IT-Laie01 | 10.06.2015 09:10 | Code:
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\KERNEL32.dll!CreateProcessInternalW 00007ffc16980070 6 bytes {JMP QWORD [RIP+0x14ffc0]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 198 00007ffc15718e46 3 bytes [C4, 71, 27]
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\USER32.dll!SendInput 00007ffc16541240 6 bytes {JMP QWORD [RIP+0x4dedf0]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\USER32.dll!PostMessageW 00007ffc165433f0 6 bytes {JMP QWORD [RIP+0x55cc40]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\USER32.dll!SendMessageW 00007ffc16545720 6 bytes {JMP QWORD [RIP+0x51a910]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\USER32.dll!mouse_event 00007ffc16549f00 6 bytes {JMP QWORD [RIP+0x496130]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\USER32.dll!PostMessageA 00007ffc16565920 6 bytes {JMP QWORD [RIP+0x51a710]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\USER32.dll!SendMessageA 00007ffc16566190 6 bytes {JMP QWORD [RIP+0x4d9ea0]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\USER32.dll!keybd_event 00007ffc165c9620 6 bytes {JMP QWORD [RIP+0x436a10]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\ADVAPI32.dll!CreateServiceA 00007ffc1588dd10 6 bytes {JMP QWORD [RIP+0x152320]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\ADVAPI32.dll!CreateServiceW 00007ffc1588dda0 6 bytes {JMP QWORD [RIP+0x422290]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\ws2_32.dll!WSALookupServiceBeginW 00007ffc164e4aa0 6 bytes {JMP QWORD [RIP+0x65b590]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\ws2_32.dll!connect + 1 00007ffc164e5731 5 bytes {JMP QWORD [RIP+0x5fa900]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\ws2_32.dll!listen 00007ffc164f6280 6 bytes {JMP QWORD [RIP+0x629db0]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe[3756] C:\Windows\system32\ws2_32.dll!WSAConnect 00007ffc164f6fe0 6 bytes {JMP QWORD [RIP+0x609050]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 132 00007ffc181c4b04 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlPrefixString + 316 00007ffc181c4f2c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!TpAllocIoCompletion + 710 00007ffc181c5206 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlWaitForWnfMetaNotification + 479 00007ffc181c53ff 8 bytes {JMP 0xffffffffffffffee}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlUserThreadStart + 911 00007ffc181c579f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!TpAllocWork + 420 00007ffc181c5954 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlWaitOnAddress + 657 00007ffc181c5ef1 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlUnsubscribeWnfNotificationWaitForCompletion + 78 00007ffc181c5f4e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlWakeAddressAll + 399 00007ffc181c60ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlUnsubscribeWnfStateChangeNotification + 977 00007ffc181c64d1 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!TpSimpleTryPost + 310 00007ffc181c6616 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!TpSimpleTryPost + 491 00007ffc181c66cb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlReportSilentProcessExit + 359 00007ffc181c8397 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!LdrFindEntryForAddress + 67 00007ffc181c8a13 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!LdrFindEntryForAddress + 864 00007ffc181c8d30 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!LdrGetDllHandleByName + 143 00007ffc181c8e9f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!LdrInitializeThunk + 510 00007ffc181c90ae 8 bytes {JMP 0xffffffffffffff96}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!LdrInitializeThunk + 715 00007ffc181c917b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlQueueWorkItem + 772 00007ffc181c9d14 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!LdrAddRefDll + 685 00007ffc181c9fcd 8 bytes {JMP 0xffffffffffffffaf}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 352 00007ffc181caae0 8 bytes {JMP 0xffffffffffffffcd}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 488 00007ffc181cab68 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlGetVersion + 565 00007ffc181cb2e5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 78 00007ffc181cb33e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll + 311 00007ffc181cc4d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll + 528 00007ffc181cc5b0 8 bytes {JMP 0xffffffffffffffc7}
.text ... * 2
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 579 00007ffc181cd0d3 8 bytes {JMP 0xffffffffffffffef}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlFreeThreadActivationContextStack + 47 00007ffc181cd10f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlProcessFlsData + 495 00007ffc181cd57f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlDetectHeapLeaks + 43 00007ffc181cd6eb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlDetectHeapLeaks + 456 00007ffc181cd888 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseWait + 180 00007ffc181cd944 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffc181cdba4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!TpAllocWait + 424 00007ffc181cdd58 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!TpSetWaitEx + 771 00007ffc181ce073 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!TpSetWaitEx + 948 00007ffc181ce124 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffc181ce160 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlRandomEx + 756 00007ffc181ceb74 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteFunctionTable + 371 00007ffc181cfe63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlAddFunctionTable + 556 00007ffc181d009c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlProtectHeap + 171 00007ffc181d015b 8 bytes [70, 6C, D4, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 744 00007ffc181d1438 8 bytes [40, 6C, D4, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsW + 214 00007ffc181d15e6 8 bytes [30, 6C, D4, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!EtwNotificationRegister + 567 00007ffc181d1877 8 bytes [20, 6C, D4, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 429 00007ffc181d1a2d 8 bytes [10, 6C, D4, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!RtlRunOnceExecuteOnce + 213 00007ffc181d1c35 8 bytes [00, 6C, D4, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffc18241290 8 bytes {JMP QWORD [RIP-0x6fe5e]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffc18241410 8 bytes {JMP QWORD [RIP-0x6fe30]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffc18241440 8 bytes {JMP QWORD [RIP-0x712eb]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffc18241560 8 bytes {JMP QWORD [RIP-0x70c1e]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffc18241610 8 bytes {JMP QWORD [RIP-0x71122]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffc18241cd0 8 bytes {JMP QWORD [RIP-0x700a1]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffc18241fd0 8 bytes {JMP QWORD [RIP-0x705a9]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffc18242850 8 bytes {JMP QWORD [RIP-0x70fdf]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 438 00000000774a13f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 387 00000000774a1583 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000774a1621 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 00000000774a1674 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000774a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 9 00000000774a16e9 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 71 00000000774a1727 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 7
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000774a25d0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000774a2714 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 529 00000000774a2961 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[113716] C:\Windows\system32\wow64cpu.dll!CpuProcessTerm + 595 00000000774a2bd3 8 bytes [DC, 6A, D4, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\KERNEL32.DLL!CreateProcessInternalW 00007ffc16980070 6 bytes {JMP QWORD [RIP+0x14ffc0]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 198 00007ffc15718e46 3 bytes [C4, 71, 27]
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\USER32.dll!SendInput 00007ffc16541240 6 bytes {JMP QWORD [RIP+0x4dedf0]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\USER32.dll!PostMessageW 00007ffc165433f0 6 bytes {JMP QWORD [RIP+0x55cc40]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\USER32.dll!SendMessageW 00007ffc16545720 6 bytes {JMP QWORD [RIP+0x51a910]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\USER32.dll!mouse_event 00007ffc16549f00 6 bytes {JMP QWORD [RIP+0x496130]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\USER32.dll!PostMessageA 00007ffc16565920 6 bytes {JMP QWORD [RIP+0x51a710]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\USER32.dll!SendMessageA 00007ffc16566190 6 bytes {JMP QWORD [RIP+0x4d9ea0]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\USER32.dll!keybd_event 00007ffc165c9620 6 bytes {JMP QWORD [RIP+0x436a10]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\ADVAPI32.dll!CreateServiceA 00007ffc1588dd10 6 bytes {JMP QWORD [RIP+0x152320]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\ADVAPI32.dll!CreateServiceW 00007ffc1588dda0 6 bytes {JMP QWORD [RIP+0x422290]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\WS2_32.dll!WSALookupServiceBeginW 00007ffc164e4aa0 6 bytes {JMP QWORD [RIP+0x65b590]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\WS2_32.dll!connect + 1 00007ffc164e5731 5 bytes {JMP QWORD [RIP+0x5fa900]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\WS2_32.dll!listen 00007ffc164f6280 6 bytes {JMP QWORD [RIP+0x629db0]}
.text C:\Program Files (x86)\Raptr\raptr_ep64.exe[33744] C:\Windows\system32\WS2_32.dll!WSAConnect 00007ffc164f6fe0 6 bytes {JMP QWORD [RIP+0x609050]}
.text C:\Windows\System32\SettingSyncHost.exe[37232] C:\Windows\system32\KERNEL32.DLL!CreateProcessInternalW 00007ffc16980070 6 bytes {JMP QWORD [RIP+0x14ffc0]}
.text C:\Windows\System32\SettingSyncHost.exe[37232] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 198 00007ffc15718e46 3 bytes [C4, 71, 27]
.text C:\Windows\System32\SettingSyncHost.exe[37232] C:\Windows\SYSTEM32\advapi32.dll!CreateServiceA 00007ffc1588dd10 6 bytes {JMP QWORD [RIP+0x152320]}
.text C:\Windows\System32\SettingSyncHost.exe[37232] C:\Windows\SYSTEM32\advapi32.dll!CreateServiceW 00007ffc1588dda0 6 bytes {JMP QWORD [RIP+0x422290]}
.text C:\Windows\System32\SettingSyncHost.exe[37232] C:\Windows\system32\USER32.dll!SendInput 00007ffc16541240 6 bytes {JMP QWORD [RIP+0x4dedf0]}
.text C:\Windows\System32\SettingSyncHost.exe[37232] C:\Windows\system32\USER32.dll!PostMessageW 00007ffc165433f0 6 bytes {JMP QWORD [RIP+0x55cc40]}
.text C:\Windows\System32\SettingSyncHost.exe[37232] C:\Windows\system32\USER32.dll!SendMessageW 00007ffc16545720 6 bytes {JMP QWORD [RIP+0x51a910]}
.text C:\Windows\System32\SettingSyncHost.exe[37232] C:\Windows\system32\USER32.dll!mouse_event 00007ffc16549f00 6 bytes {JMP QWORD [RIP+0x496130]}
.text C:\Windows\System32\SettingSyncHost.exe[37232] C:\Windows\system32\USER32.dll!PostMessageA 00007ffc16565920 6 bytes {JMP QWORD [RIP+0x51a710]}
.text C:\Windows\System32\SettingSyncHost.exe[37232] C:\Windows\system32\USER32.dll!SendMessageA 00007ffc16566190 6 bytes {JMP QWORD [RIP+0x4d9ea0]}
.text C:\Windows\System32\SettingSyncHost.exe[37232] C:\Windows\system32\USER32.dll!keybd_event 00007ffc165c9620 6 bytes {JMP QWORD [RIP+0x436a10]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\KERNEL32.dll!CreateProcessInternalW 00007ffc16980070 6 bytes {JMP QWORD [RIP+0x14ffc0]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\KERNELBASE.dll!LoadLibraryExW + 198 00007ffc15718e46 3 bytes [C4, 71, 27]
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\USER32.dll!SendInput 00007ffc16541240 6 bytes {JMP QWORD [RIP+0x4dedf0]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\USER32.dll!PostMessageW 00007ffc165433f0 6 bytes {JMP QWORD [RIP+0x55cc40]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\USER32.dll!SendMessageW 00007ffc16545720 6 bytes {JMP QWORD [RIP+0x51a910]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\USER32.dll!mouse_event 00007ffc16549f00 6 bytes {JMP QWORD [RIP+0x496130]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\USER32.dll!PostMessageA 00007ffc16565920 6 bytes {JMP QWORD [RIP+0x51a710]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\USER32.dll!SendMessageA 00007ffc16566190 6 bytes {JMP QWORD [RIP+0x4d9ea0]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\USER32.dll!keybd_event 00007ffc165c9620 6 bytes {JMP QWORD [RIP+0x436a10]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\ADVAPI32.dll!CreateServiceA 00007ffc1588dd10 6 bytes {JMP QWORD [RIP+0x152320]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\ADVAPI32.dll!CreateServiceW 00007ffc1588dda0 6 bytes {JMP QWORD [RIP+0x422290]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\ws2_32.dll!WSALookupServiceBeginW 00007ffc164e4aa0 6 bytes {JMP QWORD [RIP+0x65b590]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\ws2_32.dll!connect + 1 00007ffc164e5731 5 bytes {JMP QWORD [RIP+0x5fa900]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\ws2_32.dll!listen 00007ffc164f6280 6 bytes {JMP QWORD [RIP+0x629db0]}
.text C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe[28604] C:\Windows\system32\ws2_32.dll!WSAConnect 00007ffc164f6fe0 6 bytes {JMP QWORD [RIP+0x609050]}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 132 00007ffc181c4b04 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlPrefixString + 316 00007ffc181c4f2c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!TpAllocIoCompletion + 710 00007ffc181c5206 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlWaitForWnfMetaNotification + 479 00007ffc181c53ff 8 bytes {JMP 0xffffffffffffffee}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlUserThreadStart + 911 00007ffc181c579f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!TpAllocWork + 420 00007ffc181c5954 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlWaitOnAddress + 657 00007ffc181c5ef1 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlUnsubscribeWnfNotificationWaitForCompletion + 78 00007ffc181c5f4e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlWakeAddressAll + 399 00007ffc181c60ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlUnsubscribeWnfStateChangeNotification + 977 00007ffc181c64d1 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!TpSimpleTryPost + 310 00007ffc181c6616 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!TpSimpleTryPost + 491 00007ffc181c66cb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlReportSilentProcessExit + 359 00007ffc181c8397 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!LdrFindEntryForAddress + 67 00007ffc181c8a13 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!LdrFindEntryForAddress + 864 00007ffc181c8d30 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!LdrGetDllHandleByName + 143 00007ffc181c8e9f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!LdrInitializeThunk + 510 00007ffc181c90ae 8 bytes {JMP 0xffffffffffffff96}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!LdrInitializeThunk + 715 00007ffc181c917b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlQueueWorkItem + 772 00007ffc181c9d14 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!LdrAddRefDll + 685 00007ffc181c9fcd 8 bytes {JMP 0xffffffffffffffaf}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 352 00007ffc181caae0 8 bytes {JMP 0xffffffffffffffcd}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 488 00007ffc181cab68 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlGetVersion + 565 00007ffc181cb2e5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 78 00007ffc181cb33e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll + 311 00007ffc181cc4d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll + 528 00007ffc181cc5b0 8 bytes {JMP 0xffffffffffffffc7}
.text ... * 2
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 579 00007ffc181cd0d3 8 bytes {JMP 0xffffffffffffffef}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlFreeThreadActivationContextStack + 47 00007ffc181cd10f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlProcessFlsData + 495 00007ffc181cd57f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlDetectHeapLeaks + 43 00007ffc181cd6eb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlDetectHeapLeaks + 456 00007ffc181cd888 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseWait + 180 00007ffc181cd944 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffc181cdba4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!TpAllocWait + 424 00007ffc181cdd58 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!TpSetWaitEx + 771 00007ffc181ce073 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!TpSetWaitEx + 948 00007ffc181ce124 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffc181ce160 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlRandomEx + 756 00007ffc181ceb74 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteFunctionTable + 371 00007ffc181cfe63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlAddFunctionTable + 556 00007ffc181d009c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlProtectHeap + 171 00007ffc181d015b 8 bytes [70, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 744 00007ffc181d1438 8 bytes [40, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsW + 214 00007ffc181d15e6 8 bytes [30, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!EtwNotificationRegister + 567 00007ffc181d1877 8 bytes [20, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 429 00007ffc181d1a2d 8 bytes [10, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!RtlRunOnceExecuteOnce + 213 00007ffc181d1c35 8 bytes [00, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffc18241290 8 bytes {JMP QWORD [RIP-0x6fe5e]}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffc18241410 8 bytes {JMP QWORD [RIP-0x6fe30]}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffc18241440 8 bytes {JMP QWORD [RIP-0x712eb]}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffc18241560 8 bytes {JMP QWORD [RIP-0x70c1e]}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffc18241610 8 bytes {JMP QWORD [RIP-0x71122]}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffc18241cd0 8 bytes {JMP QWORD [RIP-0x700a1]}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffc18241fd0 8 bytes {JMP QWORD [RIP-0x705a9]}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffc18242850 8 bytes {JMP QWORD [RIP-0x70fdf]}
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 438 00000000774a13f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 387 00000000774a1583 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000774a1621 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 00000000774a1674 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000774a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 9 00000000774a16e9 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 71 00000000774a1727 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 7
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000774a25d0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000774a2714 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 529 00000000774a2961 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Nuance\PDF Viewer Plus\pdfpro5hook.exe[101176] C:\Windows\system32\wow64cpu.dll!CpuProcessTerm + 595 00000000774a2bd3 8 bytes [DC, 6A, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Update\Install\{7D12F395-4038-4AE4-9B22-EF7F9CBA7578}\43.0.2357.124_43.0.2357.81_chrome_updater.exe[49652] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 438 00000000774a13f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{7D12F395-4038-4AE4-9B22-EF7F9CBA7578}\43.0.2357.124_43.0.2357.81_chrome_updater.exe[49652] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 387 00000000774a1583 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{7D12F395-4038-4AE4-9B22-EF7F9CBA7578}\43.0.2357.124_43.0.2357.81_chrome_updater.exe[49652] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000774a1621 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{7D12F395-4038-4AE4-9B22-EF7F9CBA7578}\43.0.2357.124_43.0.2357.81_chrome_updater.exe[49652] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 00000000774a1674 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{7D12F395-4038-4AE4-9B22-EF7F9CBA7578}\43.0.2357.124_43.0.2357.81_chrome_updater.exe[49652] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000774a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{7D12F395-4038-4AE4-9B22-EF7F9CBA7578}\43.0.2357.124_43.0.2357.81_chrome_updater.exe[49652] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 9 00000000774a16e9 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{7D12F395-4038-4AE4-9B22-EF7F9CBA7578}\43.0.2357.124_43.0.2357.81_chrome_updater.exe[49652] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 71 00000000774a1727 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 7
.text C:\Program Files (x86)\Google\Update\Install\{7D12F395-4038-4AE4-9B22-EF7F9CBA7578}\43.0.2357.124_43.0.2357.81_chrome_updater.exe[49652] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000774a25d0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{7D12F395-4038-4AE4-9B22-EF7F9CBA7578}\43.0.2357.124_43.0.2357.81_chrome_updater.exe[49652] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000774a2714 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{7D12F395-4038-4AE4-9B22-EF7F9CBA7578}\43.0.2357.124_43.0.2357.81_chrome_updater.exe[49652] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 529 00000000774a2961 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{7D12F395-4038-4AE4-9B22-EF7F9CBA7578}\43.0.2357.124_43.0.2357.81_chrome_updater.exe[49652] Code:
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 132 00007ffc181c4b04 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlPrefixString + 316 00007ffc181c4f2c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!TpAllocIoCompletion + 710 00007ffc181c5206 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlWaitForWnfMetaNotification + 479 00007ffc181c53ff 8 bytes {JMP 0xffffffffffffffee}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlUserThreadStart + 911 00007ffc181c579f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!TpAllocWork + 420 00007ffc181c5954 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlWaitOnAddress + 657 00007ffc181c5ef1 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlUnsubscribeWnfNotificationWaitForCompletion + 78 00007ffc181c5f4e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlWakeAddressAll + 399 00007ffc181c60ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlUnsubscribeWnfStateChangeNotification + 977 00007ffc181c64d1 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!TpSimpleTryPost + 310 00007ffc181c6616 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!TpSimpleTryPost + 491 00007ffc181c66cb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlReportSilentProcessExit + 359 00007ffc181c8397 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!LdrFindEntryForAddress + 67 00007ffc181c8a13 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!LdrFindEntryForAddress + 864 00007ffc181c8d30 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!LdrGetDllHandleByName + 143 00007ffc181c8e9f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!LdrInitializeThunk + 510 00007ffc181c90ae 8 bytes {JMP 0xffffffffffffff96}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!LdrInitializeThunk + 715 00007ffc181c917b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlQueueWorkItem + 772 00007ffc181c9d14 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!LdrAddRefDll + 685 00007ffc181c9fcd 8 bytes {JMP 0xffffffffffffffaf}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 352 00007ffc181caae0 8 bytes {JMP 0xffffffffffffffcd}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 488 00007ffc181cab68 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlGetVersion + 565 00007ffc181cb2e5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 78 00007ffc181cb33e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll + 311 00007ffc181cc4d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll + 528 00007ffc181cc5b0 8 bytes {JMP 0xffffffffffffffc7}
.text ... * 2
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 579 00007ffc181cd0d3 8 bytes {JMP 0xffffffffffffffef}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlFreeThreadActivationContextStack + 47 00007ffc181cd10f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlProcessFlsData + 495 00007ffc181cd57f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlDetectHeapLeaks + 43 00007ffc181cd6eb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlDetectHeapLeaks + 456 00007ffc181cd888 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseWait + 180 00007ffc181cd944 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffc181cdba4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!TpAllocWait + 424 00007ffc181cdd58 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!TpSetWaitEx + 771 00007ffc181ce073 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!TpSetWaitEx + 948 00007ffc181ce124 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffc181ce160 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlRandomEx + 756 00007ffc181ceb74 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteFunctionTable + 371 00007ffc181cfe63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlAddFunctionTable + 556 00007ffc181d009c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlProtectHeap + 171 00007ffc181d015b 8 bytes [70, 6C, 2D, FF, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 744 00007ffc181d1438 8 bytes [40, 6C, 2D, FF, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsW + 214 00007ffc181d15e6 8 bytes [30, 6C, 2D, FF, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!EtwNotificationRegister + 567 00007ffc181d1877 8 bytes [20, 6C, 2D, FF, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 429 00007ffc181d1a2d 8 bytes [10, 6C, 2D, FF, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!RtlRunOnceExecuteOnce + 213 00007ffc181d1c35 8 bytes [00, 6C, 2D, FF, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffc18241290 8 bytes {JMP QWORD [RIP-0x6fe5e]}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffc18241410 8 bytes {JMP QWORD [RIP-0x6fe30]}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffc18241440 8 bytes {JMP QWORD [RIP-0x712eb]}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffc18241560 8 bytes {JMP QWORD [RIP-0x70c1e]}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffc18241610 8 bytes {JMP QWORD [RIP-0x71122]}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffc18241cd0 8 bytes {JMP QWORD [RIP-0x700a1]}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffc18241fd0 8 bytes {JMP QWORD [RIP-0x705a9]}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffc18242850 8 bytes {JMP QWORD [RIP-0x70fdf]}
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 438 00000000774a13f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 387 00000000774a1583 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000774a1621 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 00000000774a1674 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000774a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 9 00000000774a16e9 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 71 00000000774a1727 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 7
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000774a25d0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000774a2714 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 529 00000000774a2961 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_FFD44.tmp\setup.exe[81320] C:\Windows\system32\wow64cpu.dll!CpuProcessTerm + 595 00000000774a2bd3 8 bytes [DC, 6A, 2D, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Google\Update\Install\{A54C3021-1E9F-46AD-86A1-5C9B073A588F}\43.0.2357.124_chrome_installer.exe[155380] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 438 00000000774a13f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{A54C3021-1E9F-46AD-86A1-5C9B073A588F}\43.0.2357.124_chrome_installer.exe[155380] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 387 00000000774a1583 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{A54C3021-1E9F-46AD-86A1-5C9B073A588F}\43.0.2357.124_chrome_installer.exe[155380] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000774a1621 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{A54C3021-1E9F-46AD-86A1-5C9B073A588F}\43.0.2357.124_chrome_installer.exe[155380] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 00000000774a1674 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{A54C3021-1E9F-46AD-86A1-5C9B073A588F}\43.0.2357.124_chrome_installer.exe[155380] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000774a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{A54C3021-1E9F-46AD-86A1-5C9B073A588F}\43.0.2357.124_chrome_installer.exe[155380] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 9 00000000774a16e9 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{A54C3021-1E9F-46AD-86A1-5C9B073A588F}\43.0.2357.124_chrome_installer.exe[155380] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 71 00000000774a1727 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 7
.text C:\Program Files (x86)\Google\Update\Install\{A54C3021-1E9F-46AD-86A1-5C9B073A588F}\43.0.2357.124_chrome_installer.exe[155380] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000774a25d0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{A54C3021-1E9F-46AD-86A1-5C9B073A588F}\43.0.2357.124_chrome_installer.exe[155380] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000774a2714 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{A54C3021-1E9F-46AD-86A1-5C9B073A588F}\43.0.2357.124_chrome_installer.exe[155380] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 529 00000000774a2961 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Google\Update\Install\{A54C3021-1E9F-46AD-86A1-5C9B073A588F}\43.0.2357.124_chrome_installer.exe[155380] C:\Windows\system32\wow64cpu.dll!CpuProcessTerm + 595 00000000774a2bd3 8 bytes [DC, 6A, F8, 7F, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 132 00007ffc181c4b04 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlPrefixString + 316 00007ffc181c4f2c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!TpAllocIoCompletion + 710 00007ffc181c5206 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlWaitForWnfMetaNotification + 479 00007ffc181c53ff 8 bytes {JMP 0xffffffffffffffee}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlUserThreadStart + 911 00007ffc181c579f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!TpAllocWork + 420 00007ffc181c5954 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlWaitOnAddress + 657 00007ffc181c5ef1 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlUnsubscribeWnfNotificationWaitForCompletion + 78 00007ffc181c5f4e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlWakeAddressAll + 399 00007ffc181c60ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlUnsubscribeWnfStateChangeNotification + 977 00007ffc181c64d1 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!TpSimpleTryPost + 310 00007ffc181c6616 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!TpSimpleTryPost + 491 00007ffc181c66cb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlReportSilentProcessExit + 359 00007ffc181c8397 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!LdrFindEntryForAddress + 67 00007ffc181c8a13 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!LdrFindEntryForAddress + 864 00007ffc181c8d30 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!LdrGetDllHandleByName + 143 00007ffc181c8e9f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!LdrInitializeThunk + 510 00007ffc181c90ae 8 bytes {JMP 0xffffffffffffff96}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!LdrInitializeThunk + 715 00007ffc181c917b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlQueueWorkItem + 772 00007ffc181c9d14 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!LdrAddRefDll + 685 00007ffc181c9fcd 8 bytes {JMP 0xffffffffffffffaf}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 352 00007ffc181caae0 8 bytes {JMP 0xffffffffffffffcd}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 488 00007ffc181cab68 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlGetVersion + 565 00007ffc181cb2e5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 78 00007ffc181cb33e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll + 311 00007ffc181cc4d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll + 528 00007ffc181cc5b0 8 bytes {JMP 0xffffffffffffffc7}
.text ... * 2
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 579 00007ffc181cd0d3 8 bytes {JMP 0xffffffffffffffef}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlFreeThreadActivationContextStack + 47 00007ffc181cd10f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlProcessFlsData + 495 00007ffc181cd57f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlDetectHeapLeaks + 43 00007ffc181cd6eb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlDetectHeapLeaks + 456 00007ffc181cd888 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseWait + 180 00007ffc181cd944 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffc181cdba4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!TpAllocWait + 424 00007ffc181cdd58 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!TpSetWaitEx + 771 00007ffc181ce073 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!TpSetWaitEx + 948 00007ffc181ce124 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffc181ce160 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlRandomEx + 756 00007ffc181ceb74 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteFunctionTable + 371 00007ffc181cfe63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlAddFunctionTable + 556 00007ffc181d009c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlProtectHeap + 171 00007ffc181d015b 8 bytes [70, 6C, F6, FE, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 744 00007ffc181d1438 8 bytes [40, 6C, F6, FE, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsW + 214 00007ffc181d15e6 8 bytes [30, 6C, F6, FE, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!EtwNotificationRegister + 567 00007ffc181d1877 8 bytes [20, 6C, F6, FE, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 429 00007ffc181d1a2d 8 bytes [10, 6C, F6, FE, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!RtlRunOnceExecuteOnce + 213 00007ffc181d1c35 8 bytes [00, 6C, F6, FE, 00, 00, 00, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffc18241290 8 bytes {JMP QWORD [RIP-0x6fe5e]}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffc18241410 8 bytes {JMP QWORD [RIP-0x6fe30]}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffc18241440 8 bytes {JMP QWORD [RIP-0x712eb]}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffc18241560 8 bytes {JMP QWORD [RIP-0x70c1e]}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffc18241610 8 bytes {JMP QWORD [RIP-0x71122]}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffc18241cd0 8 bytes {JMP QWORD [RIP-0x700a1]}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffc18241fd0 8 bytes {JMP QWORD [RIP-0x705a9]}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffc18242850 8 bytes {JMP QWORD [RIP-0x70fdf]}
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 438 00000000774a13f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 387 00000000774a1583 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000774a1621 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 00000000774a1674 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000774a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 9 00000000774a16e9 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 71 00000000774a1727 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 7
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000774a25d0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000774a2714 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 529 00000000774a2961 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Windows\TEMP\CR_B4A01.tmp\setup.exe[10384] C:\Windows\system32\wow64cpu.dll!CpuProcessTerm + 595 00000000774a2bd3 8 bytes [DC, 6A, F6, FE, 00, 00, 00, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 132 00007ffc181c4b04 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlPrefixString + 316 00007ffc181c4f2c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!TpAllocIoCompletion + 710 00007ffc181c5206 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlWaitForWnfMetaNotification + 479 00007ffc181c53ff 8 bytes {JMP 0xffffffffffffffee}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlUserThreadStart + 911 00007ffc181c579f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!TpAllocWork + 420 00007ffc181c5954 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlWaitOnAddress + 657 00007ffc181c5ef1 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlUnsubscribeWnfNotificationWaitForCompletion + 78 00007ffc181c5f4e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlWakeAddressAll + 399 00007ffc181c60ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlUnsubscribeWnfStateChangeNotification + 977 00007ffc181c64d1 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!TpSimpleTryPost + 310 00007ffc181c6616 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!TpSimpleTryPost + 491 00007ffc181c66cb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlReportSilentProcessExit + 359 00007ffc181c8397 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!LdrFindEntryForAddress + 67 00007ffc181c8a13 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!LdrFindEntryForAddress + 864 00007ffc181c8d30 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!LdrGetDllHandleByName + 143 00007ffc181c8e9f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!LdrInitializeThunk + 510 00007ffc181c90ae 8 bytes {JMP 0xffffffffffffff96}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!LdrInitializeThunk + 715 00007ffc181c917b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlQueueWorkItem + 772 00007ffc181c9d14 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!LdrAddRefDll + 685 00007ffc181c9fcd 8 bytes {JMP 0xffffffffffffffaf}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 352 00007ffc181caae0 8 bytes {JMP 0xffffffffffffffcd}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!SbSelectProcedure + 488 00007ffc181cab68 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlGetVersion + 565 00007ffc181cb2e5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlGetNtProductType + 78 00007ffc181cb33e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll + 311 00007ffc181cc4d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll + 528 00007ffc181cc5b0 8 bytes {JMP 0xffffffffffffffc7}
.text ... * 2
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 579 00007ffc181cd0d3 8 bytes {JMP 0xffffffffffffffef}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlFreeThreadActivationContextStack + 47 00007ffc181cd10f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlProcessFlsData + 495 00007ffc181cd57f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlDetectHeapLeaks + 43 00007ffc181cd6eb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlDetectHeapLeaks + 456 00007ffc181cd888 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseWait + 180 00007ffc181cd944 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffc181cdba4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!TpAllocWait + 424 00007ffc181cdd58 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!TpSetWaitEx + 771 00007ffc181ce073 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!TpSetWaitEx + 948 00007ffc181ce124 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffc181ce160 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlRandomEx + 756 00007ffc181ceb74 8 bytes {JMP 0xffffffffffffffd0}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteFunctionTable + 371 00007ffc181cfe63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlAddFunctionTable + 556 00007ffc181d009c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlProtectHeap + 171 00007ffc181d015b 8 bytes [70, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 744 00007ffc181d1438 8 bytes [40, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsW + 214 00007ffc181d15e6 8 bytes [30, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!EtwNotificationRegister + 567 00007ffc181d1877 8 bytes [20, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 429 00007ffc181d1a2d 8 bytes [10, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!RtlRunOnceExecuteOnce + 213 00007ffc181d1c35 8 bytes [00, 6C, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffc18241290 8 bytes {JMP QWORD [RIP-0x6fe5e]}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffc18241410 8 bytes {JMP QWORD [RIP-0x6fe30]}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffc18241440 8 bytes {JMP QWORD [RIP-0x712eb]}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffc18241560 8 bytes {JMP QWORD [RIP-0x70c1e]}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffc18241610 8 bytes {JMP QWORD [RIP-0x71122]}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffc18241cd0 8 bytes {JMP QWORD [RIP-0x700a1]}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffc18241fd0 8 bytes {JMP QWORD [RIP-0x705a9]}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffc18242850 8 bytes {JMP QWORD [RIP-0x70fdf]}
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\system32\wow64cpu.dll!CpuSetContext + 438 00000000774a13f6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\system32\wow64cpu.dll!CpuGetContext + 387 00000000774a1583 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 00000000774a1621 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\system32\wow64cpu.dll!CpuProcessInit + 68 00000000774a1674 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000774a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 9 00000000774a16e9 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\system32\wow64cpu.dll!CpuNotifyAffinityChange + 71 00000000774a1727 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 7
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 00000000774a25d0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 00000000774a2714 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\system32\wow64cpu.dll!CpuResetToConsistentState + 529 00000000774a2961 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Frank\Downloads\Gmer-19357.exe[20088] C:\Windows\system32\wow64cpu.dll!CpuProcessTerm + 595 00000000774a2bd3 8 bytes [DC, 6A, F8, 7F, 00, 00, 00, ...]
---- Threads - GMER 2.1 ----
Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [7872:7956] 00007ffc166c5aa0
Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [7872:8184] 00007ffc158f0b70
Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [7872:7276] 00007ffc15f812c0
Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [7872:102792] 00007ffc15f812c0
Thread C:\Windows\system32\csrss.exe [164644:95016] fffff960008f62d0
---- Disk sectors - GMER 2.1 ----
Disk \Device\Harddisk0\DR0 unknown MBR code
---- EOF - GMER 2.1 ---- |