SmogEater | 13.12.2014 17:49 | Gmer Teil 2 von 3: Code:
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000775011f5 8 bytes {JMP 0xd}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 0000000077501390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007750143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 000000007750158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007750191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 0000000077501b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 0000000077501bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077501d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 0000000077501eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077501edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 0000000077501f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 0000000077501fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 0000000077501fd7 8 bytes {JMP 0xb}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 0000000077502272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 0000000077502301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 0000000077502792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000775027b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000775027d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007750282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 0000000077502890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077502d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 0000000077502d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 0000000077503023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007750323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000775033c0 16 bytes {JMP 0x4e}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077503a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077503ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077503b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 0000000077503d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077504190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077551380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077551500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077551530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077551650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077551700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077551d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077551f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000775527e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074fb13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074fb146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074fb16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000074fb16e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074fb19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074fb19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000074fb1a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000074fb1a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074fb1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000074fb1a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\kernel32.dll!RegQueryValueExW 00000000754f1f0e 7 bytes JMP 0000000173e24b10
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\kernel32.dll!RegSetValueExW 00000000754f5bad 7 bytes JMP 0000000173e254b0
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075501409 7 bytes JMP 0000000173e24e50
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\kernel32.dll!RegDeleteValueW 000000007550ea45 7 bytes JMP 0000000173e24b00
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 0000000075598e24 3 bytes JMP 0000000173e245c0
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx + 4 0000000075598e28 3 bytes [FE, CC, CC]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 0000000075598ea9 5 bytes JMP 0000000173e24670
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000755991ff 5 bytes JMP 0000000173e245d0
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 0000000076961d29 5 bytes JMP 0000000173e24580
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 0000000076961dd7 5 bytes JMP 0000000173e24540
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000076962ab1 5 bytes JMP 0000000173e24680
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 0000000076962d17 5 bytes JMP 0000000173e24360
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\USER32.dll!CreateWindowExW 00000000753f8a29 5 bytes JMP 0000000173e23a40
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\USER32.dll!EnumDisplayDevicesA 0000000075404572 5 bytes JMP 0000000173e242e0
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\USER32.dll!EnumDisplayDevicesW 000000007541e567 5 bytes JMP 0000000173e24350
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\USER32.dll!ChangeDisplaySettingsExW 00000000754407d7 5 bytes JMP 0000000173e23850
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\USER32.dll!DisplayConfigGetDeviceInfo 0000000075457a5c 5 bytes JMP 0000000173e242d0
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007669e96b 5 bytes JMP 0000000173e23b60
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007669eba5 5 bytes JMP 0000000173e23b80
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000076c65ea5 5 bytes JMP 0000000173e23a00
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[4536] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000076c99d0b 5 bytes JMP 0000000173e23990
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000775011f5 8 bytes {JMP 0xd}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 0000000077501390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007750143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 000000007750158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007750191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 0000000077501b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 0000000077501bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077501d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 0000000077501eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077501edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 0000000077501f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 0000000077501fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 0000000077501fd7 8 bytes {JMP 0xb}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 0000000077502272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 0000000077502301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 0000000077502792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000775027b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000775027d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007750282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 0000000077502890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077502d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 0000000077502d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 0000000077503023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007750323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000775033c0 16 bytes {JMP 0x4e}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077503a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077503ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077503b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 0000000077503d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077504190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077551380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077551500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077551530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077551650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077551700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077551d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077551f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000775527e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074fb13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074fb146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074fb16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000074fb16e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074fb19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074fb19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000074fb1a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000074fb1a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074fb1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000074fb1a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\kernel32.dll!RegQueryValueExW 00000000754f1f0e 7 bytes JMP 0000000173e24b10
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\kernel32.dll!RegSetValueExW 00000000754f5bad 7 bytes JMP 0000000173e254b0
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075501409 7 bytes JMP 0000000173e24e50
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\kernel32.dll!RegDeleteValueW 000000007550ea45 7 bytes JMP 0000000173e24b00
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 0000000075598e24 3 bytes JMP 0000000173e245c0
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx + 4 0000000075598e28 3 bytes [FE, CC, CC]
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 0000000075598ea9 5 bytes JMP 0000000173e24670
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000755991ff 5 bytes JMP 0000000173e245d0
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 0000000076961d29 5 bytes JMP 0000000173e24580
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 0000000076961dd7 5 bytes JMP 0000000173e24540
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000076962ab1 5 bytes JMP 0000000173e24680
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 0000000076962d17 5 bytes JMP 0000000173e24360
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\USER32.dll!CreateWindowExW 00000000753f8a29 5 bytes JMP 0000000173e23a40
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\USER32.dll!EnumDisplayDevicesA 0000000075404572 5 bytes JMP 0000000173e242e0
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\USER32.dll!EnumDisplayDevicesW 000000007541e567 5 bytes JMP 0000000173e24350
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\USER32.dll!ChangeDisplaySettingsExW 00000000754407d7 5 bytes JMP 0000000173e23850
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\USER32.dll!DisplayConfigGetDeviceInfo 0000000075457a5c 5 bytes JMP 0000000173e242d0
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007669e96b 5 bytes JMP 0000000173e23b60
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007669eba5 5 bytes JMP 0000000173e23b80
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000076c65ea5 5 bytes JMP 0000000173e23a00
.text C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnui.exe[4568] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000076c99d0b 5 bytes JMP 0000000173e23990
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\KERNEL32.dll!RegSetValueExW 00000000772ea400 7 bytes JMP 000000016fff0228
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\KERNEL32.dll!RegQueryValueExW 00000000772f3f20 5 bytes JMP 000000016fff0180
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\KERNEL32.dll!RegDeleteValueW 000000007730ffb0 5 bytes JMP 000000016fff01b8
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\KERNEL32.dll!K32GetMappedFileNameW 000000007731f2e0 5 bytes JMP 000000016fff0110
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\KERNEL32.dll!K32EnumProcessModulesEx 0000000077349a30 7 bytes JMP 000000016fff00d8
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\KERNEL32.dll!K32GetModuleInformation 00000000773594c0 5 bytes JMP 000000016fff0148
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\KERNEL32.dll!RegSetValueExA 00000000773787e0 7 bytes JMP 000000016fff01f0
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd3c2db0 5 bytes JMP 000007fffd3b0180
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd3c37d0 7 bytes JMP 000007fffd3b00d8
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd3c8ef0 6 bytes JMP 000007fffd3b0148
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd3daf60 5 bytes JMP 000007fffd3b0110
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefd9089f0 8 bytes JMP 000007fffd3b01f0
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefd90be50 8 bytes JMP 000007fffd3b01b8
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\ole32.dll!CoCreateInstance 000007fefee27490 11 bytes JMP 000007fffd3b0228
.text C:\Program Files\Alienware\Command Center\AWCCServiceController.exe[4584] C:\Windows\system32\ole32.dll!CoSetProxyBlanket 000007fefee3bf00 7 bytes JMP 000007fffd3b0260
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000775011f5 8 bytes {JMP 0xd}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 0000000077501390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007750143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 000000007750158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007750191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 0000000077501b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 0000000077501bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077501d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 0000000077501eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077501edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 0000000077501f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 0000000077501fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 0000000077501fd7 8 bytes {JMP 0xb}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 0000000077502272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 0000000077502301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 0000000077502792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000775027b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000775027d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007750282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 0000000077502890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077502d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 0000000077502d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 0000000077503023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007750323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000775033c0 16 bytes {JMP 0x4e}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077503a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077503ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077503b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 0000000077503d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077504190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077551380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077551500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077551530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077551650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077551700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077551d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077551f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000775527e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074fb13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074fb146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074fb16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000074fb16e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074fb19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074fb19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000074fb1a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000074fb1a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074fb1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000074fb1a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\kernel32.dll!RegQueryValueExW 00000000754f1f0e 7 bytes JMP 0000000173e24b10
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\kernel32.dll!RegSetValueExW 00000000754f5bad 7 bytes JMP 0000000173e254b0
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\kernel32.dll!RegSetValueExA 0000000075501409 7 bytes JMP 0000000173e24e50
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\kernel32.dll!RegDeleteValueW 000000007550ea45 7 bytes JMP 0000000173e24b00
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx 0000000075598e24 3 bytes JMP 0000000173e245c0
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\kernel32.dll!K32EnumProcessModulesEx + 4 0000000075598e28 3 bytes [FE, CC, CC]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\kernel32.dll!K32GetModuleInformation 0000000075598ea9 5 bytes JMP 0000000173e24670
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\kernel32.dll!K32GetMappedFileNameW 00000000755991ff 5 bytes JMP 0000000173e245d0
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 0000000076961d29 5 bytes JMP 0000000173e24580
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 0000000076961dd7 5 bytes JMP 0000000173e24540
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000076962ab1 5 bytes JMP 0000000173e24680
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 0000000076962d17 5 bytes JMP 0000000173e24360
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\USER32.dll!CreateWindowExW 00000000753f8a29 5 bytes JMP 0000000173e23a40
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\USER32.dll!EnumDisplayDevicesA 0000000075404572 5 bytes JMP 0000000173e242e0
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\USER32.dll!EnumDisplayDevicesW 000000007541e567 5 bytes JMP 0000000173e24350
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\USER32.dll!ChangeDisplaySettingsExW 00000000754407d7 5 bytes JMP 0000000173e23850
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\USER32.dll!DisplayConfigGetDeviceInfo 0000000075457a5c 5 bytes JMP 0000000173e242d0
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007669e96b 5 bytes JMP 0000000173e23b60
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007669eba5 5 bytes JMP 0000000173e23b80
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000076c65ea5 5 bytes JMP 0000000173e23a00
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000076c99d0b 5 bytes JMP 0000000173e23990
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075141465 2 bytes [14, 75]
.text C:\Program Files (x86)\Roxio\OEM\Roxio Burn\Roxio Burn.exe[5096] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000751414bb 2 bytes [14, 75]
.text ... * 2
? C:\Windows\system32\mssprxy.dll [5096] entry point in ".rdata" section 00000000655b71e6
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3896] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd3c2db0 5 bytes JMP 000007fffd3b0180
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3896] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd3c37d0 7 bytes JMP 000007fffd3b00d8
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3896] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd3c8ef0 6 bytes JMP 000007fffd3b0148
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3896] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd3daf60 5 bytes JMP 000007fffd3b0110
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3896] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefd9089f0 8 bytes JMP 000007fffd3b01f0
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3896] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefd90be50 8 bytes JMP 000007fffd3b01b8
.text C:\Windows\system32\Dwm.exe[4136] C:\Windows\system32\KERNELBASE.dll!FreeLibrary 000007fefd3c2db0 5 bytes JMP 000007fffd3b0180
.text C:\Windows\system32\Dwm.exe[4136] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleW 000007fefd3c37d0 7 bytes JMP 000007fffd3b00d8
.text C:\Windows\system32\Dwm.exe[4136] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW 000007fefd3c8ef0 6 bytes JMP 000007fffd3b0148
.text C:\Windows\system32\Dwm.exe[4136] C:\Windows\system32\KERNELBASE.dll!GetModuleHandleExW 000007fefd3daf60 5 bytes JMP 000007fffd3b0110
.text C:\Windows\system32\Dwm.exe[4136] C:\Windows\system32\GDI32.dll!D3DKMTQueryAdapterInfo 000007fefd9089f0 8 bytes JMP 000007fffd3b01f0
.text C:\Windows\system32\Dwm.exe[4136] C:\Windows\system32\GDI32.dll!D3DKMTGetDisplayModeList 000007fefd90be50 8 bytes JMP 000007fffd3b01b8
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000775011f5 8 bytes {JMP 0xd}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 0000000077501390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007750143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 000000007750158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007750191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 0000000077501b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 0000000077501bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077501d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 0000000077501eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077501edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 0000000077501f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 0000000077501fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 0000000077501fd7 8 bytes {JMP 0xb}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 0000000077502272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 0000000077502301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 0000000077502792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000775027b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000775027d2 8 bytes {JMP 0x10}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007750282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 0000000077502890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077502d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 0000000077502d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 0000000077503023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007750323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000775033c0 16 bytes {JMP 0x4e}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077503a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077503ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077503b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 0000000077503d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077504190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077551380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077551500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077551530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077551650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077551700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077551d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077551f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000775527e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074fb13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074fb146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074fb16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000074fb16e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074fb19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074fb19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000074fb1a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000074fb1a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074fb1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000074fb1a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNEL32.dll!RegQueryValueExW 00000000754f1f0e 7 bytes JMP 0000000173e24b10
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNEL32.dll!RegSetValueExW 00000000754f5bad 7 bytes JMP 0000000173e254b0
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNEL32.dll!RegSetValueExA 0000000075501409 7 bytes JMP 0000000173e24e50
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNEL32.dll!RegDeleteValueW 000000007550ea45 7 bytes JMP 0000000173e24b00
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNEL32.dll!K32EnumProcessModulesEx 0000000075598e24 3 bytes JMP 0000000173e245c0
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNEL32.dll!K32EnumProcessModulesEx + 4 0000000075598e28 3 bytes [FE, CC, CC]
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNEL32.dll!K32GetModuleInformation 0000000075598ea9 5 bytes JMP 0000000173e24670
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNEL32.dll!K32GetMappedFileNameW 00000000755991ff 5 bytes JMP 0000000173e245d0
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleW 0000000076961d29 5 bytes JMP 0000000173e24580
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNELBASE.dll!GetModuleHandleExW 0000000076961dd7 5 bytes JMP 0000000173e24540
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNELBASE.dll!LoadLibraryExW 0000000076962ab1 5 bytes JMP 0000000173e24680
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\KERNELBASE.dll!FreeLibrary 0000000076962d17 5 bytes JMP 0000000173e24360
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\GDI32.dll!D3DKMTGetDisplayModeList 000000007669e96b 5 bytes JMP 0000000173e23b60
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\GDI32.dll!D3DKMTQueryAdapterInfo 000000007669eba5 5 bytes JMP 0000000173e23b80
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\USER32.dll!CreateWindowExW 00000000753f8a29 5 bytes JMP 0000000173e23a40
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\USER32.dll!EnumDisplayDevicesA 0000000075404572 5 bytes JMP 0000000173e242e0
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\USER32.dll!EnumDisplayDevicesW 000000007541e567 5 bytes JMP 0000000173e24350
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\USER32.dll!ChangeDisplaySettingsExW 00000000754407d7 5 bytes JMP 0000000173e23850
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\USER32.dll!DisplayConfigGetDeviceInfo 0000000075457a5c 5 bytes JMP 0000000173e242d0
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\ole32.dll!CoSetProxyBlanket 0000000076c65ea5 5 bytes JMP 0000000173e23a00
.text C:\Program Files\Alienware\Command Center\AlienwareAlienFXController.exe[4996] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000076c99d0b 5 bytes JMP 0000000173e23990
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000775011f5 8 bytes {JMP 0xd}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 0000000077501390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007750143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 000000007750158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007750191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 0000000077501b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 0000000077501bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077501d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 0000000077501eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077501edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 0000000077501f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 0000000077501fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 0000000077501fd7 8 bytes {JMP 0xb}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 0000000077502272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 0000000077502301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 0000000077502792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000775027b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000775027d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007750282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 0000000077502890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077502d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 0000000077502d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 0000000077503023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007750323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000775033c0 16 bytes {JMP 0x4e}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077503a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077503ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077503b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 0000000077503d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077504190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077551380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077551500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077551530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077551650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077551700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077551d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077551f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000775527e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074fb13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074fb146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074fb16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000074fb16e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074fb19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074fb19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000074fb1a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000074fb1a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074fb1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[4416] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000074fb1a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000775011f5 8 bytes {JMP 0xd}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 0000000077501390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007750143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 000000007750158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007750191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 0000000077501b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 0000000077501bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077501d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 0000000077501eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077501edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 0000000077501f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 0000000077501fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 0000000077501fd7 8 bytes {JMP 0xb}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 0000000077502272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 0000000077502301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 0000000077502792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000775027b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000775027d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007750282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 0000000077502890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077502d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 0000000077502d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 0000000077503023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 000000007750323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000775033c0 16 bytes {JMP 0x4e}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 0000000077503a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 0000000077503ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 0000000077503b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 0000000077503d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 0000000077504190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 0000000077551380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 0000000077551500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077551530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000077551650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 0000000077551700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000077551d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 0000000077551f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000775527e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074fb13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074fb146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074fb16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000074fb16e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074fb19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074fb19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000074fb1a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000074fb1a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074fb1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[2344] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000074fb1a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000775011f5 8 bytes {JMP 0xd}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 0000000077501390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 000000007750143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 000000007750158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 000000007750191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 0000000077501b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 0000000077501bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077501d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 0000000077501eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077501edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 0000000077501f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 0000000077501fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 0000000077501fd7 8 bytes {JMP 0xb}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 0000000077502272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 0000000077502301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 0000000077502792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000775027b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000775027d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 000000007750282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 0000000077502890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 0000000077502d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5844] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 0000000077502d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ...
|