWORD [RIP-0x4adda]}
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077181d30 8 bytes {JMP QWORD [RIP-0x49edf]}
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077181f80 8 bytes {JMP QWORD [RIP-0x4a1b5]}
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000771827e0 8 bytes {JMP QWORD [RIP-0x4ab13]}
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074bd13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074bd146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074bd16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074bd19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074bd19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\SysWOW64\cmd.exe[5924] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074bd1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 424 0000000077131398 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007713143f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077131594 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007713191e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077131bf8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077131d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077131edf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077131fc5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000771327b0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000771327d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007713282f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 184 0000000077132898 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077132d1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 375 0000000077132d67 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007713323b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 920 00000000771333c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077133a5e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077133ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077133b85 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077134190 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 161 0000000077134241 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 277 00000000771342b5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 214 00000000771343f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 276 0000000077134434 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 408 00000000771345d8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 657 00000000771346d1 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 284 0000000077134a9c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 483 0000000077134b63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 231 0000000077134c57 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 518 0000000077134d76 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlDeactivateActivationContext + 256 0000000077134ea0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContext + 67 0000000077134ef3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContextEx + 501 00000000771350f5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateUserThread + 256 00000000771352f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringExW + 247 00000000771353f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringW + 484 00000000771355e4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseAlpcCompletion + 438 00000000771364d6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!atol + 194 000000007713668e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!qsort + 76 000000007713687c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlLookupElementGenericTableFullAvl + 45 00000000771368bd 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 4 00000000771368d4 8 bytes [70, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 92 000000007713692c 8 bytes [60, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!RtlSubtreePredecessor + 790 0000000077137166 8 bytes [40, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroupMembers + 241 0000000077137dd1 8 bytes [10, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroup + 119 0000000077137e57 8 bytes [00, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077181380 8 bytes {JMP QWORD [RIP-0x4a220]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077181500 8 bytes {JMP QWORD [RIP-0x49cef]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077181530 8 bytes {JMP QWORD [RIP-0x4ac62]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077181650 8 bytes {JMP QWORD [RIP-0x4a80f]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077181700 8 bytes {JMP QWORD [RIP-0x4adda]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077181d30 8 bytes {JMP QWORD [RIP-0x49edf]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077181f80 8 bytes {JMP QWORD [RIP-0x4a1b5]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000771827e0 8 bytes {JMP QWORD [RIP-0x4ab13]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074bd13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074bd146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074bd16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074bd19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074bd19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.1\plugin-nm-server.exe[4668] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074bd1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 424 0000000077131398 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007713143f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077131594 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007713191e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077131bf8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077131d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077131edf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077131fc5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000771327b0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000771327d2 8 bytes {JMP 0x10}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007713282f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 184 0000000077132898 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077132d1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 375 0000000077132d67 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007713323b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 920 00000000771333c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077133a5e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077133ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077133b85 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077134190 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 161 0000000077134241 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 277 00000000771342b5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 214 00000000771343f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 276 0000000077134434 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 408 00000000771345d8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 657 00000000771346d1 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 284 0000000077134a9c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 483 0000000077134b63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 231 0000000077134c57 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 518 0000000077134d76 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlDeactivateActivationContext + 256 0000000077134ea0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContext + 67 0000000077134ef3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContextEx + 501 00000000771350f5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateUserThread + 256 00000000771352f0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringExW + 247 00000000771353f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringW + 484 00000000771355e4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseAlpcCompletion + 438 00000000771364d6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!atol + 194 000000007713668e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!qsort + 76 000000007713687c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlLookupElementGenericTableFullAvl + 45 00000000771368bd 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 4 00000000771368d4 8 bytes [70, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 92 000000007713692c 8 bytes [60, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!RtlSubtreePredecessor + 790 0000000077137166 8 bytes [40, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroupMembers + 241 0000000077137dd1 8 bytes [10, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseCleanupGroup + 119 0000000077137e57 8 bytes [00, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077181380 8 bytes {JMP QWORD [RIP-0x4a220]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077181500 8 bytes {JMP QWORD [RIP-0x49cef]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077181530 8 bytes {JMP QWORD [RIP-0x4ac62]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077181650 8 bytes {JMP QWORD [RIP-0x4a80f]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077181700 8 bytes {JMP QWORD [RIP-0x4adda]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077181d30 8 bytes {JMP QWORD [RIP-0x49edf]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077181f80 8 bytes {JMP QWORD [RIP-0x4a1b5]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000771827e0 8 bytes {JMP QWORD [RIP-0x4ab13]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5812] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074bd13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
teil1 |