RtlpHpVaMgrRangeCreate at 7ffb6492dd70 RtlFindLastBackwardRunClear at 7ffb6495bcb0 EtwDeliverDataBlock at 7ffb648e7fd0 RtlpInitializeStaticCriticalSection at 7ffb64961de0 RtlpTpWorkCallback at 7ffb6490f570 RtlUnicodeStringToOemString$fin$0 at 7ffb64984613 RtlpQueryExtendedInformationHeap at 7ffb649565d0 TppCleanupGroupMemberInitialize$fin$1 at 7ffb6498408f TppCleanupGroupMemberInitialize$fin$0 at 7ffb64984067 TppCleanupGroupMemberInitialize$fin$3 at 7ffb64984122 TppCleanupGroupMemberInitialize$fin$2 at 7ffb649840ac SbpDetermineDllContext at 7ffb6490c7d0 LdrEnumerateLoadedModules at 7ffb64953760 TppCallbackCheckThreadAfterCallback at 7ffb64915590 IsProgramFilesPath at 7ffb6493baec LdrpVerifyAlternateResourceModuleEx at 7ffb64939634 RtlDeleteUmsCompletionList$fin$0 at 7ffb649d37bb LdrpLogDllStateEx2 at 7ffb64912218 RtlGetVersion at 7ffb6490d2b0 RtlCompareString at 7ffb649693c0 RtlpCreateWnfUserSubscription at 7ffb648ea204 RtlImageRvaToVa at 7ffb64964b20 LdrpConvertLangFallbackListToMultiSz at 7ffb648f4248 RtlpHpSegGetDescriptorValidateSafe$filt$0 at 7ffb649eb3a8 RtlWideCharArrayCopyStringWorker at 7ffb6494a894 LdrResGetRCConfig at 7ffb64938850 TppCritSetThread$fin$3 at 7ffb64983a2c EtwpGetTimeZoneInformation at 7ffb648e2940 RXactpCommit at 7ffb6495e424 TppWorkerThread$filt$11 at 7ffb64983ef9 LdrpGetProcedureAddress at 7ffb648fc330 RtlGetFullPathName_UstrEx at 7ffb64908ec0 RtlpLocateActivationContextSection at 7ffb64907074 RtlpAllocateUserBlockFromHeap at 7ffb648f84ac LdrpLoadResourceFromAlternativeModule at 7ffb648f73e0 RtlpRegisterLockedMemoryBlockLookaside at 7ffb649534dc RtlInterlockedClearBitRun at 7ffb64958eb0 RtlpSaveX87State at 7ffb649654f0 RtlStringCchCopyW at 7ffb648e1008 RtlpNotOwnerCriticalSection$filt$0 at 7ffb649c6e71 EtwpRegisterTpNotificationOnce at 7ffb6495c700 TppRaiseInvalidParameter$filt$0 at 7ffb649ef23a LdrpObtainLockedEnclave at 7ffb648fb378 StringToGuidNoBrackets at 7ffb648e4168 EtwEventSetInformation at 7ffb648ea3e0 RtlpProcessIFEOKeyFilter at 7ffb64952d74 RtlpTpRevertCapture at 7ffb64910dfc RtlInitializeResource at 7ffb64913950 RtlpPopUserShadowStack at 7ffb648feab0 RtlSetUserValueHeap$fin$0 at 7ffb64984cbe RtlGetExtendedContextLength2 at 7ffb648fed50 LdrpInitializePolicy at 7ffb6495e794 LdrGetDllHandleByMapping$filt$0 at 7ffb64983678 RtlTestAndPublishWnfStateData at 7ffb64962f60 PsspWalkHandleTable at 7ffb649f2760 RtlpCreateSplitBlock at 7ffb64926168 RtlpCreateHashTable at 7ffb6494f408 RtlpAllocateHeap at 7ffb6491cef0 RtlSetCurrentEnvironment at 7ffb6496afd0 RtlpTpWaitCheckReset$fin$0 at 7ffb6498372b RtlpFreeHeapInternal at 7ffb64920080 LdrpQuerySxSMUIFile$fin$0 at 7ffb64984f00 CsrClientConnectToServer at 7ffb6492b580 EtwpGetPrivateLoggerContextByName at 7ffb648e456c EtwpCreateFile at 7ffb648e5268 RtlUnicodeToOemN at 7ffb64941860 LdrpGetLoadAsEntry at 7ffb64934674 RtlCheckHeldCriticalSections at 7ffb6495cf70 RtlCompactHeap$filt$0 at 7ffb649856b1 TppIopFree$fin$0 at 7ffb64985243 RtlpAnalyzeHeapFailure$filt$0 at 7ffb649e1541 RtlDebugFreeHeap$fin$1 at 7ffb649e5490 TppPoolpReferenceGlobalPool$fin$1 at 7ffb6498391b TppPoolpReferenceGlobalPool$fin$0 at 7ffb64983903 RtlpSubscribeWnfStateChangeNotificationInternal at 7ffb648e9d9c RtlSetEnvironmentStrings$fin$0 at 7ffb64985301 RtlpValidateLFHBlock$filt$0 at 7ffb649e7daf RtlpInsertAssemblyStorageMapEntry at 7ffb64951008 SbObtainTraceHandle at 7ffb6495d16c RtlpEnumProcessHeaps$fin$0 at 7ffb64984988 EtwpFindGuidEntry at 7ffb648eab50 EtwpGetRegDwordValue at 7ffb648e3eb8 wcstoxlX at 7ffb6497201c OpenGlobalizationUserSettingsKey at 7ffb648e9204 RtlSleepConditionVariableSRW at 7ffb649404e0 RtlGetLocaleFileMappingAddress at 7ffb6495ae70 TppWaitCompletion at 7ffb64910410 LdrRegisterDllNotification at 7ffb64962e90 RtlAreBitsSet at 7ffb64959d80 RtlDebugSetUserFlagsHeap$filt$0 at 7ffb649e5e8b RtlpHpVsSubsegmentWalk at 7ffb64931068 CountUnicodeToUTF8 at 7ffb64934030 RtlpHpLfhBucketUpdateAffinityMapping at 7ffb64959564 LdrpResolveDllName at 7ffb64909d6c TpPoolReferenceExistingGlobalPool$fin$0 at 7ffb649852e0 RtlpTpWaitCallback at 7ffb6490ea80 LdrpGetModuleName at 7ffb64941c18 RtlpHpSegFreeRangeRemove at 7ffb64916728 RtlpMuiRegGetLanguageSpec at 7ffb648e95d4 TppWorkerThread$fin$0 at 7ffb64983c40 TppWorkerThread$fin$1 at 7ffb64983c61 TppWorkerThread$fin$10 at 7ffb64983e88 RtlImpersonateSelfEx at 7ffb64955740 LdrpResGetResourceDirectory at 7ffb64936bd0 TppWorkerThread$fin$7 at 7ffb64983e42 RtlpWow64SelectSystem32PathInternal at 7ffb64965a4c TppWorkerThread$fin$8 at 7ffb64983d27 RtlReportExceptionEx$fin$0 at 7ffb649bc055 TppWorkerThread$fin$9 at 7ffb64983e67 RtlpHpSegAlloc at 7ffb64916e78 LdrpResolveProcedureAddress at 7ffb648fb804 RtlSizeHeap at 7ffb6491ab40 RtlpValidateActivationContextData at 7ffb649515ec EtwpStopUmLogger at 7ffb64966660 EtwEventWriteEndScenario at 7ffb649313d0 RtlpMuiRegTryToAppendLangId at 7ffb648f4518 RtlpInitializeUserList at 7ffb648eec54 TppCritSetThread$fin$2 at 7ffb649839fc LdrpLogError at 7ffb6495dd84 RtlpHpSegPageRangeShrink at 7ffb64916bd0 RtlGetUserInfoHeap$filt$0 at 7ffb64984c30 NLS_UPCASE at 7ffb648fa2b4 RtlLcidToLocaleName at 7ffb648f6ae0 LdrpLogDllRelocationEtwEvent at 7ffb64961d68 PsspDumpObject_Process at 7ffb649f2350 RtlProtectHeap at 7ffb64927c40 LdrpFetchAddressOfSecurityCookie at 7ffb649004d4 RtlAddMandatoryAce at 7ffb648ee5a0 CompareVersions at 7ffb649618c0 LdrpIsModuleUnderSystem32 at 7ffb64959d24 RtlpHeapTrkDumpOutstandingAllocs at 7ffb649d7e40 RtlpHpHeapCreate at 7ffb6492be20 LdrpChangeMrdataProtection at 7ffb64912ab8 TppWorkPost at 7ffb64918670 RtlLocaleNameToLcid at 7ffb648f6d80 EtwpDereferenceUmGuidEntry at 7ffb648e6330 RtlpCommitBlock at 7ffb64926c54 RtlStringCbPrintfA at 7ffb64952958 RtlpCreateWnfNameSubscription at 7ffb648ea060 RtlValidateHeap$filt$0 at 7ffb64984d34 LdrpAllocatePlaceHolder at 7ffb6490abf0 RtlGetIntegerAtom at 7ffb6493b1b0 RtlpOpenBaseImageFileOptionsKey at 7ffb64952cac RtlpOpenImageFileOptionsKeyEx at 7ffb64952b50 RtlpAddHeapToUnprotectedList at 7ffb64927ea8 RtlpHpExtrasSetPresent at 7ffb64926844 LdrpCodeAuthzInitialize at 7ffb64959dbc RtlQueryProcessBackTraceInformation$fin$0 at 7ffb649b7672 RtlCheckHeldCriticalSections$fin$0 at 7ffb64985220 RtlActivateActivationContextEx at 7ffb64950940 RtlGetAppContainerParent at 7ffb648eb6a0 RtlInitializeHeapLogging at 7ffb648e98d0 LdrQueryProcessModuleInformationEx$fin$0 at 7ffb64984e96 RtlSetEnvironmentStrings at 7ffb64960620 RtlUpcaseUnicodeChar at 7ffb64940940 RtlpAllocateHeap$fin$0 at 7ffb649841b0 RtlpAddNeutralsToMergedList at 7ffb648f3124 RtlReAllocateHeap at 7ffb64922cb0 RtlpRemoveHeapFromProtectedList at 7ffb649283cc RtlDeleteGrowableFunctionTable at 7ffb64944ee0 RtlCreateTimer at 7ffb64910ef0 RtlpWnfWalkUserSubscriptionList at 7ffb648e6950 RtlpValidOwnerSubjectContext at 7ffb64946768 InitializeUserOrMachineLangList at 7ffb648e7d24 LdrpIsSecurityEtwLoggingEnabled at 7ffb6490dee8 RtlSetEnvironmentStrings$fin$1 at 7ffb64985322 RtlAcquireResourceExclusive at 7ffb6493f620 TpSimpleTryPost at 7ffb64917340 RtlValidateHeap$fin$1 at 7ffb64984d52 RtlStringCopyWorkerW at 7ffb649b0cc8 EtwEventWriteNoRegistration at 7ffb64962ff0 RtlGetAssemblyStorageRoot at 7ffb64950508 RtlSetIoCompletionCallback at 7ffb64968760 LdrEnumerateLoadedModules$fin$0 at 7ffb64984e1c RtlpWnfRetryTimerCallback at 7ffb6496b7c0 RtlWaitForWnfMetaNotification at 7ffb648e6140 LdrpAccessResourceData at 7ffb648ff2d0 LdrGetDllHandleEx at 7ffb64901870 LdrpGetDelayloadExportDll at 7ffb649011bc RtlUnicodeStringValidateSrcWorker at 7ffb64909908 LdrpAppCompatRedirect at 7ffb6490e668 RtlStringExHandleOtherFlagsW at 7ffb649ae44c EtwpCheckForEnoughStackSpace$filt$0 at 7ffb649ed3fc TpReleasePool$fin$0 at 7ffb649853af LdrpProcessDetachNode$filt$0 at 7ffb64984b39 TppCritSetThread at 7ffb6491015c RtlpHeapRemoveListEntry at 7ffb64926a54 LdrpCorInitialize$fin$0 at 7ffb64985349 `sxsisol_ExpandEnvironmentStrings_UEx'::`1'::fin$0 at 7ffb649be87d LdrShutdownThread$fin$1 at 7ffb64983382 LdrShutdownThread$fin$0 at 7ffb64983368 LdrShutdownThread$fin$2 at 7ffb6498339f TpAllocCleanupGroup$fin$0 at 7ffb649851cb RtlInitializeExtendedContext2 at 7ffb648feae0 LdrpAllocateTls at 7ffb64935784 TppCritSetThread$fin$1 at 7ffb649839cc LdrpLangFallbackListFindNode at 7ffb648f6680 LdrpCallInitRoutine at 7ffb6490503c TppUpdateSubQueueTimer at 7ffb64912854 TpAllocWork at 7ffb64942670 LdrpGetParentLangId at 7ffb6495dc54 LdrpGetFullPath at 7ffb649099f4 RtlGetNeutralFallback at 7ffb648f3008 RtlCreateHeap at 7ffb64928b00 LdrpProcessInitializationComplete at 7ffb6495efb0 EtwNotificationUnregister at 7ffb649331b0 RtlWow64PopAllCrossProcessWorkFromWorkList$filt$0 at 7ffb649dc9c4 RtlpWow64SetContextOnAmd64 at 7ffb6494c7d0 RtlpGetActivationContextDataStorageMapAndRosterHeader at 7ffb64950628 RtlpComputeBackupIndex at 7ffb6495f250 RtlQueryProcessModuleInformation at 7ffb64954d3c TppAllocThreadData at 7ffb649101f8 RtlWow64PushCrossProcessWorkOntoWorkList$filt$0 at 7ffb649dcd33 TppWorkerThread$filt$3 at 7ffb64983cc4 LdrpProcessDetachNode$fin$1 at 7ffb64984b75 TppAllocAlpcCompletion at 7ffb649581d4 RtlpTraverseParents at 7ffb6493a438 LdrpCompleteMapModule at 7ffb6490a3ec RtlpHpAllocateHeap at 7ffb6492e43c RtlpHpHeapAllocate at 7ffb6492c3d8 RtlSetEnvironmentVar$fin$0 at 7ffb64984590 RtlDebugGetUserInfoHeap$filt$0 at 7ffb649e5618 EtwpReceiveReplyDataBlock at 7ffb648e1ce0 RtlpAllocateUserBlock at 7ffb648f8328 RtlpHpHeapValidateProtection at 7ffb649276bc TppPoolUpdateNodeRelation at 7ffb64942e20 RtlImageNtHeaderEx at 7ffb648fcbc0 LdrpMergeNodes at 7ffb6494c228 RtlpHpRegisterEnvironment at 7ffb6492c6f0 RtlpTimeFieldsToTime at 7ffb6493d7f0 EtwpTraceUmEvent at 7ffb6496507c RtlPublishWnfStateData at 7ffb6495c230 RtlpHpLfhSubsegmentWalk at 7ffb648e19c8 PsspDumpThread at 7ffb649f2d64 EvtIntReportEventWorker at 7ffb6493227c RtlpTpTimerCallback at 7ffb64910620 RtlpGetRegistryHandle at 7ffb648e3d40 RtlSetProtectedPolicy at 7ffb6495ea90 RtlSidHashInitialize at 7ffb64955860 RtlpGetTokenNamedObjectPath at 7ffb648ebcf8 RtlDebugGetUserInfoHeap$fin$1 at 7ffb649e5636 TppExecuteWaitTimerCallback at 7ffb64961a50 LdrpProtectedCopyMemory$filt$0 at 7ffb64985077 RtlpSetSegmentInfo at 7ffb649591b8 RtlpDeCommitFreeBlock at 7ffb64924bc4 RtlSetThreadSubProcessTag at 7ffb64915c30 LdrpHandleProtectedDelayload$fin$0 at 7ffb64983200 LdrRemoveDllDirectory at 7ffb6496be00 EtwpTraceUmEvent$fin$1 at 7ffb6498550f LdrpInitializeGraphRecurse at 7ffb64949178 RtlOemStringToUnicodeString at 7ffb649416e0 LdrpRecordModuleDependency at 7ffb64901e14 RtlExpandHashTable at 7ffb64965e40 RtlpMuiRegGetOrAddStringToPool at 7ffb648f67ec RtlpMergeContextXState at 7ffb64953880 RtlpHpSegFreeRangeInsert at 7ffb6491678c RtlAcquirePrivilege at 7ffb649554d0 RtlpHpVsContextFree at 7ffb64918dd0 RtlUpcaseUnicodeStringToAnsiString$fin$0 at 7ffb649c8df4 LdrpLoadDllInternal$fin$0 at 7ffb6498330e RtlpWakeSRWLock at 7ffb64915eb0 RtlIsCloudFilesPlaceholder at 7ffb64962160 _ctrlfp$filt$0 at 7ffb64985843 RtlQueryProcessDebugInformation at 7ffb64954b00 RtlCreateHeap$filt$0 at 7ffb649843ff TppJobpExecuteCallback at 7ffb6495f620 RtlpPossibleDeadlock$filt$0 at 7ffb649c704b RtlpIsDosDeviceName_Ustr at 7ffb64908660 RtlpSetProcUserMachineLangList$fin$0 at 7ffb649830fd RtlAddProcessTrustLabelAce at 7ffb6496a8a0 RtlDestroyHeap at 7ffb6492a360 RtlEqualUnicodeString at 7ffb649029d0 TppCritSetThread$fin$0 at 7ffb64983999 RtlpGetDirPath at 7ffb6494bb78 EtwpGetPrivateLoggerContext at 7ffb649667ac LdrpProcessDetachNode at 7ffb6494d100 RtlpHeapTrkTrackRemoveHeap at 7ffb649d89a8 RtlQueryVolumeDiskSpeedPolicy at 7ffb6496b98c RtlpGetCorrelationVectorEndPosition at 7ffb64951fb4 RtlpHpHeapHandleError$filt$0 at 7ffb649e193a TpCallbackSendAlpcMessageOnCompletion at 7ffb64946ef0 RtlInitializeCriticalSection at 7ffb649430a0 RtlCreateProcessParametersInternal at 7ffb6493bdbc RtlpHpFreeWithExceptionProtection$filt$0 at 7ffb64984200 RtlpSetRequestedFrontEndHeap$fin$0 at 7ffb64985019 RtlpCheckForSameCurdir at 7ffb649560dc RtlpHpEnvAllocVA at 7ffb649275a0 RtlIsTextUnicode at 7ffb64943450 LdrAddDllDirectory$fin$0 at 7ffb64985820 LdrpFindLoadedDllInternal at 7ffb64901a68 TppWorkerThread$filt$2 at 7ffb64983c82 TppGetCurrentThreadNumaNode at 7ffb649116a0 x64tow at 7ffb6496cd90 FindNodeOrParent at 7ffb649442c8 RtlWakeConditionVariable at 7ffb64958a40 PsspHandleDumper at 7ffb649f24c0 RtlpLfhFindClearBitAndSet at 7ffb6492d568 RtlpTpImpersonate at 7ffb64964898 EtwpShutdownPrivateLoggers at 7ffb64961320 _SafeReallocBlob at 7ffb649e1134 RtlpReAllocateHeap$filt$5 at 7ffb649842c0 RtlWow64PushCrossProcessWorkOntoFreeList$filt$0 at 7ffb649dcb0a RtlpHeapTrkReportResult at 7ffb649d8674 sin_piby4 at 7ffb6496f78c RtlpReAllocateHeap$filt$1 at 7ffb6498431e RtlDeleteUmsThreadContext$fin$0 at 7ffb649d3820 RtlpReAllocateHeap$filt$0 at 7ffb649842fe RtlpReAllocateHeap$filt$3 at 7ffb6498433c RtlpReAllocateHeap$filt$2 at 7ffb649842e0 LdrpUnsuppressAddressTakenIat at 7ffb64934fa8 RtlCreateAndSetSD at 7ffb649480e0 sxsisol_FreeUnicodeStringBufferAroundUnicodeStrings_Success at 7ffb6496056c RtlpPopulateListIndex at 7ffb64928440 RtlpLookupCurDirSetting at 7ffb6494bc10 TpCancelAsyncIoOperation at 7ffb649420b0 _RtlpMuiRegDeserializeRegistryInfo at 7ffb648e9670 RtlpHpLfhSubsegmentCreate at 7ffb64929908 LdrpHandleProtectedDelayload at 7ffb648fbbf0 TppStopWaitCallbackGeneration at 7ffb649647c0 RtlQueryCriticalSectionOwner$fin$0 at 7ffb649c6c80 EtwCheckCoverage at 7ffb64964740 RtlpHpSizeHeap at 7ffb6491adc0 LdrpRedirectDelayloadFailure at 7ffb6495ee5c RtlpGetSystemDefaultUILanguage at 7ffb64952ab0 RtlCreateTimerQueue$fin$0 at 7ffb6498538f TpReleasePool at 7ffb64960e00 RtlGetUILanguageInfo at 7ffb64963870 GetLCIDFromLangListNode at 7ffb648e7c9c ScanHexFormat at 7ffb64949d60 RtlpLowFragHeapFlushCaches at 7ffb6492ca24 LdrFindResource_U at 7ffb6494f350 EtwpTraceUmEvent$fin$0 at 7ffb649854f7 EtwpRegisterProvider at 7ffb648ea68c RtlSetEnvironmentVar at 7ffb6493c7d0 RtlUpcaseUnicodeString at 7ffb648ee4a0 LdrShutdownThread at 7ffb64902aa0 RtlpIsQualifiedLanguage at 7ffb6493a320 RtlEnumerateBoundaryDescriptorEntries at 7ffb6495c83c RtlpTimeToTimeFields at 7ffb6493db10 TpSetPoolMaxThreads at 7ffb64942820 TppAlpcpCallbackEpilog at 7ffb64949ed0 LdrpCorInitialize at 7ffb64960a70 RtlpCopyLegacyContext at 7ffb64945fb4 RtlpHpLfhOwnerCompact at 7ffb6492eda8 RtlStringCbCatW at 7ffb648e3144 RtlQueryHeapInformation at 7ffb64947010 RtlActivateActivationContextUnsafeFast at 7ffb64904f80 RtlAllocateMemoryBlockLookaside at 7ffb649f7010 RtlpComputeMergedAcl at 7ffb64968188 TppInitializeTimerSubQueue at 7ffb6490ec70 SbSelectProcedure at 7ffb6490cea0 RtlGetSearchPath at 7ffb649626e0 RtlpHpSegDescriptorValidate at 7ffb64924a6c RtlQueryEnvironmentVariable$fin$0 at 7ffb64983170 IsLanguageOverlayBlockedByPolicy at 7ffb6493b6fc RtlpComputeMergedAcl2 at 7ffb649682a8 RtlpReferenceCurrentDirectory at 7ffb64956288 _control87$filt$0 at 7ffb64985843 RtlpExtendLowFragHeapSegment at 7ffb6494fb3c EtwpFreeLoggerContext at 7ffb64966ef8 RtlpGetCorrelationVectorBufferLength at 7ffb649529cc RtlpComputeDllPathWithOptions at 7ffb6494b380 TpReleaseCleanupGroupMembers$fin$1 at 7ffb64984931 RtlQueryApplicationKeyOption at 7ffb649592fc RtlpSubSegmentInitialize at 7ffb64929c20 RtlGetPersistedStateLocation at 7ffb6494f6c0 RtlpHpSegHeapAddSegment at 7ffb6492d700 SHA256Update at 7ffb648ed8f4 LdrpLoadForwardedDll$fin$0 at 7ffb649832ee RtlDeregisterWaitEx$fin$0 at 7ffb64983939 FindLabelEnd at 7ffb6490c710 RtlDeregisterWaitEx$fin$1 at 7ffb64983957 RtlpHpVsChunkSetExtraPresent at 7ffb6494883c RtlCSparseBitmapFindBitSetCapped at 7ffb6492f260 RtlpxLookupFunctionTable at 7ffb648fe6a0 RtlRegisterThreadWithCsrss at 7ffb649100b0 TpSetPoolThreadBasePriority at 7ffb64964280 _LdrpInitialize$filt$0 at 7ffb64984db6 TppIopExecuteCallback at 7ffb649135a0 PsspHandleStreamSizeCalculator at 7ffb649f26f0 LdrShutdownProcess$fin$1 at 7ffb64984a2d RtlpGetEntireXStateAreaLength at 7ffb6495be38 RtlFindClearBitsAndSet at 7ffb64935c90 EtwGetTraceEnableLevel at 7ffb6495fb10 WerEscalationReadImageVersionInfoForModuleBaseSafe$filt$0 at 7ffb64984b95 RtlExitUserProcess at 7ffb6494a900 RtlpInsertFreeBlock at 7ffb64925248 RtlpHpSegContextReserve at 7ffb6492c1f8 TppWorkerThread$filt$5 at 7ffb64983ce5 RtlAddAttributeActionToRXact at 7ffb6495f990 RtlAddRefActivationContext at 7ffb64909b00 RtlpInitUnicodeStringUsingBuffer at 7ffb648f6cac LdrpLogNewDllLoad at 7ffb6490a370 RtlCheckPortableOperatingSystem at 7ffb648e2ab0 RtlpOptimizeConditionVariableWaitList at 7ffb649408f4 TpDisassociateCallback at 7ffb6495ed30 RtlCSparseBitmapBitsClear at 7ffb6492f908 CsrpConnectToServer at 7ffb6492b1b4 RtlInitEnumerationHashTable at 7ffb64946b20 RtlUserThreadStart$filt$0 at 7ffb64984a50 RtlCSparseBitmapBitmaskWrite at 7ffb6492e024 RtlpMuiRegGetOrAddString at 7ffb648f58fc RtlStronglyEnumerateEntryHashTable at 7ffb64946e10 RtlpScanEnvironment at 7ffb648fa158 RtlpTpIoAlloc$fin$0 at 7ffb6498561b RtlCompactHeap at 7ffb64968e80 EtwRegisterSecurityProvider at 7ffb6496b420 RtlpAddKnownObjectAce at 7ffb64967b7c RtlpHeapTrkHash at 7ffb649d81f8 RtlCreateTagHeap$fin$0 at 7ffb64985128 RtlpInitializeAssemblyStorageMap at 7ffb64951568 TppPoolpDereferenceGlobalPool at 7ffb6490f354 RtlpQueryInformationActivationContextDetailedInformation at 7ffb64955a00 TppDirectExecuteCallback at 7ffb64959940 RtlGetNextUmsListItem$fin$0 at 7ffb649d3bca RtlpFindActivationContextSection_FillOutReturnedData at 7ffb649570bc EtwpFlushBuffer at 7ffb6494cce4 RtlQueryTagHeap$fin$0 at 7ffb649cf666 vDbgPrintExWithPrefixInternal at 7ffb649337e8 TpSetPoolMinThreads at 7ffb649612a0 TppPrepareDirectParams at 7ffb64915760 RtlNtPathNameToDosPathName at 7ffb648e21a0 LdrUnlockLoaderLock$filt$0 at 7ffb6498517c RtlCreateActivationContext at 7ffb64951400 TpAllocTimer at 7ffb64911c20 RtlpHpTagRunOnceInit at 7ffb6492e580 LdrpInitializeDllPath at 7ffb64901818 RtlDeleteAtomFromAtomTable at 7ffb6493aa20 RtlNumberOfSetBits at 7ffb64957ae0 LdrpResSearchResourceInsideDirectory at 7ffb64936fe0 SbUpdateSwitchContextBasedOnDll at 7ffb6490cbbc LdrRscIsTypeExist at 7ffb648f8120 RtlpGetContextFlagsLocation at 7ffb64945f6c _RtlpMuiRegAddNeutralLanguage at 7ffb648e94bc LdrpResCompareResourceNames at 7ffb64937fe0 RtlpHpSegMgrAllocate at 7ffb6492e228 RtlpNameprepAsciiWorker at 7ffb6490b0c0 TppPoolpDereferenceGlobalPool$fin$0 at 7ffb649837ba EtwpTrackProviderBinary at 7ffb6495fc90 EtwpAddLogHeaderToLogFile at 7ffb648e4ba8 LdrpInitializeThread$fin$2 at 7ffb64983407 TpReleaseCleanupGroupMembers$fin$0 at 7ffb64984913 RtlLeaveCriticalSection at 7ffb6491aa00 LdrpProcessMappedModule at 7ffb649006d4 RtlpHpLfhSubsegmentInitialize at 7ffb64929fdc RtlWow64GetProcessMachines at 7ffb64957c40 LdrpRelocateImage at 7ffb64961ab0 RtlpHpLfhSubsegmentSetOwner at 7ffb6495b7bc RtlpInitCurrentDir at 7ffb64956394 RtlGetNtProductType at 7ffb6490dd50 RtlpInheritAcl2 at 7ffb648f167c RtlGetNextEntryHashTable at 7ffb6495ff40 RtlUnicodeStringToCountedOemString$fin$0 at 7ffb649c8cec RtlpHpVsSubsegmentCreate at 7ffb6494f1c4 LdrpUnloadNode at 7ffb6490ed7c RtlGetUserInfoHeap at 7ffb6494dd30 RtlpLookupDynamicFunctionEntry at 7ffb6495394c RtlQueryEnvironmentVariable$filt$1 at 7ffb64983193 TppSimplepExecuteCallback at 7ffb64912df0 RtlpInheritAcl at 7ffb648f1488 RtlpCSparseBitmapPageCommit at 7ffb6492e0f8 RtlpGetDynamicTimeZoneInfoHandle at 7ffb648e2fd8 InitializeSListHead at 7ffb6494ea7c LdrpLoadDependentModule$fin$0 at 7ffb64983430 EtwEventProviderEnabled at 7ffb64951980 LdrShutdownProcess$fin$0 at 7ffb64984a13 PsspSampleCounters at 7ffb649f11e0 RtlpLogCapabilityCheckLatency at 7ffb648e9b8c RtlpQueryTimeZoneInformationWorker at 7ffb648e2b80 RtlValidateUserCallTarget at 7ffb6493515c RtlDebugReAllocateHeap$fin$1 at 7ffb649e5cd9 RtlpTpIoAlloc at 7ffb649689fc RtlpCrackActivationContextStringSectionHeader at 7ffb64955dd0 RtlpHpSegSegmentInitialize at 7ffb6492d748 RtlDetectHeapLeaks at 7ffb6494afe0 RtlQueryPackageClaims at 7ffb64949700 RtlEnumerateEntryHashTable at 7ffb64946d50 TppWorkerThread$filt$4 at 7ffb64983d06 x64toa at 7ffb6496cbf0 RtlpWaitOnAddressWithTimeout at 7ffb648e7598 RtlpHpSegWalk at 7ffb64930a8c RtlDispatchAPC$fin$0 at 7ffb6498519f RtlIsNameInExpression$fin$0 at 7ffb649d5100 TppIopExecuteCallback$fin$0 at 7ffb64983c11 RtlpMergeSecurityAttributeInformation at 7ffb649630a0 RtlInitializeCorrelationVector at 7ffb64963fa0 EtwpGenerateFileName at 7ffb648e2740 TppSetupNextWait at 7ffb649115c4 RtlCreateTagHeap at 7ffb6495bf00 CountUTF8ToUnicode at 7ffb6493f16c RtlCanonicalizeDomainName at 7ffb6490af10 EtwpStopLoggerInstance at 7ffb64966894 SbCleanupTrace at 7ffb6494af80 RtlpInitParameterBlock at 7ffb6495c068 RtlpMuiRegTryToAppendLanguageToMuiszFromLangList at 7ffb648f4458 RtlpInsertStringAtom at 7ffb6493b2bc RtlpCheckRelativeDrive at 7ffb6493d360 TppTimerpStopCallbackGeneration at 7ffb64963f20 RtlpGetMUIRedirectedFilePath at 7ffb64939c98 RtlpHpAllocWithExceptionProtection$filt$0 at 7ffb64984160 RtlFormatCurrentUserKeyPath at 7ffb648f3800 RtlSetProcessIsCritical at 7ffb6496af20 RtlCapabilityCheck at 7ffb648eb770 RtlpSysVolTakeOwnership at 7ffb64965cc4 RtlSetAllBits at 7ffb6495a110 RtlWow64GetCpuAreaInfo at 7ffb64945ec0 RtlpAssemblyStorageMapResolutionDefaultCallback at 7ffb6493a4f0 RtlTryAcquireSRWLockShared at 7ffb64958770 TppTimerpValidateTimer at 7ffb6491257c TpPostTask at 7ffb64911928 LdrpResolveForwarder at 7ffb648fba10 RtlpSanitizeContext at 7ffb648fec84 RtlpHpLargeWalkHeap at 7ffb64930db0 TppWorkCancelPendingCallbacks at 7ffb64964210 RtlGetAppContainerNamedObjectPath at 7ffb648eb550 GetNameFromLangListNode at 7ffb648f5f0c RtlGetFullPathName_Ustr$fin$0 at 7ffb649835c0 RtlpMuiRegGetFallbackLanguagesAsMultiSZ at 7ffb64963b28 RXactpOpenTargetKey at 7ffb64967dac TpAllocIoCompletion at 7ffb64942180 RtlMapSecurityErrorToNtStatus at 7ffb64964970 RtlConvertSidToUnicodeString at 7ffb648f4670 LdrGetDllFullName at 7ffb648f3620 EtwpFlushActiveBuffers at 7ffb6494ca8c EtwEventEnabled at 7ffb64933c50 PsspDumpObject_Semaphore at 7ffb649f2400 write_char at 7ffb64972f80 RtlDeleteTimer$fin$1 at 7ffb64983b4d RtlRunOnceBeginInitialize at 7ffb6492a290 RtlLockModuleSection at 7ffb64953620 RtlpAllocateActivationContextStackFrame at 7ffb64950a68 EtwpTraceUmMessage$fin$1 at 7ffb64985685 RtlpCopyMappedMemoryEx$filt$0 at 7ffb649854c1 LdrpInitializeNode$fin$0 at 7ffb649849b1 RtlIpv4StringToAddressExA at 7ffb6495a850 LdrpInitializeThread$fin$1 at 7ffb649833ea RtlpMuiRegFreeRegistryInfo at 7ffb648e8810 RtlUnicodeStringValidateDestWorker at 7ffb64909944 LdrpProtectAndRelocateImage at 7ffb64961b90 RtlFindActivationContextSectionString at 7ffb64906c70 RtlWow64RequestCrossProcessHeavyFlush$filt$0 at 7ffb649dcda7 RtlpGenerateInheritedAce at 7ffb648f1c80 RtlStringLengthWorkerW at 7ffb648e3214 RtlCreateMemoryZone at 7ffb6494eaa0 LdrpComputeLazyDllPath at 7ffb6490e94c RtlIpv4StringToAddressExW at 7ffb6490b5b0 RtlpHpReallocComputeSizes at 7ffb64924628 RtlpFindRegTziForCurrentYear at 7ffb648e329c LdrLoadAlternateResourceModule at 7ffb6495c390 RtlDebugSetUserFlagsHeap$fin$1 at 7ffb649e5ea9 RtlpExtendHeap at 7ffb649208e0 LdrpInitializeShimDllDependencies at 7ffb64948cd0 LdrpInitializeThread at 7ffb64902d68 RtlpIsALicensedRegularLanguage at 7ffb648f292c RtlpFindUCREntry at 7ffb64928a70 RtlpInitEnvironmentBlock at 7ffb6493c388 TppPoolpFree$fin$0 at 7ffb649853d7 RtlGetExePath at 7ffb649607a0 LdrpMergeLangFallbackLists at 7ffb648f599c strtoxq at 7ffb649724c0 Normalization__Normalize at 7ffb6495d2f8 RtlpCopyXStateChunk at 7ffb649461f8 RtlpFindGuidInSection at 7ffb64908d60 RtlpGetCachedPath at 7ffb64912278 RtlpValidateAsciiStd3AndLength at 7ffb6490b430 RtlpWow64GetContextOnAmd64 at 7ffb6494d990 A_SHAUpdate at 7ffb648ec640 RtlIpv6StringToAddressExA at 7ffb6495a260 RtlpHpLfhSubsegmentIncBlockCounts at 7ffb64943320 RtlIpv6StringToAddressExW at 7ffb6490b930 RtlpWakeSingle at 7ffb649406bc _call_matherr at 7ffb64973f90 RtlIpv6StringToAddressA at 7ffb6495a330 RtlMultiByteToUnicodeN at 7ffb6493d210 EtwEventWriteStartScenario at 7ffb6496b0a0 RtlpCombineAcls at 7ffb648ef5ac RtlQueryAtomInAtomTable at 7ffb6493ab20 LdrFindResourceEx_U at 7ffb6495f060 LdrVerifyImageMatchesChecksumEx$filt$1 at 7ffb649856fc RtlReleaseResource at 7ffb6493f760 RtlpTpIoDllUnloaded$fin$0 at 7ffb6498557a RtlImageNtHeaderEx$filt$0 at 7ffb64983270 RtlIpv6StringToAddressW at 7ffb6490bb20 EtwpUpdateEnableInfoAndCallback at 7ffb648ead08 RtlpHpSegSegmentAllocate at 7ffb6492deec RtlpVerCompare at 7ffb64952680 RtlpWnfRegisterTpNotification at 7ffb6495b8b4 LdrpDynamicShimModule at 7ffb6490c764 RtlpDecRefWnfNameSubscription at 7ffb648e6ecc RtlpInitializeHeapSegment at 7ffb649285d4 TpWaitForIoCompletion at 7ffb64942040 _splitpath_helper at 7ffb6496d280 RtlUnicodeStringToAnsiString$fin$0 at 7ffb6498468d RtlpHeapTrkTrackStack at 7ffb649d8ae8 RtlIpv4StringToAddressA at 7ffb6495a8e0 RtlpProbeUserBufferSafe$filt$0 at 7ffb64984c9a LdrpGetImportDescriptorForSnap at 7ffb64951da8 RtlpActivateLowFragmentationHeap at 7ffb6492aed4 RtlUpdateTimer at 7ffb6495df40 RtlDeleteFunctionTable at 7ffb64944d40 RtlDetermineDosPathNameType_U at 7ffb6490f0a0 RtlGetThreadErrorMode at 7ffb6495cc50 RtlGetSystemPreferredUILanguages at 7ffb64953c70 LdrLoadAlternateResourceModuleEx at 7ffb648f78f0 RtlpCoalesceFreeBlocks at 7ffb64925c68 RtlIpv4StringToAddressW at 7ffb6490b700 RtlLocateExtendedFeature2 at 7ffb649538f0 LdrpInitMuiCrits at 7ffb648fa810 RtlReleaseActivationContext at 7ffb64917500 RtlLockHeap at 7ffb648f9d30 RtlpChangeQueryDebugBufferTarget at 7ffb649551d8 GetOverlayRootFolder at 7ffb648f2e38 EtwWriteUMSecurityEvent at 7ffb64955390 RtlpProtectHeap at 7ffb64927d20 LdrRemoveLoadAsDataTable$fin$0 at 7ffb64984dfb RtlpAddKnownAce at 7ffb648f4974 RtlpGetDefaultTrustSubjectContext at 7ffb648ef3ac EtwpCreateEtwThread at 7ffb648e5680 RtlpTpWorkUnposted at 7ffb6490f200 RtlUnicodeToUTF8N at 7ffb64933d10 LdrpFindLoadedDllByName at 7ffb64902718 RtlIsMultiSessionSku at 7ffb648ebcd0 RtlGuardGrantSuppressedCallAccess at 7ffb64934c1c LdrLogNewDataDllLoad at 7ffb64951ca0 LdrpCondenseGraphRecurse at 7ffb6494c088 RtlpWow64SuspendLocalProcess at 7ffb649bb8d0 RtlReleasePrivilege at 7ffb6495f570 RtlDeleteTimer$fin$0 at 7ffb64983b2b RtlQueryResourcePolicy at 7ffb648e9b00 EtwpTraceUmMessage$fin$0 at 7ffb6498566d RtlpCreateSerializationGroup at 7ffb648e97b0 LdrpGetFileDriverStoreRoot at 7ffb64959a34 LdrpSetThreadPreferredLangList at 7ffb648f3968 RtlpProbeAssemblyStorageRootForAssembly at 7ffb64951130 RtlDebugCreateTagHeap$fin$1 at 7ffb649e50d8 RtlpMuiRegGetInstalledLanguageIndexByLangId at 7ffb648f6404 LdrpInitializeThread$fin$0 at 7ffb649833d0 sxsisol_InitUnicodeStringBufferAroundUnicodeStrings at 7ffb64908a5c RtlReportExceptionHelper$fin$0 at 7ffb649bc4b5 TpReleaseCleanupGroupMembers$fin$2 at 7ffb64984966 RtlRbInsertNodeEx at 7ffb64918240 RtlFormatMessageEx at 7ffb649318e0 RtlpHpHeapExtendContext at 7ffb6492ff20 RtlpQueryRegistryValues at 7ffb648e3474 RtlpLoadMachineUIByPolicy at 7ffb648e7950 RtlGetSuiteMask at 7ffb6490dd20 RtlpCompareKnownObjectAces at 7ffb64967274 TppCritSetThread$fin$4 at 7ffb64983a4b EtwGetTraceEnableFlags at 7ffb6495fb50 RtlQueryImageMitigationPolicy at 7ffb648e1140 RtlpHeapGenerateRandomValue32 at 7ffb6492a1a0 RtlpUpdateHeapRates at 7ffb64959ad4 RtlpHpLfhOwnerMoveSubsegment at 7ffb64951704 EtwpDisableTraceProviders at 7ffb64966914 RtlReportSilentProcessExit at 7ffb6494ac00 RtlCopyContext at 7ffb64945ce0 LdrpLogFatalLdrEtwEvent at 7ffb64968ba4 EtwpFillProcessorStreamIndexMap at 7ffb64965b64 RtlQueryInformationActivationContext$fin$0 at 7ffb64984042 RtlCreateServiceSid at 7ffb648eb430 RtlDecompressBufferXpressHuff at 7ffb6493f860 LdrpProcessWork$fin$0 at 7ffb64983694 RtlpHeapListCompare at 7ffb649269f0 RtlQueryUnbiasedInterruptTime at 7ffb64943220 TpAllocPoolInternal at 7ffb64942934 TppWorkerThread$filt$6 at 7ffb64983ca3 RtlpComputePath at 7ffb6494b594 LdrGetKnownDllSectionHandle at 7ffb64962ce0 LdrRemoveLoadAsDataTable at 7ffb64952e40 RtlpHpSegPageRangeHandleCommit at 7ffb64927728 LdrResFallbackLangList at 7ffb64938350 LdrpSendPostSnapNotifications at 7ffb6490c9c4 sxsisol_RespectDotLocal at 7ffb649be8a0 LdrVerifyImageMatchesChecksumEx$filt$0 at 7ffb64985719 LdrpLogRelativePathWithAlteredSearchError at 7ffb6495ce94 RtlDebugFreeHeap$filt$0 at 7ffb649e5472 RtlpQueryPseudoEnvironmentVariable at 7ffb6496a100 LdrLoadDll at 7ffb64901680 RtlpBase64Encode at 7ffb64964018 RtlpReAllocateHeap at 7ffb64923010 RtlCheckTokenCapability at 7ffb648ee960 RtlSelfRelativeToAbsoluteSD2 at 7ffb64966a90 RtlpActivateLowFragmentationHeap$fin$0 at 7ffb64984423 RtlpMUIRegPatchLicenseInfortmation at 7ffb648f27d4 LdrpDecrementNodeLoadCountLockHeld at 7ffb6490f4e4 RtlDebugCreateTagHeap$filt$0 at 7ffb649e50ba LdrpInitializePerUserWindowsDirectory at 7ffb649606f0 RtlUnicodeToMultiByteSize at 7ffb64941e00 LdrLoadAlternateResourceModuleEx$fin$0 at 7ffb6498311e RtlGetParentLocaleName at 7ffb648eefe0 vscan_fn at 7ffb6497097c strtoxlX at 7ffb64971410 RtlpAddWnfUserSubToNameSub at 7ffb648e9ee8 RtlpValidateKeyTrust at 7ffb648e3cf8 _inc at 7ffb64975664 RtlUnicodeStringToAnsiString at 7ffb64941d30 RtlpAddForwarderPath at 7ffb649bdff8 XpressBuildHuffmanDecodingTable at 7ffb6493fd80 LdrpPrepareImportAddressTableForSnap at 7ffb64900f80 LdrVerifyImageMatchesChecksumEx$fin$3 at 7ffb64985754 LdrVerifyImageMatchesChecksumEx$fin$2 at 7ffb64985736 RtlpHpVaMgrRegionAllocate at 7ffb6492dcd4 OpenGlobalizationUserSettingsKey_ForSingleUserModel at 7ffb649f6198 LdrpSnapKernelBaseExtensions at 7ffb64901be0 LdrpMapDllSearchPath at 7ffb6490df48 TpStartAsyncIoOperation at 7ffb649423d0 RtlpGetStackTraceAddressEx at 7ffb64912dc0 RtlpMoveActCtxToFreeList$fin$0 at 7ffb649bec25 EtwpGetNextRegistration at 7ffb648e835c RtlRegisterWait at 7ffb649109e0 RtlUpdateProcessRegistryInfo at 7ffb6496a66c RtlSetSecurityDescriptorRMControl at 7ffb64964590 EtwpRelogEvent at 7ffb649653b4 RtlAddAce at 7ffb649483c0 RtlpHpStackLoggingEnabled at 7ffb6491fc80 TppBarrierAdjust at 7ffb649465bc LdrpCfgProcessLoadConfig at 7ffb6490090c OpenGlobalizationUserSettingsKey_ForMua at 7ffb649f5f58 EtwpCheckForPrivatePreEnable at 7ffb648eaa3c RtlCreateVirtualAccountSid at 7ffb649623b0 RtlpLocalInfoAllocFromCache at 7ffb6492d130 TppCancelWait at 7ffb649114d8 RtlExpandEnvironmentStrings_U at 7ffb648e28c0 RtlDebugSizeHeap$fin$1 at 7ffb649e61c1 RtlEnterUmsSchedulingMode$filt$0 at 7ffb649d396a RtlDebugReAllocateHeap$filt$0 at 7ffb649e5cbb RtlQueryWnfStateData$filt$0 at 7ffb64985155 RtlpGetLengthWithoutLastPathElement at 7ffb64956994 RtlpUnwindOpSlots at 7ffb6496236c PssNtValidateDescriptor$filt$0 at 7ffb649f1068 LdrpFindMessageInAlternateModule at 7ffb64947714 RtlpUninitializeAssemblyStorageMap at 7ffb64962534 RtlpRemoveUserSubFromNameSub at 7ffb648e645c RtlUnicodeStringToOemString at 7ffb64941620 RtlpTpWorkCallback$fin$0 at 7ffb649837d8 RtlWideCharArrayCopyWorker at 7ffb649098a4 RtlpConsoleFallbackNameFromLocaleName at 7ffb6494a5b8 RtlCompressBufferXpressHuff at 7ffb6493de80 RtlpHpVsSubsegmentCleanup at 7ffb64930e50 RtlAddFunctionTable at 7ffb64945400 EvtIntReportEventWorker$fin$0 at 7ffb64984466 EtwpLogger at 7ffb6494c940 TpSetWaitEx at 7ffb64911350 RtlpHpTagAllocateHeap at 7ffb6492d68c RtlpHpHeapLock at 7ffb648f70d8 RtlDebugSetUserValueHeap$filt$0 at 7ffb649e6020 RtlDebugZeroHeap$filt$0 at 7ffb649e6352 TppCleanupGroupMemberInitialize at 7ffb64917f2c RtlpHpLfhSlotAllocate at 7ffb6491ecf0 adapt at 7ffb648e2358 RtlpCreateDeferredCriticalSectionEvent at 7ffb648e7850 RtlDefaultNpAcl at 7ffb648e1e70 RtlpHpReAllocWithExceptionProtection$filt$0 at 7ffb649843b1 RtlpHpSegSizeInternal at 7ffb649247e8 RtlCreateTimer$fin$1 at 7ffb64983b8e LdrpGetLoadAsEntry$fin$0 at 7ffb649844d5 punycode_encode at 7ffb649602c0 TpTrimPools at 7ffb649401c0 RtlIpv6AddressToStringA at 7ffb649311b0 RtlAddAtomToAtomTableEx at 7ffb6493ad2c RtlRbRemoveNode at 7ffb6491a100 RtlWakeAllConditionVariable at 7ffb6494cc70 write_multi_char at 7ffb64972fd8 TpAllocCleanupGroup at 7ffb6495ccc0 EtwpAllocateFreeBuffers at 7ffb648e550c RtlpRegisterLockedMemoryZone at 7ffb6495344c TpDereferenceGlobalPool at 7ffb6495fdc4 RtlIpv6AddressToStringW at 7ffb64931620 LdrpMultiSZCchLength at 7ffb648eeeb4 RtlOemToUnicodeN at 7ffb64941900 EtwpInitLoggerContext at 7ffb648e471c RtlQueryImageFileKeyOption at 7ffb64959480 RtlpQueryExtendedInformationAllHeaps at 7ffb6494721c RtlCreateUserProcessEx at 7ffb649696f0 RtlpZeroBlockFromOffset at 7ffb64926ba8 RtlMultiByteToUnicodeSize at 7ffb64902130 LdrAddLoadAsDataTable$fin$0 at 7ffb64984dda LdrpAllocateTls$filt$0 at 7ffb64984519 RtlSetIoCompletionCallback$fin$1 at 7ffb649855b8 RtlStringExHandleFillBehindNullW at 7ffb649d6358 TppPoolAddWorker$fin$0 at 7ffb64983977 _SafeAllocBlob at 7ffb648f56dc Normalization__NormalizeCharacter at 7ffb6495d444 RtlPrefixString at 7ffb649413b0 RtlpComputeDllPath at 7ffb6494b4c0 RtlpUpdateHeapWatermarks at 7ffb64964354 LdrpQuerySxSMUIFile at 7ffb64956cd8 RtlSwitchedVVI at 7ffb64952340 LdrpNotifyLoadOfGraph at 7ffb6490c940 LdrpFindLoadedDllByMappingLockHeld at 7ffb6490a7dc RtlpAddVectoredHandler at 7ffb6495f2d0 _TlgEnableCallback at 7ffb64961220 RtlDeleteTimerQueueEx at 7ffb64961f70 punycode_decode at 7ffb6490c1b8 RtlpHpAllocateHeapInternal at 7ffb64925a64 RtlSetProcessPreferredUILanguages at 7ffb649643d0 ValidateStringParameter at 7ffb6493c35c RtlpTestHookInitialize at 7ffb6495bd70 LdrpGetFromMUIMemCache$fin$0 at 7ffb649831da xtoa at 7ffb6496cc6c LdrGetProcedureAddressForCaller at 7ffb648faf40 NLS_DOWNCASE at 7ffb649504d4 EtwpQueryRegString at 7ffb648e41a8 RtlGetActiveActivationContext at 7ffb6490d8b0 RtlpHpVaMgrAlloc at 7ffb6492d85c RtlpHpHeapDestroy at 7ffb6492f514 RtlpCopyEffectiveAce at 7ffb648f2128 LdrpProcessMachineMismatch at 7ffb64965924 RtlWow64SuspendThread at 7ffb648e23f0 RtlpFindAndCommitPages at 7ffb64921280 LdrpGetModuleInfoFromVirtualMemory at 7ffb649627d0 RtlpMuiRegTryToAppendLanguageName at 7ffb6494f7fc LdrpGetShimEngineInterface at 7ffb64948e10 RtlDeleteTimerQueueEx$fin$1 at 7ffb64985439 TpUnreserveTaskPost at 7ffb6490f2f0 RtlSetCurrentDirectory_U at 7ffb64955f40 RtlDeleteTimerQueueEx$fin$0 at 7ffb6498541b RtlSetDaclSecurityDescriptor at 7ffb648f2750 RtlGetElementGenericTable at 7ffb6495c1b0 RtlpGetLastContiguosBase64Position at 7ffb649d5fd0 ShipAssert$filt$0 at 7ffb649bd0b9 RtlLockMemoryBlockLookaside at 7ffb64953330 RtlStringCbPrintfExW at 7ffb649499d8 RtlpFreeUserBlock at 7ffb6492a664 EtwpSwitchBuffer at 7ffb64933a24 LdrpResSearchResourceMappedFile at 7ffb649364c0 LdrSetDllDirectory at 7ffb6495e940 EtwpIsPrivateLoggerOn at 7ffb64963264 EtwpAllocateTraceBufferPool at 7ffb648e5400 LdrpMinimalMapModule at 7ffb6490a130 RtlpDestroyHeapSegment at 7ffb6492a58c RtlVerifyVersionInfo at 7ffb64952110 RtlQueryProcessLockInformation$fin$0 at 7ffb649b7cfa RtlpHpCalculateAllocSize at 7ffb6492e550 TpAllocWait at 7ffb649111b0 LdrpInitializationFailure at 7ffb64968b50 LdrFlushAlternateResourceModules$fin$0 at 7ffb649857ff RtlpHpLargeAlloc at 7ffb649302c8 RtlpHpSegSubAllocate at 7ffb64956f18 RtlpValidFilterAclSubjectContext at 7ffb648efb00 GetOverlayFilePath at 7ffb6493b570 RtlpDosPathNameToRelativeNtPathName at 7ffb64907728 RtlpRemoveUCRBlock at 7ffb6495fe5c RtlpTpWaitCallback$fin$0 at 7ffb6498374d LdrResSearchResource at 7ffb64936160 TppWorkerThread at 7ffb64913d60 LdrAddLoadAsDataTable at 7ffb64951a80 RtlInitializeRXact at 7ffb64969e20 LdrpProtectedCopyMemory at 7ffb649598d0 LdrpLoadContextReplaceModule at 7ffb64950248 TppPoolpReferenceGlobalPool at 7ffb6490fc28 RtlpHpHeapCompact at 7ffb6492eb30 RtlCreateTimer$fin$0 at 7ffb64983b6d _RtlpMuiRegAddNeutralToInstalled at 7ffb648e93c4 LdrpReadMemory at 7ffb64941ff4 RtlUnicodeToMultiByteN at 7ffb64941e40 RtlLockMemoryZone at 7ffb649533a0 TppAlpcpFree$fin$0 at 7ffb6498545c RtlGetProductInfo at 7ffb64961780 RtlSetIoCompletionCallback$fin$0 at 7ffb6498559b RtlpVerifyAndCommitUILanguageSettings at 7ffb6496a510 RtlUnwindEx at 7ffb648fd510 RtlpOwnerAcesPresent at 7ffb648ee7c0 RtlpComputeCrcInternal at 7ffb64964bb0 _MuiRegAllocArray at 7ffb649ceac4 RtlDestroyAtomTable at 7ffb64967e50 RtlSidHashLookup at 7ffb64954550 RtlpIsDuplicateAce at 7ffb648f1f80 LdrpResGetMappingSize at 7ffb64938140 LdrpPrepareModuleForExecution at 7ffb6490a9d8 RtlpHpSizeHeapInternal at 7ffb649266a0 CsrCaptureMessageMultiUnicodeStringsInPlace at 7ffb6492b9c0 TppSingleTimerExpiration at 7ffb649163a0 RtlpHpTagContextAllocateTag at 7ffb6492e658 LdrpGetFileSizeFromLoadAsDataTable$fin$0 at 7ffb649831b9 LdrpAcquireTlsIndex at 7ffb64935b1c RtlpCSparseBitmapPageDecommit at 7ffb6492fc58 TpSetTimerEx at 7ffb64912470 LdrpMapAndSnapDependency at 7ffb64902f9c LdrLockLoaderLock at 7ffb6495b950 TppCallbackMayRunLongProlog at 7ffb64950058 RtlpHeapTrkGenerateHashRandoms at 7ffb649d8184 RtlIsValidProcessTrustLabelSid at 7ffb648ef100 InitializeTEBUserLangList at 7ffb648f5318 RtlpQueryRunLevel at 7ffb64955910 RtlpHpFreeHeap at 7ffb6491fd60 RtlCreateUserStack at 7ffb64954300 LdrpSetModuleSigningLevel at 7ffb6496b4d0 RtlpHpCheckAllocationSizeLimit at 7ffb64924b2c LdrpCallInitRoutine$fin$0 at 7ffb649834a6 Normalization__AppendDecomposedChar at 7ffb64967f04 TpCheckTerminateWorker at 7ffb6494cf60 RtlEqualPrefixSid at 7ffb648f25d0 RtlDeleteCriticalSection$fin$0 at 7ffb64983bf0 TppTimerQueueExpiration at 7ffb64916020 RtlReportFatalFailure$filt$0 at 7ffb649d9270 RtlpFindActivationContextSection_CheckParameters at 7ffb64907530 RtlpHpVaMgrRangeFind at 7ffb6492da40 NormBuffer__Append at 7ffb6495d63c TppCallbackEpilog at 7ffb64915250 LdrUnloadAlternateResourceModuleEx$fin$0 at 7ffb64984d13 LdrpFindOrPrepareLoadingModule at 7ffb6490aaf4 RtlpInitMuiCriticalSection at 7ffb648f2d4c RtlSetUserValueHeap at 7ffb6494e0a0 TpWaitForWait at 7ffb6490f130 RtlpHpVaMgrCtxAllocatorDereference at 7ffb649645bc RtlpSystemBootStatusRequest at 7ffb649641c0 RtlpLookupPrimaryFunctionEntry at 7ffb648e10f0 RtlpDidUnicodeToOemWork at 7ffb649417c4 RtlpHpVsSubsegmentCommitPages at 7ffb64964644 RtlpCallVectoredHandlers at 7ffb649584a0 RtlpTpIoLookup$fin$0 at 7ffb649855d8 LdrpLoadDllInternal at 7ffb649023f8 LdrProcessRelocationBlockLongLong at 7ffb64962c00 RtlpHeapTrkAllocCacheAligned at 7ffb649d7c7c LdrpInitializeImportRedirection at 7ffb6495ffe4 LdrResRelease at 7ffb6496b560 CsrClientCallServer at 7ffb6492b840 LdrpInitializeNode$filt$1 at 7ffb649849ce RtlLoadString at 7ffb649348a0 EtwpAddProviderTrackingInfo at 7ffb648e5210 RtlpGetActivationContextData at 7ffb64957400 LdrpAllocateTlsEntry at 7ffb649359d0 RtlpFreeHeap$fin$0 at 7ffb64984250 EtwReplyNotification at 7ffb648e2310 RtlCultureNameToLCID at 7ffb648f68a0 EtwpEventWriteFull at 7ffb64932734 LdrpLoadWow64 at 7ffb6496160c SbpRetrieveCompatibilityManifest at 7ffb6495a004 RtlpInitializeWnf at 7ffb6495b7e0 RtlpLoadLanguageConfigList at 7ffb648e8a20 RtlpInsertUCRBlock at 7ffb6492896c RtlAddGrowableFunctionTable at 7ffb64945610 RtlDestroyHandleTable at 7ffb64964250 RtlpNormalizeStringWorker at 7ffb6495d270 RtlpInsertInvertedFunctionTableEntry at 7ffb64900e9c RtlRemovePrivileges at 7ffb64969ab0 LdrpCheckForRetryLoading at 7ffb6490d614 TppInitializeTimerQueue at 7ffb6490ec00 TppCleanupGroupMemberDestroy$fin$0 at 7ffb64983fcd RtlpQueryPackageIdentityAttributes at 7ffb64949884 _whiteout at 7ffb6497a7b4 LdrEnsureMrdataHeapExists at 7ffb6495baa8 RtlGuardCheckImageBase at 7ffb649529ec TppAllocAlpcCompletion$fin$0 at 7ffb64984f8d RtlDeactivateActivationContextUnsafeFast at 7ffb64904e30 RtlpUpdateTEBLanguage at 7ffb6495bbb8 RtlInsertElementGenericTableFull at 7ffb64944180 RtlOemStringToUnicodeString$fin$0 at 7ffb64984650 LdrpLogDeprecatedDllEtwEvent at 7ffb6495c7ac TppTimerpExecuteCallback at 7ffb64910700 RtlUTF8ToUnicodeN at 7ffb6493eda0 RtlUpcaseUnicodeStringToCountedOemString$fin$0 at 7ffb649c8f2c EtwpAddInstanceIdToLogFileName at 7ffb648e4b28 RtlpTpIoDllLoaded at 7ffb64968588 LdrpIsReparsePoint at 7ffb649343c0 RtlpQueueWaitBlockToSRWLock at 7ffb64958b98 RtlQueryActivationContextApplicationSettings at 7ffb64957260 QueryRegistryValue at 7ffb6493b8e0 PsspFreeLinkedHandleList at 7ffb649f2f94 RtlpHeapTrkSyncWithDiagnoser at 7ffb649d8768 Normalization__LoadTables at 7ffb64969520 RtlEmptyAtomTable at 7ffb64968000 RtlRaiseException at 7ffb64949ef0 LdrpAcquireLoaderLock at 7ffb6490d83c TppWorkpExecuteCallback at 7ffb649107f0 RtlpAllocateHeapInternal at 7ffb6491b8f0 RtlAddAuditAccessObjectAce at 7ffb64967ad0 TppPoolRemoveWorker$fin$0 at 7ffb64985051 RtlpHpVaMgrCtxAllocatorFind at 7ffb6492c858 LdrpTouchThreadStack at 7ffb64960c40 RtlValidateHeap at 7ffb6494fd50 RtlpGetNameFromLangInfoNode at 7ffb64961440 RtlInitializeCriticalSectionEx at 7ffb64915d00 RtlpFreeHeap at 7ffb64921960 RtlpIdnToUnicodeWorker at 7ffb6490c040 RtlQueryImageFileExecutionOptions at 7ffb649593e0 LdrpFastpthReloadedDll at 7ffb64902664 LdrpInitializeTls at 7ffb64934ab8 RtlpHpVsChunkCoalesce at 7ffb64919660 LdrpCalcAllocSize at 7ffb64939764 LdrAddDllDirectory at 7ffb6496bc00 RtlpNtQueryValueKey at 7ffb6495a710 x64tow_s at 7ffb649765bc RtlpTpIoDllLoaded$fin$0 at 7ffb64985559 RtlFreeHeap at 7ffb6491fbc0 RtlDosSearchPath_Ustr at 7ffb649058d0 LdrLockLoaderLock$filt$0 at 7ffb64985105 TppIsWorkerThread at 7ffb6494cfac RtlpGetLegacyContextLength at 7ffb64945f84 RtlDeleteCriticalSection at 7ffb64912bb0 RtlpEnsureBufferSize at 7ffb6495edb0 AVrfDllLoadNotification at 7ffb64962e00 RtlpLowFragHeapAllocFromContext at 7ffb6491c260 RtlpMuiRegLoadRegistryInfo at 7ffb648e8720 RtlpSysVolCheckOwnerAndSecurity at 7ffb64966404 _exception_enabled at 7ffb64973ffc RtlOsDeploymentState$fin$0 at 7ffb649dba34 RtlApplyRXact at 7ffb64968fe0 LdrInitSecurityCookie at 7ffb64900594 XpressBuildHuffmanEncodings at 7ffb6493e9f0 RtlpHpLfhSubsegmentDecBlockCounts at 7ffb6492efd0 EtwpFindRegistration at 7ffb648e844c RtlDebugAllocateHeap$fin$1 at 7ffb649e4b4d RtlpQueryReadVirtualMemory at 7ffb64959170 LdrQueryProcessModuleInformationEx2$fin$0 at 7ffb649aee03 RtlpSetProcUserMachineLangList at 7ffb648f51cc sxsisol_ExpandEnvironmentStrings_UEx at 7ffb649be6d8 RtlpTpTimerCallback$fin$0 at 7ffb64983a6b RtlpWnfWalkUserSubscriptionList$fin$0 at 7ffb649830b0 RtlUnlockHeap at 7ffb648f9c70 RtlpHpVaMgrCtxFree at 7ffb6492f0d0 RtlAnsiCharToUnicodeChar at 7ffb64943160 TpSimpleTryPost$fin$2 at 7ffb64983f86 TpSimpleTryPost$fin$0 at 7ffb64983f19 TpSimpleTryPost$fin$1 at 7ffb64983f3a RtlpMuiRegGetInstalledLangInfoIndex at 7ffb64958f50 RtlAddAccessDeniedObjectAce at 7ffb64967a80 RtlpResUltimateFallbackInfo at 7ffb64938720 RtlpHpSegMgrRelease at 7ffb6492fbe4 tan_piby4 at 7ffb649719b0 xtoa_s at 7ffb649763f0 LdrpSnapModule at 7ffb648fc690 TppCleanupGroupMemberDestroy$fin$1 at 7ffb64983ff2 TppCleanupGroupAddMember$fin$0 at 7ffb649847a4 RtlUpcaseUnicodeString$fin$0 at 7ffb649830c6 RtlSetThreadPreferredUILanguages at 7ffb648f2a10 RtlIsNameInUnUpcasedExpression$fin$0 at 7ffb649d51d2 RtlpWin32NtNameToNtPathName at 7ffb64906058 RtlDebugWalkHeap$filt$0 at 7ffb649e6258 RtlExtendMemoryZone at 7ffb648e25f0 RtlpHeapTrkDereferenceStack at 7ffb649d7da8 RtlZeroHeap$fin$1 at 7ffb649d3019 RtlReleaseSRWLockShared at 7ffb648fab70 RtlCreateTimerQueue at 7ffb64960cf0 sxsisol_SearchActCtxForDllName at 7ffb6490685c RtlpHpVaMgrRangeCoalesce at 7ffb6492db80 RtlAllocateHeap at 7ffb6491b870 RtlCreateSystemVolumeInformationFolder at 7ffb64966010 TppAllocAlpcCompletion$fin$1 at 7ffb64984fbb TppCleanupGroupMemberDestroy at 7ffb6491757c RtlpRemoveVectoredHandler at 7ffb649608c0 RtlStringCbCopyW at 7ffb648f6f64 SwapSplayLinks at 7ffb649446ac RtlpReAllocateHeap$fin$4 at 7ffb6498435c LdrpReportError at 7ffb6494ed88 RtlDebugQueryTagHeap$fin$1 at 7ffb649e5780 RtlZeroHeap$filt$0 at 7ffb649d2ffb TpAllocWork$fin$0 at 7ffb6498474c RtlLargeIntegerToChar at 7ffb648e18f0 RtlpHpMetadataCommit at 7ffb6492e9a4 EtwpNotificationThread at 7ffb648e7e90 RtlpIsALicensedLIPLanguage at 7ffb648eef6c RtlAddSIDToBoundaryDescriptorEx at 7ffb6495ddf0 LdrVerifyImageMatchesChecksumEx at 7ffb64969090 LdrpFreeLoadContext at 7ffb649449b8 TppCleanupGroupRemoveMember$fin$0 at 7ffb64984e4a RtlFindSetBits at 7ffb6496ac00 TppCancelTimer at 7ffb649125fc RtlGetUserInfoHeap$fin$1 at 7ffb64984c4e RtlCreateEnvironmentEx at 7ffb6493c580 RtlSetLastWin32Error at 7ffb64933590 RtlpHpLfhSubsegmentFreeBlock at 7ffb6491b130 EtwNotificationRegister at 7ffb648ea800 RtlpAffinitizeSegmentInfoForBucket at 7ffb6494f990 LdrpTouchThreadStack$filt$0 at 7ffb6498536c RtlpQueryRegistryDirect at 7ffb648e3c3c RtlGetNtSystemRoot at 7ffb649092e0 RtlpDereferenceAtom at 7ffb6493aac8 RtlpHpLfhBucketAddSubsegment at 7ffb64930798 RtlQueryProcessHeapInformation$fin$0 at 7ffb649b7a54 RtlDebugAllocateHeap$filt$0 at 7ffb649e4b2f LdrpHandleTlsData$filt$0 at 7ffb649844f6 RtlDowncaseUnicodeString at 7ffb64950430 RtlEncodePointer at 7ffb6494f5d0 ReadStringDelimited at 7ffb649754dc RtlConvertSRWLockExclusiveToShared at 7ffb64963e70 RtlHashUnicodeString at 7ffb64907470 SbpUpdateCache at 7ffb6494c544 RtlQueryEnvironmentVariable at 7ffb648fa2f0 RtlpWalkFrameChain$filt$0 at 7ffb6498328f RtlpWnfNotificationThread at 7ffb648e65d0 RtlpWnfProcessCurrentDescriptor at 7ffb648e66ec RtlFxToFnFrame at 7ffb64965748 EtwpRegisterGuidsApiCallback at 7ffb648e7a48 _LdrpInitialize at 7ffb6495186c RtlpCreateUserProcess at 7ffb649697b0 RtlpQueryDefaultUILanguage at 7ffb648e7b50 TppWorkWait at 7ffb64911d18 RtlNtStatusToDosErrorNoTeb at 7ffb64953a70 RtlpWalkHeapInternal at 7ffb6493094c LdrpLogLoadFailureEtwEvent at 7ffb6495cba8 RtlpComputeLangListCheckSum at 7ffb648f8a74 RtlGetThreadWorkOnBehalfTicket at 7ffb6494a700 LdrpResReportResourceAccessInternal at 7ffb648ea590 RtlpQueryExtendedHeapInformation at 7ffb6494713c RtlpHpVsChunkSize at 7ffb64928290 RtlNormalizeProcessParams at 7ffb64969a90 RtlWow64PopCrossProcessWorkFromFreeList$filt$0 at 7ffb649dca61 LdrpLangFallbackListAppendNode at 7ffb648f6580 RtlpHpAllocVA at 7ffb649273c8 RtlIntegerToUnicode at 7ffb648f4840 RtlpHpStackTraceHeapDestroy at 7ffb6492a628 RtlDebugQueryTagHeap$filt$0 at 7ffb649e5762 RtlCharToInteger at 7ffb6494ebe0 LdrpMapDllNtFileName at 7ffb6490d434 TppWorkpFree$fin$0 at 7ffb64984f23 RtlDuplicateUnicodeString$fin$0 at 7ffb64984f61 LdrpFindExistingModule at 7ffb6490e720 RtlCreateUnicodeString$fin$0 at 7ffb64983647 RtlpResolveAssemblyStorageMapEntry at 7ffb64950be8 RtlWow64GetCurrentCpuArea at 7ffb64945e40 LdrMapAndVerifyResourceFile at 7ffb649392b0 RtlCreateAtomTableEx at 7ffb6493a940 RtlQueueWorkItem$fin$0 at 7ffb6498386d RtlpLoadNlsData at 7ffb6495ad98 RtlInsertElementGenericTableFullAvl at 7ffb649439d0 RtlCutoverTimeToSystemTime at 7ffb6493d620 LdrpInitializeProcess$fin$0 at 7ffb649b47ba RtlpGetDeviceFamilyInfoEnum at 7ffb64954760 LdrpGetAlternateResourceModuleHandleEx$fin$0 at 7ffb649c0658 RtlUpcaseUnicodeStringToOemString at 7ffb64941530 RtlGetProcessPreferredUILanguages at 7ffb649684b0 RtlpHpVsContextInitialize at 7ffb6492c2ec RtlpOpenThreadToken at 7ffb649556e8 RtlDosApplyFileIsolationRedirection_Ustr at 7ffb64906440 LdrpCallTlsInitializers$filt$0 at 7ffb6498357e TpCallbackMayRunLong at 7ffb6494fff0 TpCallbackIndependent at 7ffb64913230 EtwProcessPrivateLoggerRequest at 7ffb648e4440 LdrUnlockLoaderLock at 7ffb6495c660 RtlpUpcaseUnicodeStringPrivate$fin$0 at 7ffb649d581d RtlpNtEnumerateSubKey at 7ffb6495f100 RtlGetCurrentDirectory_U at 7ffb649561a0 RtlCreateUmsThreadContext$fin$0 at 7ffb649d3742 RtlpMuiRegGetInstalledLanguageIndex at 7ffb648f62a0 RtlContractHashTable at 7ffb6495f950 GetLCIDFromLangListNodeWithLICCheck at 7ffb648f36cc RtlpCreateLowFragHeap at 7ffb6492ab7c LdrpMapResourceFile at 7ffb649393c4 RtlDetermineDosPathNameType_Ustr at 7ffb6490899c LdrpEnableParallelLoading at 7ffb64942570 StringCbPrintfW at 7ffb648e283c TimeToDaysAndFraction at 7ffb64959c38 RtlpAddDebugInfoToCriticalSection at 7ffb64913ac0 RtlpHpSegSegmentFree at 7ffb6492f7a8 RtlSelfRelativeToAbsoluteSD at 7ffb649478a0 RtlpCopyAces at 7ffb648efb7c LdrShutdownProcess at 7ffb6494a9d0 sxsisol_CanonicalizeFullPathFileName at 7ffb649075a8 LdrpLoadDependentModule at 7ffb649031f0 RtlpWakeConditionVariable at 7ffb64958a74 RtlCheckTokenMembershipEx at 7ffb648f3340 RtlpGetLCIDFromLangInfoNode at 7ffb64962970 RtlUpcaseUnicodeStringToOemString$fin$0 at 7ffb649845d6 RtlDecodePointer at 7ffb649477a0 TppCallbackCheckThreadBeforeCallback at 7ffb649568c8 x64toa_s at 7ffb649762bc ReadString at 7ffb64975314 RtlDeriveCapabilitySidsFromName at 7ffb649014d0 RtlpHpHeapCheckCommitLimit at 7ffb64927674 RtlDowncaseUnicodeString$fin$0 at 7ffb64984d7f RtlpMuiRegLoadPreferredUILanguages at 7ffb648e8c14 LdrpAllocateTlsEntry$filt$0 at 7ffb64984543 RtlCompressBufferXpressHuffStandard at 7ffb6493dee0 RtlpCreateNewDirectoryReference at 7ffb64956404 RtlStringFromGUIDEx at 7ffb64949c60 LdrpFindLoadedDllByMapping at 7ffb6490dc90 RtlUnicodeStringValidateWorker at 7ffb649099b4 TppValidateCleanupGroupMember at 7ffb649165c4 LdrpAllocateFileNameBufferIfNeeded at 7ffb6490588c LdrpAllocateModuleEntry at 7ffb6490ad14 RtlpCheckHeapSignature at 7ffb648f9cf4 LdrpHandleTlsData at 7ffb649352e4 TppAlpcpValidateAlpc at 7ffb6495814c LdrpFindLoadedDll at 7ffb64901988 RtlpValidateHeapEntry at 7ffb6494fea4 RtlpDecommitBlock at 7ffb64927994 RtlpHpTagQueryTags at 7ffb64947440 RtlpHpSegMgrReserve at 7ffb6492e2cc RtlCompressWorkSpaceSizeXpressLz at 7ffb64968ed0 RtlpMuiRegAddMultiSzToLangFallbackList at 7ffb648f5fb4 RtlpHpFreeVA at 7ffb64927b70 RtlpLoadUserUIByPolicy at 7ffb648e9270 EtwpGetNextAvailableLoggerId at 7ffb648e4634 RtlpLoadInstallLanguageFallback at 7ffb6496b194 RtlCompactHeap$fin$1 at 7ffb649856cf RtlDeactivateActivationContext at 7ffb6494e500 write_string at 7ffb64973030 RtlpGetDefaultsSubjectContext at 7ffb648ef170 LdrpSetAlternateResourceModuleHandle$fin$0 at 7ffb64984566 RtlpWnfSetRetryTimer at 7ffb6496b724 TpAllocJobNotification at 7ffb6495da70 RtlFindUnicodeSubstring at 7ffb64965ab0 RtlNtStatusToDosError at 7ffb64933610 EtwRegisterTraceGuidsW at 7ffb648ea300 RtlpWow64OpenThreadProcess at 7ffb648e2504 RtlSleepConditionVariableCS at 7ffb64940790 xtow_s at 7ffb64976700 PsspDumpObject_Section at 7ffb649f2390 RtlpFreeActivationContextStackFrame at 7ffb6494e608 PsspDumpObject_Event at 7ffb649f2290 RtlpImageDirectoryEntryToDataEx at 7ffb648fc55c RtlpHpVsChunkSplit at 7ffb649198a0 RtlpHpLargeFree at 7ffb64930144 RtlpHpSegContextCompact at 7ffb6492ebd0 RtlpHeapTrkTrackAdd at 7ffb649d87e4 RtlRegisterWait$fin$1 at 7ffb64983ad1 RtlRegisterWait$fin$0 at 7ffb64983ab3 RtlCompareUnicodeStrings at 7ffb648fa0c0 RtlUpcaseUnicodeToMultiByteN at 7ffb649419b0 RtlDispatchAPC at 7ffb6495c940 LdrpFindLoadedDllByNameLockHeld at 7ffb649028cc RtlInitializeCriticalSectionAndSpinCount at 7ffb64943f40 RtlpWaitOnAddressRemoveWaitBlock at 7ffb648e76b4 TppWorkCallbackPrologRelease at 7ffb64912f8c LdrpMapDllWithSectionHandle at 7ffb64909f7c RtlQueueWorkItem at 7ffb6490f850 RtlpFilterandReplaceConsoleLanguages at 7ffb6494a3f8 RtlSetUnhandledExceptionFilter at 7ffb6495e370 RtlpHeapTrkDumpStacks at 7ffb649d7fb0 RtlCreateQueryDebugBuffer at 7ffb6493a700 RtlpSecMemFreeVirtualMemory at 7ffb64927b20 LdrpFindDllActivationContext at 7ffb6494ec84 EtwpFinalizeLogFileHeader at 7ffb64966c00 RtlpReAllocateHeapInternal at 7ffb64922d40 WerpGlobalFlagsForProcess at 7ffb6494b03c RtlAddAccessAllowedObjectAce at 7ffb64967b30 TpSetDefaultPoolStackInformation at 7ffb6495e080 LdrpDereferenceModule at 7ffb648fb6f8 RtlLockCurrentThread at 7ffb649614e0 EtwGetTraceLoggerHandle at 7ffb6495fb90 RtlpGetMUIRedirectedFilePathInternal at 7ffb64939dac RtlAcquireResourceShared at 7ffb6493f510 RtlCreateUserStack$filt$1 at 7ffb64984e7e RtlCreateUserStack$filt$0 at 7ffb64984e6c LdrpProtectAndRelocateImage$filt$0 at 7ffb649853f8 LdrpSearchPath at 7ffb6490d97c StringCopyWorkerW at 7ffb648e42e0 TpAllocPoolInternal$fin$1 at 7ffb649847e3 TpAllocPoolInternal$fin$0 at 7ffb649847c6 TpAllocPoolInternal$fin$2 at 7ffb64984822 TpCheckTerminateWorker$filt$0 at 7ffb64984b1d RtlpHeapTrkFindStack at 7ffb649d8104 EtwpWaitForBufferReferenceCount at 7ffb6494ce80 LdrpGetDataModulePath at 7ffb649344fc RtlpHpSegLfhAllocate at 7ffb64916dd0 RtlSetThreadIsCritical at 7ffb6496a080 EtwpWriteToPrivateBuffers at 7ffb64932a0c LdrpQueueWork at 7ffb649503a4 RtlpMuiRegCreateAndLoadRegistryInfo at 7ffb648e85c8 RtlGetUserPreferredUILanguages at 7ffb6495ab10 RtlFindActivationContextSectionGuid at 7ffb64906260 RtlpHeapFindListLookupEntry at 7ffb6492552c LdrpReleaseLoaderLock at 7ffb6490d7dc LdrRelocateImageWithBias at 7ffb64962b08 TpWaitForTimer at 7ffb64911d90 RtlUpcaseUnicodeToOemN at 7ffb64941a10 LdrpInitializeNode at 7ffb64949254 LdrpPreprocessDllName at 7ffb649052c0 RtlpIsSubSegmentReuseThresholdExceeded at 7ffb64922c08 RtlVirtualUnwind at 7ffb648fccd0 RtlpHpSegLfhVsCommit at 7ffb64926db0 RtlGetAppContainerSidType at 7ffb648ec330 LdrpDrainWorkQueue at 7ffb6490e7bc RtlReleaseRelativeName at 7ffb64905fb0 EtwpProcessNotification at 7ffb648e8510 RtlWow64IsWowGuestMachineSupported at 7ffb6495e610 RtlpWaitOnAddress at 7ffb648e7424 LdrpDoPostSnapWork at 7ffb64935230 RtlIntegerToChar at 7ffb64901340 RtlUpdateTimer$fin$0 at 7ffb64985281 RtlDebugCompactHeap$filt$0 at 7ffb649e4c82 RtlpPlaceActivationContextOnLiveList$fin$0 at 7ffb649becbb RtlpCapabilityCheckSystemCapability at 7ffb648e9910 RtlCapabilityCheckForSingleSessionSku at 7ffb64965dd0 EtwpSetProviderTraits at 7ffb648ea434 LdrResolveDelayLoadedAPI at 7ffb648f87b0 LdrpGetDllPath at 7ffb64911fc8 TppWorkInitialize at 7ffb64917768 LdrpLogDelayLoadTrigger at 7ffb649010dc RtlGetFileMUIPath at 7ffb64939790 RtlCreateUmsCompletionList$fin$0 at 7ffb649d362a SwitchedRtlGetVersion at 7ffb6495278c RtlAnsiStringToUnicodeString at 7ffb64904bf0 EtwpReleasePrivateBuffers at 7ffb649329b8 RtlMultiAppendUnicodeStringBuffer at 7ffb64909710 RtlpNameprepAsciiRealWorker at 7ffb6490b1c4 EtwpEventApiCallback at 7ffb648eb0d4 EtwpStartUmLogger at 7ffb648e59b8 RtlSendMsgToSm at 7ffb6496a9f0 RtlpHpVaMgrCtxAllocatorReference at 7ffb6492c7c4 RtlpWow64CtxFromAmd64 at 7ffb64965560 RtlUnicodeStringToInteger at 7ffb64953e80 LdrpValidateIntegrityContinuity at 7ffb64962720 EtwpTrackRegBinaryInfo at 7ffb6495fd54 RtlDebugCompactHeap$fin$1 at 7ffb649e4ca0 RtlpFindNextActivationContextSection at 7ffb64906ed4 RtlLogStackBackTraceEx at 7ffb64913d1c SbpUpdateCacheWithCurrentImpl at 7ffb6490d090 LdrpWriteBackProtectedDelayLoad at 7ffb64934e7c RtlpFindUnicodeStringInSection at 7ffb649071dc RtlpLookupFunctionEntryForStackWalks$filt$0 at 7ffb649832c3 RtlpHpSegMgrCommit at 7ffb64927244 RtlpCopyLegacyContextX86 at 7ffb64945fd4 LdrpDetectDetour at 7ffb64942f2c RtlConvertExclusiveToShared at 7ffb64969df0 TppExecuteWaitCallback at 7ffb64910508 LdrpQueryValueKey at 7ffb648e90d4 AppModelPolicy_GetPolicy_Internal at 7ffb64949528 xtow at 7ffb6496ce28 RtlpAddHeapToProtectedList at 7ffb64928358 RtlpWaitOnCriticalSection at 7ffb648e7200 RtlpGetNormalization at 7ffb6495d66c RtlGuardCheckLongJumpTarget at 7ffb64957d90 RtlFindCharInUnicodeString at 7ffb64908b00 EtwpWriteToPrivateBuffers$filt$0 at 7ffb649844a1 RtlpCollectFreeBlocks at 7ffb649278d4 RtlpGetPolicyValueForSystemCapability at 7ffb648e9998 RtlStringCchLengthW at 7ffb648f6c48 RtlSetUserFlagsHeap$filt$0 at 7ffb649cfa9c TpAllocIoCompletion$fin$1 at 7ffb649846f4 TpAllocIoCompletion$fin$0 at 7ffb649846cd PsspDumpObject_Mutant at 7ffb649f22d0 RtlpNewSecurityObject at 7ffb648f00c4 RtlStringCchPrintfExW at 7ffb64931fd0 RtlpCreateUCREntry at 7ffb649287f4 RtlDebugSetUserValueHeap$fin$1 at 7ffb649e603e EtwEnumerateProcessRegGuids$fin$0 at 7ffb649eccea RtlDebugZeroHeap$fin$1 at 7ffb649e6370 RtlpHpVaMgrCtxAlloc at 7ffb6492d7ec RtlRemoveEntryHashTable at 7ffb64957be0 RtlpGrowBlockInPlace at 7ffb6492403c RtlMakeSelfRelativeSD at 7ffb64947a80 ReadUlongFromKey at 7ffb64954988 TppPoolUpdateTrimmedWorker at 7ffb6495891c RtlRunEncodeUnicodeString at 7ffb649686b0 RtlpTpInitializeData at 7ffb64910e7c RtlAllocateAndInitializeSidEx at 7ffb64969fc0 EtwEventActivityIdControl at 7ffb64945b90 TppWorkInitialize$fin$0 at 7ffb64984015 RtlpWow64SuspendThreadWorker at 7ffb649bb8f0 RtlSetUserFlagsHeap$fin$1 at 7ffb649cfaba EtwpDequeueFreeBuffer at 7ffb64933b54 EtwpTraceUmMessage at 7ffb64968cec RtlGetActiveConsoleId at 7ffb64961750 RtlpHeapTrkTrackRemove at 7ffb649d88bc RtlQueryWnfStateDataWithExplicitScope$filt$0 at 7ffb6498549a RtlpCopyContext at 7ffb648fe100 RtlDeleteTimer at 7ffb64910c60 RtlGetFullPathName_Ustr at 7ffb64907bf0 LdrGetDllHandleByName$filt$0 at 7ffb64984ee4 RtlpEnterCriticalSectionContended at 7ffb648fb450 TpSetDefaultPoolStackInformation$fin$0 at 7ffb649852bf RtlpMuiRegGetInstalledLanguageIndexByName at 7ffb648f5820 RtlDebugSizeHeap$filt$0 at 7ffb649e61a3 RtlpSetSecurityObject at 7ffb6495af40 TppIopValidateIo at 7ffb64942370 RtlpCreateUserThreadEx at 7ffb648e5760 RtlStringVPrintfWorkerW at 7ffb64949ae4 RtlInsertEntryHashTable at 7ffb64946bd0 RtlpLowFragHeapAllocateFromZone at 7ffb6494d87c RtlConvertSharedToExclusive at 7ffb6493f3e0 TppSetTimer at 7ffb64912720 RtlAcquireSRWLockExclusive at 7ffb649194a0 RtlDecompressBufferXpressLz at 7ffb649674e0 RtlUpdateTimer$fin$1 at 7ffb6498529f RtlLookupAtomInAtomTable at 7ffb6493af40 RtlSetHeapInformation at 7ffb64958c40 MD5Update at 7ffb64940a70 LdrpQueryInformationCurrentProcess at 7ffb64968e70 TppJobpRundownJob at 7ffb6495d918 RtlDeregisterWaitEx at 7ffb6490fea0 LdrpIncrementModuleLoadCount at 7ffb6490230c PsspDumpObject_Thread at 7ffb649f2440 RtlpHpSegPageRangeCommit at 7ffb64926ed0 RtlpCallQueryRegistryRoutine at 7ffb648e3870 LdrpSnapModule$filt$0 at 7ffb64983240 RtlAcquireSRWLockShared at 7ffb648fa9c0 EtwpRelogEvent$fin$0 at 7ffb6498553b RtlGetThreadPreferredUILanguages at 7ffb648f3b50 RtlpEnsureLiveDeadListsInitialized$fin$0 at 7ffb649beaf0 RtlAnsiStringToUnicodeString$fin$0 at 7ffb64983460 LdrpLogDllState at 7ffb64905628 BuildOverlayFilePath at 7ffb6493b834 RtlpSysVolCreateSecurityDescriptor at 7ffb649662a8 XpressDoHuffmanPass at 7ffb6493e700 RtlpHashStringToAtom at 7ffb6493b080 TppJobpValidateJob at 7ffb6495da08 EtwpAddReloggedHeaderExtensionEvents at 7ffb64966e5c RtlCreateMemoryBlockLookaside at 7ffb6494e8b0 RtlpQueryPseudoEnvironmentVariable$fin$0 at 7ffb649857b0 EtwpReserveTraceBuffer at 7ffb6493304c RtlDispatchException at 7ffb6494a070 LdrpInitShimEngine at 7ffb64948890 LdrProtectMrdata at 7ffb64915f98 RtlInstallFunctionTableCallback at 7ffb64944ad0 LdrResolveDelayLoadedAPI$fin$0 at 7ffb6498314b RtlpDetermineDosPathNameType4 at 7ffb64956a94 LdrpLoadShimEngine at 7ffb64948a34 LdrpFindKnownDll at 7ffb649093cc RtlpHpSegPageRangeAllocate at 7ffb64917000 RtlpWnfMarkFailure at 7ffb6496bb4c RtlStringCchPrintfW at 7ffb648ec23c TppAlpcpExecuteCallback at 7ffb64913320 LdrQueryInLoadOrderModuleList32 at 7ffb649622a0 RtlpHpSegFree at 7ffb649249c4 RtlpHpReAllocateHeap at 7ffb64924414 RtlGetCurrentUmsThread at 7ffb6493d550 RtlpOpenBaseImageFileOptionsKeyEx at 7ffb64952d0c RtlRunOnceExecuteOnce at 7ffb648eafd0 LdrpSystem32 at 7ffb64a45330 ZwCreateTimer2 at 7ffb6497d880 RtlSetOwnerSecurityDescriptor at 7ffb648f0010 WinSqmSetDWORD at 7ffb6495f7c0 LdrpUnmapModule at 7ffb6494fc18 LdrpCheckRedirection at 7ffb649b5660 _newclmap at 7ffb64a000b0 RtlpMuiRegCreateLanguageList at 7ffb648f564c RtlIsValidLocaleName at 7ffb649d6d40 ZwRenameTransactionManager at 7ffb6497ee40 RtlpLocateActivationContextSectionForQuery at 7ffb64955d1c EtwpInitializeCompression at 7ffb649ee614 DbgQueryDebugFilterState at 7ffb649bfd60 __PchSym_ at 7ffb64a43438 Wow64ApcRoutine at 7ffb64a5a228 RtlpLockAtomTable at 7ffb6493b1e8 RtlStdLogStackTrace at 7ffb649dafd0 ZwCreateNamedPipeFile at 7ffb6497d6a0 RtlWakeAddressAll at 7ffb648e6fb0 NtGetContextThread at 7ffb6497de40 TppETWTimerCancelled at 7ffb649ef81c ZwCreateDirectoryObject at 7ffb6497d4e0 `AppModelPolicy_GetPolicy_Internal'::`2'::AppModelPolicy_PolicyValue_Table at 7ffb64a01890 RtlCreateUserSecurityObject at 7ffb649b6ef0 control87 at 7ffb64973cbc RtlpTpIoTree at 7ffb64a460a8 ZwNotifyChangeDirectoryFileEx at 7ffb6497e300 PsspWalkInfoClass_PSS_WALK_AUXILIARY_PAGES at 7ffb649f30cc RtlpHpVsChunkAlignSplit at 7ffb649ebe18 RtlpCriticalSectionVerifier at 7ffb64a46551 RtlImageRvaToSection at 7ffb648ff050 RtlpHpAppCompatEnablePaddingAndLFHSubsegmentCommit at 7ffb649ea900 strcpy at 7ffb64970ab0 RtlAllocateHandle at 7ffb6493b350 WerpCreateCompletionEvent at 7ffb649bca9c RtlpLogHeapUnlockEvent at 7ffb649e3cf4 RtlpHpSegMgrCommitComplete at 7ffb649eb5e4 LdrpThunkSignature at 7ffb64a460d0 EtwpFreeRegistration at 7ffb649332b8 ZwDeleteBootEntry at 7ffb6497da20 _raise_securityfailure at 7ffb6496c1d4 fltused at 7ffb64a3fac0 LdrpAppendAnsiStringToFilenameBuffer at 7ffb6490216c RtlpOptimalFlushMethod at 7ffb64a427d8 ZwAlpcRevokeSecurityContext at 7ffb6497d1c0 fclrf at 7ffb6497611a RtlpHpTagContextUpdate at 7ffb64926994 _real at 7ffb649ff610 RtlpMuiRegLoadLicInformation at 7ffb649de9a0 strncpy_s at 7ffb64977790 NtDeleteValueKey at 7ffb6497dae0 RtlGetCriticalSectionRecursionCount at 7ffb649c6a60 ZwWriteVirtualMemory at 7ffb6497c7f0 RtlInitStringEx at 7ffb649c9040 NtCreateProcessEx at 7ffb6497ca50 TppCritResetThread at 7ffb6495e220 RtlpValidateHeapTagsEnable at 7ffb64a438c0 GuidFormat at 7ffb649fdbe0 WinSqmSetEscalationInfo at 7ffb64964ae0 RtlpMuiRegInitAnyLanguage at 7ffb649dfc48 ComposeHangulLVT at 7ffb649d9338 NtInitializeEnclave at 7ffb6497dfc0 RtlpHpTagMappingComparison at 7ffb64953178 RtlpCopyBitMapTailToHead at 7ffb649ca4b8 RtlSetCriticalSectionSpinCount at 7ffb649516c0 RebalanceNode at 7ffb64943de4 g_pfnSE_InstallBeforeInit at 7ffb64a5a250 WinSqmSetString at 7ffb6495f7c0 RtlpUmsThreadYield at 7ffb64980e03 LdrpCriticalLoaderFunctions at 7ffb649f8ed0 wcsspn at 7ffb64971f60 RtlpHpTagContextGetTag at 7ffb6497b7a4 ZwAlertThread at 7ffb6497ce60 RtlReportExceptionEx at 7ffb649bbc00 TlgDefineProvider_annotation__Tlgg_LibLoaderProviderProv at 7ffb649b0df0 LdrpLogLevelStateTable at 7ffb649f84c0 M_strAceIdnPrefix at 7ffb649fcb90 RtlGetCompressionWorkSpaceSize at 7ffb649600f0 UserDiagnosticGuid at 7ffb64a0c210 towlower at 7ffb64971c30 snscanf_s at 7ffb64976a50 InsertModuleFunctions<_IMAGE_THUNK_DATA64,unsigned __int64,-9223372036854775808> at 7ffb649bf5a0 RtlGetGroupSecurityDescriptor at 7ffb6495aad0 RtlSetLastWin32ErrorAndNtStatusFromNtStatus at 7ffb64933570 _realc010000000000000 at 7ffb649ff5f0 LdrpThreadPool at 7ffb64a461b0 RtlpRegTziFormatToTzi at 7ffb648e2f24 ZwQuerySystemInformationEx at 7ffb6497ec00 RtlStringCchCatW at 7ffb649cbec8 LdrInitShimEngineDynamic at 7ffb649b0e80 TlgCreateSz at 7ffb649b0d78 NtFilterBootOption at 7ffb6497dc60 LdrpAppPackagesPath at 7ffb64a44390 WinSqmGetInstrumentationProperty at 7ffb649bd9b0 Normalization__LoadClassMapExceptions at 7ffb64969698 RtlpStackDbStackComparitor at 7ffb649f5f38 Normalization__CanCombineWithStartBase at 7ffb649d9bf8 iswctype_l at 7ffb6496fae0 strrchr at 7ffb649712a0 PsspCaptureHandleTrace at 7ffb649f1248 ZwIsProcessInJob at 7ffb6497ca90 RtlpNlsGetLcidIndex at 7ffb648f6d24 ZwAlpcDeleteResourceReserve at 7ffb6497d080 LdrpValidateUserCallTarget at 7ffb6496c4f0 ZwListenPort at 7ffb6497e080 RtlpCopyExtendedContext at 7ffb649d2464 EvtIntReportEventAndSourceAsync at 7ffb64932210 LdrpRedirectionTree at 7ffb64a465c0 EtwpGetStackExtendedHeaderItem at 7ffb649ed6bc ZwAcceptConnectPort at 7ffb6497c0f0 CsrpLocalSetupForSecureProcess at 7ffb649abee0 RtlpProtectedPolicies at 7ffb64a5a2c0 WerpCreateCrashDataSection at 7ffb649bcb00 local_unwind at 7ffb6496cf70 TpCallbackReleaseMutexOnCompletion at 7ffb64968ef0 NtQueryEaFile at 7ffb6497e880 RtlpGetBootStatusPath at 7ffb649cb180 TppPHExtractMin at 7ffb649162fc RtlFindLongestRunClear at 7ffb649c9b50 ZwQueueApcThreadEx at 7ffb6497ec80 LdrResolveDelayLoadsFromDll at 7ffb649af260 ZwOpenFile at 7ffb6497c710 CsrSetPriorityClass at 7ffb649b5970 RtlUpdateClonedCriticalSection at 7ffb6494ad60 g_pShimmedModuleListLength at 7ffb64a45370 NtCreateIRTimer at 7ffb6497d580 LoaderFatalErrorProc at 7ffb64a0c200 NtCancelWaitCompletionPacket at 7ffb6497d300 ZwDebugActiveProcess at 7ffb6497d9c0 TppRaiseHandleStatus at 7ffb649ef128 NtFlushBuffersFileEx at 7ffb6497dcc0 ZwGetNotificationResourceManager at 7ffb6497df40 RTLP_FLS_CALLBACK_ENTRY::RTLP_FLS_CALLBACK_ENTRY at 7ffb6497b528 RtlStatMemoryStream at 7ffb649b5f50 WerEscalationReadImageVersionInfoForModuleBaseSafe at 7ffb6494d45c RtlpGetCompleteLanguageFallback at 7ffb649cce18 NtQuerySemaphore at 7ffb6497eb80 sscanf_s at 7ffb649774f0 LdrpGetMappingFromCacheEntry at 7ffb649c067c RtlpLocateXStateChunk at 7ffb649d2a88 strncat_s at 7ffb64977680 NtLockRegistryKey at 7ffb6497e180 ZwDisableLastKnownGood at 7ffb6497db40 LdrpInitializeApplicationVerifierPackage at 7ffb649b1404 RtlpTempBlocks at 7ffb64a46988 AppModelLibraryLoadFailureSystemBinary at 7ffb64a0c130 RtlpValidateHeapHeaders at 7ffb649e69a8 RtlpHpStackTraceLogInstance at 7ffb64a46a40 RtlpTpTimerRundown at 7ffb6491028c NlsAnsiToUnicodeData at 7ffb64a46530 NtSetCachedSigningLevel at 7ffb6497f100 NtFlushBuffersFile at 7ffb6497ca10 RtlpTheEmptyActivationContextWrapped at 7ffb649f8530 Normalization__GetSecondAndThirdDecomposedCharPlane0 at 7ffb649d9e04 RtlpHandleInvalidUserCallTarget at 7ffb649d76f0 _security_cookie_complement at 7ffb64a5d4e8 NtQueryMultipleValueKey at 7ffb6497ea60 TpWaitForWork at 7ffb6495cb70 ZwTerminateJobObject at 7ffb6497f7c0 RtlpCheckTokenCapabilityGenericMapping at 7ffb649fcb10 RtlpHpSegReportBusyBlock at 7ffb64930d04 RtlpStackDbRefCountIncrement at 7ffb649f5718 ZwQuerySystemEnvironmentValue at 7ffb6497ebc0 AVrfpLoadAndInitializeProvider at 7ffb649ba1e0 AvrfpAPILookupCallbackRoutine at 7ffb64a5a2a0 NtUmsThreadYield at 7ffb6497f880 NtAlpcCreateResourceReserve at 7ffb6497d000 AlpcUnregisterCompletionListWorkerThread at 7ffb6494f600 LdrpGetFromMUIMemCache at 7ffb648fac2c ZwGetCurrentProcessorNumberEx at 7ffb6497de80 RtlDebugFreeHeap at 7ffb649e51c8 RtlGetLastNtStatus at 7ffb6495a830 RtlCmDecodeMemIoResource at 7ffb649ceb10 RtlpSetProcessDebugInformationRemote at 7ffb649b8430 RtlpFlsInitialize at 7ffb649be690 RtlpUnwindHandler at 7ffb64981210 LdrpAllocateUnicodeString at 7ffb64909f10 RtlGetControlSecurityDescriptor at 7ffb64959d00 SHA256Final at 7ffb648ec3a8 NtSetIoCompletionEx at 7ffb6497f420 RtlReportException at 7ffb649bbb30 RtlpQueryProcessEnumHeapsRoutine at 7ffb649b8320 AVrfpVerifierStopInitialize at 7ffb649baa44 NtAccessCheckByTypeResultList at 7ffb6497cd20 RtlpResetDriveEnvironment at 7ffb6493d2c0 ZwOpenPrivateNamespace at 7ffb6497e4e0 LdrpKnownDllDirectoryHandle at 7ffb64a44f30 NtRaiseException at 7ffb6497eca0 RtlLookupEntryHashTable at 7ffb64946c60 RtlUserThreadStart at 7ffb6494ceb0 ZwFlushInstructionCache at 7ffb6497dd00 LdrpLockMemoryPrivilege at 7ffb64a0e498 ShipAssertMsgW at 7ffb649bd110 ZwDeviceIoControlFile at 7ffb6497c190 TpPoolReferenceExistingGlobalPool at 7ffb6495e1cc RtlpHpLfhContentionLimit at 7ffb64a427a8 ZwMapCMFModule at 7ffb6497e240 mbtowc at 7ffb649760b0 RtlClearThreadWorkOnBehalfTicket at 7ffb64947620 wcstoui64 at 7ffb6496dea0 RtlCmEncodeMemIoResource at 7ffb649ceb80 ZwGetCompleteWnfStateSubscription at 7ffb6497de20 ZwFlushInstallUILanguage at 7ffb6497dce0 ARRAY_FITS at 7ffb649bed20 RtlpQueryProcessDebugInformationFromWow64 at 7ffb649b8190 RtlpComputeExePath at 7ffb6494b310 g_SbModuleTable_RTL at 7ffb649f8740 wtoi64 at 7ffb6496e220 TppInitializeTimer at 7ffb64911b20 NtSetSystemInformation at 7ffb6497f520 LdrpHandleReplacedModule at 7ffb64944a94 RtlGetNtVersionNumbers at 7ffb649b5030 RtlRetrieveNtUserPfn at 7ffb6496c0a0 NtWaitForWorkViaWorkerFactory at 7ffb6497fa40 RtlpHpExtrasMove at 7ffb649268dc RtlpTpWorkTaskCallbacks at 7ffb649f8310 RtlDebugCreateHeap at 7ffb649e4cd0 RtlpWnfETWEventCallback at 7ffb649bd9e8 TppNumberNodes at 7ffb64a46074 sinput_s at 7ffb6497978c RtlValidateCorrelationVector at 7ffb649d5ef0 GetUCBytes at 7ffb649e119c RtlpHpVsChunkComputeCost at 7ffb64947fe0 RtlpAutoCompleteLanguageFallback at 7ffb649cc3a8 get_fpsr at 7ffb64982c50 RtlCreateUserProcess at 7ffb649c0c40 RtlCreateProcessParametersWithTemplate at 7ffb6493bc90 RtlIsCurrentThread at 7ffb648e2710 RtlFreeHandle at 7ffb6493ba30 A_SHAInit at 7ffb648ec600 WinSqmCommonDatapointSetDWORD64 at 7ffb64964ae0 atoi at 7ffb6496caf0 TpReleaseCleanupGroup at 7ffb6495ff80 NtSuspendProcess at 7ffb6497f740 RtlpHpNullGUID at 7ffb64a463f8 RtlpHpSegMgrCommitInitiate at 7ffb649eb684 guard_dispatch_icall_nop at 7ffb6497fab0 FirstEntrySList at 7ffb6497fb50 RtlpInitRandomExVector at 7ffb649dbfd0 ZwSubscribeWnfStateChange at 7ffb6497f720 ZwMakePermanentObject at 7ffb6497e1c0 RtlFreeNonVolatileToken at 7ffb649d61b0 RtlxUnicodeStringToAnsiSize at 7ffb64941bf0 RtlpQueryEnvironmentCache at 7ffb648f9db8 RtlCreateUserFiberShadowStack at 7ffb649c0bb0 NtCreateRegistryTransaction at 7ffb6497d7a0 NtCommitTransaction at 7ffb6497d380 RtlTraceDatabaseAdd at 7ffb649dc100 ZwSetThreadExecutionState at 7ffb6497f580 RtlpDynamicFunctionTable at 7ffb64a5a2b0 LdrpQueueDeferredTlsData at 7ffb64936064 RtlSetLowFragHeapGlobalFlags at 7ffb649ea444 RtlQueryProcessLockInformation at 7ffb649b7a80 RtlSidEqualLevel at 7ffb649c5260 isprint at 7ffb6496c9e0 LdrpUnlockTlsDelayedReclaimTable at 7ffb649b5878 ZwGetCachedSigningLevel at 7ffb6497de00 RtlCriticalSectionDebugSList at 7ffb64a46180 LdrpBuildForwarderLink at 7ffb64902364 ZwAlpcOpenSenderThread at 7ffb6497d160 RtlpExecuteHandlerForException at 7ffb649811f0 NtCreateTimer at 7ffb6497d860 NtContinue at 7ffb6497c910 RtlTestProtectedAccess at 7ffb6496b320 RtlpOpenAndMapCustomCultureFile at 7ffb649d7444 LoadFailure at 7ffb649fc248 CsrProcessId at 7ffb64a45b30 ZwCreateWnfStateName at 7ffb6497d980 TpAllocAlpcCompletionEx at 7ffb649581b0 AVrfpAppendCurrentUserSid at 7ffb649b998c WinSqmStartSession at 7ffb64964a30 ZwDeleteKey at 7ffb6497da80 ZwPropagationComplete at 7ffb6497e740 ZwRollbackEnlistment at 7ffb6497efa0 EtwpRegisterTpInitOnce at 7ffb64a46450 LdrpPayloadRestrictionMitigationsEnabled at 7ffb649b4b54 RtlpHpAppCompatFlags at 7ffb64a4273c RtlpSystemDirs at 7ffb64a46318 TpSetPoolThreadCpuSets at 7ffb649eec80 NtWaitForDebugEvent at 7ffb6497fa00 vsnwprintf at 7ffb6496dad0 TraceLoggingMetadata at 7ffb64a0b6b0 i64tow_s at 7ffb64976520 RtlpReadProcessHeaps at 7ffb649d4a70 WerpWaitForCrashReporting at 7ffb649bcd64 RtlGetSystemBootStatusEx at 7ffb649cafb0 TppPoolpSerializedPoolLock at 7ffb64a46468 RtlpTpTimerQueueRundown at 7ffb649620e4 RtlpHeapTrkInterceptor at 7ffb649d82a0 NtdllStaticWndProcWorker at 7ffb6497c070 ZwFreezeRegistry at 7ffb6497ddc0 NtDllUserStubs at 7ffb649f8900 RtlpDefaultHeapDebuggingOptions at 7ffb64a43cc0 NtQueryDebugFilterState at 7ffb6497e800 RtlCompleteProcessCloning at 7ffb6497b2e0 NtProtectVirtualMemory at 7ffb6497cab0 DeleteNodeFromTree at 7ffb64943c4c strnlen at 7ffb649711d0 RtlHpHeapManagerInitialize at 7ffb649ea660 _realc000000000000000 at 7ffb64a00430 ZwDeletePrivateNamespace at 7ffb6497dac0 ZwSaveKey at 7ffb6497f020 RtlpLocateModuleSectionInLockedSectionList at 7ffb6495371c RTL_BINARY_ARRAY::SetValue at 7ffb6497b624 NtCreateKeyedEvent at 7ffb6497d620 RtlDeleteAce at 7ffb64956fc0 RtlpHpVaMgrRangeFree at 7ffb6492f4a8 WinSqmCommonDatapointDelete at 7ffb64964ae0 RtlDnsHostNameToComputerName at 7ffb64941430 RtlAddAccessDeniedAce at 7ffb6496b2f0 NtOpenTimer at 7ffb6497e5e0 NtFlushProcessWriteBuffers at 7ffb6497dd40 LdrpAllocationGranularity at 7ffb64a45008 LdrpCorValidateImage at 7ffb649634f0 NtAcquireProcessActivityReference at 7ffb6497cd80 RtlZeroHeap at 7ffb649d2b60 LdrpLogVerifyAlternateResourceModuleWithServiceChecksumFailure at 7ffb649b0608 raise_exc_ex at 7ffb64974ba0 NtQueryVirtualMemory at 7ffb6497c510 AVrfpChainDuplicateVerificationLayers at 7ffb649b9a98 RtlUpcaseUnicodeToCustomCPN at 7ffb649c3e00 ZwPowerInformation at 7ffb6497cc80 RtlpHpLfhPerfFlags at 7ffb64a43534 wcstoxq at 7ffb6496ded4 RtlpExtendFrontEndUsageArray at 7ffb6492b0c4 ZwQueryDirectoryFile at 7ffb6497c750 NtCreateFile at 7ffb6497cb50 RtlpHpTagQueryHeapsRemote at 7ffb649e4650 WinSqmEventWrite at 7ffb64962320 RtlpFlsAlloc at 7ffb649485d4 NLG_Notify at 7ffb649723f0 RtlTraceDatabaseDestroy at 7ffb649dc2c0 NormBuffer__RecheckStartCombinations at 7ffb649d96d4 RtlAreLongPathsEnabled at 7ffb64953bf0 TlsExpansionBitMap at 7ffb64a45320 RtlAssert at 7ffb649ca680 LdrCreateEnclave at 7ffb649ad570 RtlGuardIsExportSuppressedAddress at 7ffb64934d2c LdrAddRefDll at 7ffb6490f7e0 ZwQueryInformationByName at 7ffb6497e8e0 RtlCaptureContext2 at 7ffb64980220 ZwCreateTokenEx at 7ffb6497d8c0 RtlpHpHeapManager at 7ffb64a46a50 LdrpEnclaveList at 7ffb64a45ad0 RtlpHpStackTraceHeapGetContext at 7ffb649e272c RtlpCompareAces at 7ffb649c5374 ZwDeleteFile at 7ffb6497da60 RtlpHeapErrorHandlerThreshold at 7ffb64a46578 LdrpTryAcquireLoaderLock at 7ffb649ae620 ZwSetContextThread at 7ffb6497f140 ZwAlpcCancelMessage at 7ffb6497cf60 NtAllocateVirtualMemory at 7ffb6497c3b0 ZwCreateSection at 7ffb6497c9f0 RtlQueryRegistryValueWithFallback at 7ffb649cb550 RtlpStdLockRelease at 7ffb649db59c TppPoolRemoveWorker at 7ffb64958e4c RtlpGetLFHContext at 7ffb6494fa84 ZwAlpcCreatePort at 7ffb6497cfc0 ZwUnloadKey at 7ffb6497f8c0 RtlpForceCSDebugInfoCreation at 7ffb64a43ec0 NtCallEnclave at 7ffb6497d280 ZwCreateTransaction at 7ffb6497d8e0 OemDefaultChar at 7ffb64a42794 ZwCommitRegistryTransaction at 7ffb6497d360 RtlpLogHeapSubSegmentFree at 7ffb649e3ad4 NtCreateSymbolicLinkObject at 7ffb6497d820 RtlFillMemory at 7ffb649d6050 RtlpQueryPhysicalMemoryPolicy at 7ffb648e9a9c RtlpGetBlockInfo at 7ffb649d4558 NtImpersonateAnonymousToken at 7ffb6497df80 LdrpGetFileSizeFromLoadAsDataTable at 7ffb648fa870 RtlpHeapKey at 7ffb64a46970 RtlpTpIoRegistered at 7ffb64a460a0 RtlpGetDefaultLanguageBaseOrParent at 7ffb649ccf6c RtlTryEnterCriticalSection at 7ffb64926660 RtlpEnumProcessHeaps at 7ffb6494730c TppCleanupGroupMemberpNoPoolListLock at 7ffb64a4a320 LdrInitializeMrdata at 7ffb649b5f90 LdrpShouldCreateStackTraceDb at 7ffb64a465b8 ZwSetInformationSymbolicLink at 7ffb6497f320 RtlpHpSegPageRangeCountCommittedPages at 7ffb64930fc4 ZwSetIntervalProfile at 7ffb6497f3e0 EtwpWriteRemainingCompressedData at 7ffb649ee934 NtCreatePrivateNamespace at 7ffb6497d720 LdrGetFileNameFromLoadAsDataTable at 7ffb649c0270 RtlpHpAllocWithExceptionProtection at 7ffb6491b830 ZwQueryIntervalProfile at 7ffb6497ea00 LdrGetDllPath at 7ffb64911fa0 LdrpStatistics at 7ffb64a45290 RtlpSetBlockInfo at 7ffb649d4ea4 LdrQueryProcessModuleInformation at 7ffb648e26e0 LdrpKernel32DllName at 7ffb649f8260 AlpcRegisterCompletionList at 7ffb64964910 LdrpBuildImportRedirection at 7ffb649b559c RtlpMuiRegResizeStringPool at 7ffb649df03c LdrpAppendUnicodeStringToFilenameBuffer at 7ffb64905808 setjmp at 7ffb64981ec0 DbgSetDebugFilterState at 7ffb649bfd70 RtlWow64SetThreadContext at 7ffb649bb740 NtSetDebugFilterState at 7ffb6497f160 SHA256Magic at 7ffb64a00c30 RtlTraceDatabaseFind at 7ffb649dc410 NormalizationListLock at 7ffb64a43680 RtlImpersonateSelf at 7ffb64955730 ZwTerminateEnclave at 7ffb6497f7a0 ui64toa_s at 7ffb64976280 RtlpCaptureActivationContextActivationStacks at 7ffb64a4693c RtlWow64GetThreadContext at 7ffb649bb570 EtwpTrackBinaryForSession at 7ffb649ee354 RtlRestoreBootStatusDefaults at 7ffb649caff0 LdrSystemDllInitBlock at 7ffb64a5a2d0 ZwReplaceKey at 7ffb6497ee60 RtlpTpWaitCheckReset at 7ffb6490ea08 ZwReadRequestData at 7ffb6497cb30 AppModelLibraryLoadFailureApplicationBinary at 7ffb64a0c190 PssNtCaptureSnapshot at 7ffb649f03b0 RtlCriticalSectionList at 7ffb64a3f570 RtlGetSystemBootStatus at 7ffb6496afa0 RtlpHpGCInterval at 7ffb64a43bd8 CsrCaptureMessageString at 7ffb6492bad0 g_pfnSE_ProcessDying at 7ffb64a5a200 NtDeleteWnfStateName at 7ffb6497db20 RtlWow64GetEquivalentMachineCHPE at 7ffb64960de0 RtlpIsFlushRequired at 7ffb64a427e8 LdrpPageSize at 7ffb64a45018 NtCreateKey at 7ffb6497c450 TlgWrite at 7ffb64968d5c NtSetSystemTime at 7ffb6497f560 LdrpThunkVariableBytes at 7ffb64a0374c RtlSetDynamicTimeZoneInformation at 7ffb649cb6d0 _misaligned_access at 7ffb6495f7c0 g_SxsMaxDeadActivationContexts at 7ffb64a427c8 _guard_dispatch_icall_fptr at 7ffb64a5e000 ZwCreateDebugObject at 7ffb6497d4c0 RtlUnlockMemoryStreamRegion at 7ffb649b5f50 LdrpSendShimEngineInitialNotifications at 7ffb64948c40 RtlpCoalesceHeap at 7ffb649cff9c RtlDosPathNameToNtPathName_U at 7ffb64909370 RtlpQueryDiskSpacePolicyByHandle at 7ffb649f4694 ZwClearEvent at 7ffb6497c870 NtPrivilegeCheck at 7ffb6497e6e0 NtQueryInformationTransaction at 7ffb6497e980 RtlpHpStackTraceHeapSerialize at 7ffb649e27a0 NtSetEvent at 7ffb6497c270 RtlAddScopedPolicyIDAce at 7ffb649c7790 LdrpCnvrtShortToLongFileName at 7ffb649c02b8 NlsAnsiCodePage at 7ffb64a427cc RtlGetAce at 7ffb6494e850 szStandardBias at 7ffb649fc3f0 TppETWPoolCreate at 7ffb649ef624 RtlpCopyLegacyContextArm64 at 7ffb649d2834 LdrpDeleteEnclave at 7ffb649adcd4 NtAlpcOpenSenderThread at 7ffb6497d160 NtdllCtfHookProcWorker at 7ffb6497c0a0 snwprintf_s at 7ffb64976a90 ZwCreateTimer at 7ffb6497d860 ZwContinue at 7ffb6497c910 woutput_s at 7ffb6497995c crc64Map1_ at 7ffb64a173f0 NtGetCachedSigningLevel at 7ffb6497de00 RtlpSetRequestedFrontEndHeap at 7ffb64958d04 RtlpValidLabelSubjectContext at 7ffb649c67f8 strtol at 7ffb64971640 RtlpHpRemoteStackSerializeWriter at 7ffb649d1050 szDynamicDaylightDisabled at 7ffb64a191a8 _newctype at 7ffb649ffba0 NtDeleteKey at 7ffb6497da80 NtPropagationComplete at 7ffb6497e740 SecurityCookieInitialized at 7ffb64a464e4 NtRollbackEnlistment at 7ffb6497efa0 RtlStackDbContextCleanup at 7ffb649f4850 RtlpGetInstalledLanguageType at 7ffb649cd160 NtCreateWnfStateName at 7ffb6497d980 LdrpSaferIsDllAllowedRoutine at 7ffb64a45028 RtlPcToFileHeader at 7ffb648ff480 RtlQueryDepthSList at 7ffb6494a6f0 RtlpDebugPageHeapDestroy at 7ffb649e44f0 RtlpHpHeapHandleError at 7ffb649e18b0 ZwCreateRegistryTransaction at 7ffb6497d7a0 RtlpProtectedPoliciesSRWLock at 7ffb64a46380 VerifierDllString at 7ffb649f9468 ZwCommitTransaction at 7ffb6497d380 NtSetThreadExecutionState at 7ffb6497f580 RtlInitBarrier at 7ffb649ca800 RtlpRunOnceWaitForInit at 7ffb64962aa4 TpBindFileToDirect at 7ffb649424f0 RtlInitializeHeapManager at 7ffb649cf094 RtlpTpIoLookup at 7ffb649688b0 RtlpGenerateInheritAcl at 7ffb648f1a90 TpQueryPoolStackInformation at 7ffb649eea90 GetNextWchar at 7ffb649d6384 NtFreezeRegistry at 7ffb6497ddc0 RtlStackTraceHashFunction at 7ffb649dc0b0 RtlWow64GetSharedInfoProcess at 7ffb64958dd0 RtlpTraceDatabaseInternalAdd at 7ffb649dc5b4 RtlAvlInsertNodeEx at 7ffb64945870 RtlpHpFreeWithExceptionProtection at 7ffb6491fcd0 LdrpCheckPagesForTampering at 7ffb64951e60 RtlpIntegerWChars at 7ffb64a00d30 RtlWorkSpaceProcs at 7ffb649f8d68 RtlNewSecurityObject at 7ffb649694c0 RtlpCSparseBitmapLock at 7ffb6492e1dc EtwpUpdatePrivateEnableInfo at 7ffb6496198c RtlpCopyMappedMemoryEx at 7ffb64963c00 LdrpResSetFilePointer at 7ffb649c33ac RtlTimeToTimeFields at 7ffb6493db00 isxdigit at 7ffb6496caa0 safecrt_mbtowc at 7ffb6497876c RtlNewInstanceSecurityObject at 7ffb649b6f80 RtlpFlsDataCleanup at 7ffb6494ae24 RtlpCachedPathLock at 7ffb64a464a0 filbuf at 7ffb64976134 RtlInitNlsTables at 7ffb649c3a30 RtlpIsAppContainer at 7ffb649c66a8 ZwWaitForDebugEvent at 7ffb6497fa00 RtlpClFlushSize at 7ffb64a427e0 RtlLCIDToCultureName at 7ffb648f6320 RtlpHpGCTimerScheduled at 7ffb64a46360 LdrForkMrdata at 7ffb649b5f5c RtlpCommitQueryDebugInfo at 7ffb64955108 RtlUnicodeStringCopy at 7ffb6490981c RtlIntegerToUnicodeString at 7ffb64901440 RtlpHeapGenerateRandomValue64 at 7ffb649298e0 ZwCreateKeyedEvent at 7ffb6497d620 RtlpRtlpCtSelfSubscribeCallback at 7ffb649dbee0 RtlDeleteUmsThreadContext at 7ffb649d37e0 RtlTestBit at 7ffb64963e50 RtlUnicodeStringCopyString at 7ffb649acfb8 RtlTimeFieldsToTime at 7ffb6493d7e0 LdrpLoadEnclaveModule at 7ffb649ae278 LdrpDllDirectoryLock at 7ffb64a464a8 RtlpInitializeLeakDetection at 7ffb649d46a4 ZwProtectVirtualMemory at 7ffb6497cab0 ZwQueryDebugFilterState at 7ffb6497e800 RtlExtendMemoryBlockLookaside at 7ffb648e25e0 RtlInitializeExtendedContext at 7ffb64900d00 RtlpLangNameInMultiSzString_Size at 7ffb648f5788 LdrStandardizeSystemPath at 7ffb6495f7c0 NtDeletePrivateNamespace at 7ffb6497dac0 NtSaveKey at 7ffb6497f020 RtlpCsVerifyDoNotBreak at 7ffb64a46958 TppWorkerpOuterExceptionFilter at 7ffb649efc88 strtolX at 7ffb64971670 NtQueryDirectoryFile at 7ffb6497c750 RtlCheckTokenMembership at 7ffb649c4bb0 EtwpPrivSessionLock at 7ffb64a46448 ZwCreateFile at 7ffb6497cb50 RtlInitMemoryStream at 7ffb6495f7c0 `RtlpGetCustomCultureRegKey'::`2'::KeyName at 7ffb649f95d0 NtPowerInformation at 7ffb6497cc80 EtwpShutdownCompression at 7ffb649ee6a8 CachedLanguageOverlayGroupPolicyState at 7ffb64a42768 LdrpRedirectionCalloutFunc at 7ffb64a45278 TlgKeywordOn at 7ffb648e62b0 UpcaseUnicodeToMultiByteNHelper at 7ffb649c3f50 RtlQueryValidationRunlevel at 7ffb649dba60 TppETWPoolClose at 7ffb649ef5a8 RtlCreateUnicodeStringFromAsciiz at 7ffb64901300 RtlQuerySystemTime at 7ffb64955460 WinSqmIsSessionDisabled at 7ffb64964ae0 DbgPrintEx at 7ffb64932180 LdrpCheckKnownDllFullPath at 7ffb6490a93c RtlpHpHeapProtect at 7ffb649ea9c4 RtlpHpTagDestroyHeap at 7ffb649308d4 RtlpHpStackTraceConfig at 7ffb649e2398 ZwOpenTimer at 7ffb6497e5e0 LdrpMapCleanModuleView at 7ffb649b57ac ZwFlushProcessWriteBuffers at 7ffb6497dd40 RtlSecureMemorySystemRangeStart at 7ffb64a43bd0 RtlSparseArrayElementAllocated at 7ffb6492f208 _imp_ZwQueryInformationToken at 7ffb64a00ae8 LdrUnloadAlternateResourceModuleEx at 7ffb6494ef60 LdrpDllNotificationLock_DEBUG at 7ffb64a3f948 EvtIntReportAuthzEventAndSourceAsync at 7ffb649ee0d0 wcsncat at 7ffb64971dc0 TppFreeThreadData at 7ffb6495b770 ZwQueryVirtualMemory at 7ffb6497c510 RtlIsPartialPlaceholderFileHandle at 7ffb649d9040 RtlDecodeSystemPointer at 7ffb64960db0 PsspWalkInfoClass_PSS_WALK_VA_SPACE at 7ffb649f3500 ZwAcquireProcessActivityReference at 7ffb6497cd80 DbgUiStopDebugging at 7ffb649ad510 DbgUiConvertStateChangeStructureEx at 7ffb649ad0e0 NtCreateSection at 7ffb6497c9f0 RtlEnableEarlyCriticalSectionEventCreation at 7ffb649c6a30 ltow_s at 7ffb64976550 NtSetContextThread at 7ffb6497f140 NtAlpcCancelMessage at 7ffb6497cf60 ZwAllocateVirtualMemory at 7ffb6497c3b0 RtlpExtendedHeapInformationWorkerCallback at 7ffb649d04e0 RtlSetSearchPathMode at 7ffb649bde10 RtlCreateBootStatusDataFile at 7ffb649cacf0 ui64toa at 7ffb6496cbb0 RtlpHpTlLogMemStats at 7ffb649e7500 RtlpHpApplySegmentHeapConfigurations at 7ffb649ea538 RtlpCtPublishInProgress at 7ffb64a43b70 RtlpHpVsFreeChunkInsert at 7ffb64947e34 RtlSparseArrayElementFindCapped at 7ffb649ebdc0 LdrpCompareModuleName at 7ffb649635cc NtdllMDIClientWndProc_A at 7ffb6497bea0 iswspace at 7ffb6496fac0 RtlFailFast2 at 7ffb649811a0 NtAlpcCreatePort at 7ffb6497cfc0 NtUnloadKey at 7ffb6497f8c0 RtlFillMemoryNonTemporal at 7ffb64980a20 AVrfpIsVerifierProviderDll at 7ffb649ba1a8 ltoa_s at 7ffb64976250 RtlpSmMessageInfo at 7ffb64a0b5b0 RtlAllocateAndInitializeSid at 7ffb6494bcf0 NtQueryInformationByName at 7ffb6497e8e0 RtlpHpSegMgrVaCtxInitialize at 7ffb649eb914 RtlpLeakHeap at 7ffb64a43b98 StringCchCopyW at 7ffb649bd11c wcscat_s at 7ffb64977ae0 NtdllMDIClientWndProc_W at 7ffb6497beb0 EtwpQueryPartitionRegistryInformationUm at 7ffb648e4020 NtDeleteFile at 7ffb6497da60 RtlReleasePebLock at 7ffb649554b0 RtlEnclaveCallDispatch at 7ffb6497ff10 AeSbImplEvent at 7ffb64a00580 NtCreateTokenEx at 7ffb6497d8c0 except1 at 7ffb649747a0 RtlTestBitEx at 7ffb6497b750 NtSetIntervalProfile at 7ffb6497f3e0 LdrQueryModuleServiceTags at 7ffb649ae9c0 RtlConvertToAutoInheritSecurityObject at 7ffb649b6ee0 ZwCreatePrivateNamespace at 7ffb6497d720 NtQueryIntervalProfile at 7ffb6497ea00 RtlpDiskSpeedInitialize at 7ffb6496b920 RtlNewSecurityGrantedAccess at 7ffb649b70b0 NtSetInformationSymbolicLink at 7ffb6497f320 KiRaiseUserExceptionDispatcher at 7ffb6497feb0 RtlpHpUnlockHeapForCloning at 7ffb649eab04 RtlpInitDeferredCriticalSection at 7ffb649c6cbc ZwCallEnclave at 7ffb6497d280 NtCreateTransaction at 7ffb6497d8e0 NtCommitRegistryTransaction at 7ffb6497d360 ZwImpersonateAnonymousToken at 7ffb6497df80 NtdllButtonWndProcWorker at 7ffb6497c000 CsrAllocateMessagePointer at 7ffb6492bb80 DbgBreakPoint at 7ffb6497fad0 ZwCreateSymbolicLinkObject at 7ffb6497d820 vsnprintf_l at 7ffb6496da1c RtlpExtendedHeapInformationWorkerThread at 7ffb649d0600 LdrpIsCODServiceEnabled at 7ffb649af90c AVrfCallAPILookupCallback at 7ffb649b8be0 TppCleanupGroupMemberCallbackProlog at 7ffb649134f4 RtlAddressInSectionTable at 7ffb64955480 MD4Init at 7ffb649ec530 RtlAppendStringToString at 7ffb649c8fe0 NtReplaceKey at 7ffb6497ee60 LdrpTlsBitmap at 7ffb64a45250 LdrpComPlusInstallRootName at 7ffb649fe178 RtlpConvertAclToAutoInherit at 7ffb649c5500 LoadAsDataCrits at 7ffb64a44300 NtReadRequestData at 7ffb6497cb30 LdrpEnclaveAddForwarderModules at 7ffb649adf94 LdrpSearchResourceSection_U at 7ffb648f8d7c RtlpHpSegLargeRangeAllocate at 7ffb649eb3cc g_RegInfo at 7ffb64a46098 RtlWnfDllUnloadCallback at 7ffb64964960 RtlSetThreadErrorMode at 7ffb6493d4e0 RtlpLogHeapWalkEvent at 7ffb649e3dec ulInvalidTypes at 7ffb64a18e30 EtwpInsertGuidEntry at 7ffb648e5ffc ZwSetDebugFilterState at 7ffb6497f160 RtlDoesFileExists_UEx at 7ffb64939fec AlpcMaxAllowedMessageLength at 7ffb649635c0 NtTerminateEnclave at 7ffb6497f7a0 RtlWakeAddressAllNoFence at 7ffb649dc880 WerpSetProcessFaultInformation at 7ffb649bccf4 RtlpHpConvertFlagsToSegmentFlags at 7ffb6491b0b4 wcsicmp at 7ffb6496dbd0 RtlInt64ToUnicodeString at 7ffb649ca970 g_pfnSE_DllUnloaded at 7ffb64a5a1f8 RtlCompareMemoryUlong at 7ffb649808b0 EtwpSynchronizeWithLogger at 7ffb64966840 RtlQueryCriticalSectionOwner at 7ffb649c6aa0 RtlTraceDatabaseEnumerate at 7ffb649dc340 RtlpInitializeLowFragHeapManager at 7ffb649e7948 RtlpRandomExAuxVarY at 7ffb64a43b20 SetAssertBufferPtrinPeb at 7ffb649bcf48 NtClearEvent at 7ffb6497c870 ZwPrivilegeCheck at 7ffb6497e6e0 RtlpHpTlLogVAChange at 7ffb649e75dc ZwQueryInformationTransaction at 7ffb6497e980 NtCreateDebugObject at 7ffb6497d4c0 RtlWalkHeap at 7ffb649cfd70 RtlReportSqmEscalation at 7ffb64962320 LdrpLogImportRedirectionTelemetry at 7ffb649aff84 MD5Init at 7ffb6495c2c0 ZwSetEvent at 7ffb6497c270 ZwCreateKey at 7ffb6497c450 RtlpLangNameInMultiSzString at 7ffb648f29a4 RtlpLogHeapSubSegmentAllocCached at 7ffb649e3a24 ZwDeleteWnfStateName at 7ffb6497db20 RtlBaseAceType at 7ffb64a06b68 RtlpHpStackTraceAllocAdd at 7ffb649e1e90 LdrpWorkCallback at 7ffb6490e260 ZwSetSystemTime at 7ffb6497f560 NlsOemCodePageIsUTF8 at 7ffb64a42796 RtlpHpVsFreeChunkRemove at 7ffb64947f74 memcpy at 7ffb64982c80 PssNtValidateDescriptor at 7ffb649f0f70 RtlpValidAccessFilterAce at 7ffb649c84c8 NtNotifyChangeDirectoryFileEx at 7ffb6497e300 NtdllComboListBoxProcWorker at 7ffb6497c020 ZwGetContextThread at 7ffb6497de40 NtCreateDirectoryObject at 7ffb6497d4e0 RtlInterlockedSetBitRun at 7ffb649ca060 LdrpResolveDelayloadAddress at 7ffb649af5bc RtlpStackDbEntryIsEqual at 7ffb649f5670 RtlSetProcessPlaceholderCompatibilityMode at 7ffb649d9120 RtlIsAnyDebuggerPresent at 7ffb649d914c NtRenameTransactionManager at 7ffb6497ee40 RtlRaiseCustomSystemEventTrigger at 7ffb649dbb20 RtlSetThreadPoolStartFunc at 7ffb64962320 RtlpProcessHeapsListLock at 7ffb64a43be0 g_LdrBreakOnLdrpInitializeProcessFailure at 7ffb64a45390 NtCreateTimer2 at 7ffb6497d880 NlsOemLeadByteInfoTable at 7ffb64a440e0 NtdllDialogWndProcWorker at 7ffb6497c030 RtlUserFiberStart at 7ffb6495ef80 LdrpStaticTlsBitmapVector at 7ffb64a45248 TpCallbackDetectedUnrecoverableError at 7ffb649eef70 TpReleaseWait at 7ffb64910350 SbpParseFuncName at 7ffb649f01f0 RtlpFunctionAddressTableEntry at 7ffb649577bc ApiSetResolveToHost at 7ffb64905680 RtlpNlsGetNameIndex at 7ffb648f6e20 NtCreateNamedPipeFile at 7ffb6497d6a0 RtlFlsFree at 7ffb64954000 RtlpLockedMemoryBlockLookasideCount at 7ffb64a46030 TpSetPoolStackInformation at 7ffb6495e1a0 _isascii at 7ffb6496c810 RtlLookupElementGenericTableFullAvl at 7ffb64943b10 RtlpMuiRegPopulateBaseLanguages at 7ffb649e0338 RtlpFlsCloneComplete at 7ffb649be538 LdrpReleaseDllPath at 7ffb64961280 RtlpFileIsWin32WithRCManifest at 7ffb6493a024 RtlpQueryProcessDebugInformationRemote at 7ffb649b8230 RtlDequeueUmsCompletionListItems at 7ffb649d3840 RtlGetFullPathName_UEx at 7ffb64909250 AVrfpEnabled at 7ffb64a5a299 LdrpProcessInitialized at 7ffb64a45418 LdrpTlsList at 7ffb64a3f520 RtlEthernetStringToAddressA at 7ffb649d5c70 ZwInitializeEnclave at 7ffb6497dfc0 RtlDecompressFragmentProcs at 7ffb649f9198 LdrResFindResource at 7ffb649c2690 TppWorkpValidateWork at 7ffb64916558 RtlpSearchProtectedPolicyEntry at 7ffb64955440 NtAlpcRevokeSecurityContext at 7ffb6497d1c0 RtlpHpTlLogGCTimerFinished at 7ffb649e74a4 RtlpHpMetadataFree at 7ffb6492f090 SbpLookup at 7ffb649f00ec NtDeleteBootEntry at 7ffb6497da20 LdrpTlsLock at 7ffb64a461b8 RtlpGetMemoryFlag at 7ffb649d4640 NtWriteVirtualMemory at 7ffb6497c7f0 ZwCreateProcessEx at 7ffb6497ca50 _newcumap at 7ffb64a00230 RtlEthernetStringToAddressW at 7ffb649d5db0 RtlpMuiRegValidateConfigNode at 7ffb649df118 PsspDuplicateSnapshotRemoteToRemote at 7ffb649f3c18 ZwDeleteValueKey at 7ffb6497dae0 EtwpLoggerArray at 7ffb64a43518 sprintf at 7ffb649707a0 InsertChar at 7ffb648e23bc RtlGrowFunctionTable at 7ffb649bfeb0 ZwFilterBootOption at 7ffb6497dc60 RtlpApplyLengthFunction at 7ffb6495ca90 NtAlpcDeleteResourceReserve at 7ffb6497d080 RtlAppendPathElement at 7ffb649acd10 RtlpWalkCallbackRoutine at 7ffb649b89a0 RtlInitializeSidEx at 7ffb648eba60 NtIsProcessInJob at 7ffb6497ca90 RtlpQueryTimeZoneKeyNameRoutine at 7ffb649cb6f0 TppAdjustRunningThreadGoalWithLock at 7ffb649eed2c EtwEventUnregister at 7ffb649331a0 LdrpHandleInvalidUserCallTarget at 7ffb6496c430 NtAlertThread at 7ffb6497ce60 RtlQueryRegistryValuesEx at 7ffb648e3450 RtlGuardAllowSuppressedCalls at 7ffb64a5a29a NtQuerySystemInformationEx at 7ffb6497ec00 RtlSetLFHDebuggingInformation at 7ffb649e77fc RtlpVerGetConditionMask at 7ffb6495276c RtlpGuardIsSuppressedAddress at 7ffb649d76c0 ZwCreateIRTimer at 7ffb6497d580 M_strAceEmailPrefix at 7ffb64a0c0c8 RtlSetExtendedFeaturesMask at 7ffb649d2430 ZwCancelWaitCompletionPacket at 7ffb6497d300 RtlpQueryInformationActivationContextManifestResourceName at 7ffb649bf268 ultow_s at 7ffb649765a0 NtDebugActiveProcess at 7ffb6497d9c0 RtlIsThreadWithinLoaderCallout at 7ffb6495c360 EtwpUpdateUmLogger at 7ffb649edaa8 NtQueueApcThreadEx at 7ffb6497ec80 `SignalStartWerSvc'::`2'::WerSvcTriggerGuid at 7ffb64a0f8d0 NtOpenFile at 7ffb6497c710 RtlInitializeExceptionLog at 7ffb649da4e8 RtlUnhandledExceptionFilter at 7ffb6497b790 ZwQuerySemaphore at 7ffb6497eb80 RtlpLowFragHeapRandomData at 7ffb64a43580 ZwFlushBuffersFileEx at 7ffb6497dcc0 NtGetNotificationResourceManager at 7ffb6497df40 ExpInterlockedFlushSList at 7ffb6497fbe0 PsspQueryInfoClass_PSS_QUERY_PROCESS_INFORMATION at 7ffb649f3018 NtdllEditWndProc_A at 7ffb6497be60 NtAcceptConnectPort at 7ffb6497c0f0 _C_specific_handler at 7ffb6496c640 wcsncpy at 7ffb64971e50 strnset_s at 7ffb64976e50 NtListenPort at 7ffb6497e080 RtlEncodeSystemPointer at 7ffb64963540 ZwQueryEaFile at 7ffb6497e880 RtlReadMemoryStream at 7ffb649b5f50 iscntrl at 7ffb6496c920 RtlpCompareActivationContextStringSectionEntryByPseudoKey at 7ffb649587e0 RtlpQueryMemoryUsageHeap at 7ffb649d119c AVrfpEnableHandleVerifier at 7ffb649b9eac ZwFlushBuffersFile at 7ffb6497ca10 LdrpCleanupEnclaveLoadState at 7ffb649ada38 g_LdrpWow64SuspendLocalProcess at 7ffb64a5a238 ZwSetCachedSigningLevel at 7ffb6497f100 RtlCaptureContext at 7ffb649800e0 LdrpCondenseGraph at 7ffb6494c054 RtlpTpWaitRundown at 7ffb6490f050 RtlpQueryInformationActivationContextCompatibilityInformation at 7ffb64955c58 WerpProcessId at 7ffb6494b1f4 setjmpexused at 7ffb64a2c4f0 SbExecuteProcedure at 7ffb649f00c0 ZwQueryMultipleValueKey at 7ffb6497ea60 RtlBootStatusItemInfo at 7ffb649caaf8 RtlpHpDefaultBrowserPackageName at 7ffb64a008d0 NtTerminateJobObject at 7ffb6497f7c0 ZwLockRegistryKey at 7ffb6497e180 LdrpDispatchUserCallTargetES at 7ffb6496c5e0 NtDisableLastKnownGood at 7ffb6497db40 LdrpThumbProcessRelocation at 7ffb649c2298 RtlpLogHeapCommit at 7ffb649e334c LdrpGetMUILangConfigNode at 7ffb649cba54 RtlLookupElementGenericTableAvl at 7ffb64943280 RtlpSystem32Dirs at 7ffb64a46308 TppPoolpListLock at 7ffb64a46460 RtlInitializeHeapGC at 7ffb6495d078 RtlUnlockHeapManagerForCloning at 7ffb649cfb08 RtlpAttachThreadToUmsCompletionList at 7ffb649d3db0 RtlFinalReleaseOutOfProcessMemoryStream at 7ffb6495f7c0 LdrpResReportResourceAccessInternalInitOnce at 7ffb649621d0 RtlpWin32NtRoot at 7ffb649f8788 RtlQueryElevationFlags at 7ffb6495f280 LdrpSuppressedExportOverrideList at 7ffb649f9190 RtlExtractBitMap at 7ffb649c9370 ZwRaiseException at 7ffb6497eca0 memmove at 7ffb64982c80 ExpInterlockedPopEntrySListEnd at 7ffb6497fb80 TppAreNodeWorkersSteadyState at 7ffb64967468 szDaylightBias at 7ffb649fc390 NtOpenPrivateNamespace at 7ffb6497e4e0 NtDeviceIoControlFile at 7ffb6497c190 RtlpDisableHeapLookaside at 7ffb64a46554 UpcaseUnicodeToSingleByteNHelper at 7ffb64941a6c NtFlushInstructionCache at 7ffb6497dd00 RtlpStdLogCapturedStackTrace at 7ffb649db5bc TppDirectUnposted at 7ffb649eede0 ZwUmsThreadYield at 7ffb6497f880 ZwAlpcCreateResourceReserve at 7ffb6497d000 NtGetCurrentProcessorNumberEx at 7ffb6497de80 vsprintf_l at 7ffb6496d880 g_LdrpWow64PrepareForDebuggerAttach at 7ffb64a5a260 LdrpAccessResourceDataNoMultipleLanguage at 7ffb648ff094 RtlTryAcquireSRWLockExclusive at 7ffb64960c30 NtQuerySystemEnvironmentValue at 7ffb6497ebc0 _realbfc5555555555555 at 7ffb649ff6b0 strnicmp at 7ffb6496d670 RtlUnicodeStringCatString at 7ffb649bdee0 RtlpStdGetRecordedStackTraceIndex at 7ffb649db400 LdrpIssueEnclaveCall at 7ffb649ae1d0 RtlQueryRegistryValues at 7ffb649cb6a0 ZwAccessCheckByTypeResultList at 7ffb6497cd20 SHATransform at 7ffb648ec710 ComponentOnDemand at 7ffb64a0c140 Wow64PrepareForException at 7ffb64a5a230 RtlpHpLfhOwnerInitialize at 7ffb6492a948 DbgUiConnectToDbg at 7ffb649ad030 ZwSetIoCompletionEx at 7ffb6497f420 RtlpBreakWithStatusInstruction at 7ffb6497faf0 RtlConvertDeviceFamilyInfoToString at 7ffb64954670 _clocalestr at 7ffb64a003b0 SidHashByteToIndexLookupTable at 7ffb64a020c0 ZwSetSystemInformation at 7ffb6497f520 NtFlushInstallUILanguage at 7ffb6497dce0 RtlZeroMemory at 7ffb64965e30 PsspWalkInfoClass_PSS_WALK_HANDLES at 7ffb649f31f8 NtdllDispatchHook_A at 7ffb6497bf60 ZwWaitForWorkViaWorkerFactory at 7ffb6497fa40 NtMapCMFModule at 7ffb6497e240 szTimeZonesSlash at 7ffb649fc490 DbgUiWaitStateChange at 7ffb649ad530 NtdllDispatchHook_W at 7ffb6497bf70 WinSqmCheckEscalationSetDWORD at 7ffb64962320 LdrpLogFatalUserCallbackException at 7ffb649afdf0 NtGetCompleteWnfStateSubscription at 7ffb6497de20 iswdigit at 7ffb6496fa80 RtlPrefetchMemoryNonTemporal at 7ffb64980a00 RtlAllocateWnfSerializationGroup at 7ffb64962660 RtlWaitOnAddress at 7ffb648e6390 TpCaptureCaller at 7ffb64953b90 _GSHandlerCheckCommon at 7ffb64972380 i64toa_s at 7ffb64976220 Crc64Ctrl at 7ffb649f95a0 RtlpEstimateAllocatedSize at 7ffb64956884 RtlpInitializeSegmentInfoForBucket at 7ffb6494fae8 NtSubscribeWnfStateChange at 7ffb6497f720 NtMakePermanentObject at 7ffb6497e1c0 g_pShimmedModuleList at 7ffb64a464e8 TppWorkpTaskVFuncs at 7ffb649f8430 RtlEndEnumerationHashTable at 7ffb6495f890 DbgUiIssueRemoteBreakin at 7ffb649ad420 RtlpHpVsContextAllocate at 7ffb6492811c g_pfnSE_LdrResolveDllName at 7ffb64a5a248 RtlpMuiRegAddAlternateCodePage at 7ffb649dd540 qsort_s at 7ffb649703d0 swscanf_s at 7ffb64977a80 RtlGetSecurityDescriptorRMControl at 7ffb64961920 CheckOneBitValidFlag at 7ffb6493928c RtlIsNameInUnUpcasedExpression at 7ffb649d5130 ZwSuspendProcess at 7ffb6497f740 snwscanf_s at 7ffb64976b70 WinSqmAddToStream at 7ffb6495f7c0 RtlUnlockModuleSection at 7ffb64953570 RtlGetOwnerSecurityDescriptor at 7ffb64957d50 ZwCompressKey at 7ffb6497d440 ApiSetQuerySchemaInfo at 7ffb649bfa88 RtlpLeaksCount at 7ffb64a46998 ZwCreateThreadEx at 7ffb6497d840 RtlDebugCompactHeap at 7ffb649e4b7c ZwAlpcDeletePortSection at 7ffb6497d060 RtlUpperChar at 7ffb64941bb0 NtAlertResumeThread at 7ffb6497ce40 NtCreateEvent at 7ffb6497c9b0 RtlIsCurrentThreadAttachExempt at 7ffb6497b3e0 _iscsym at 7ffb6496c830 szFirstEntry at 7ffb649fc4c0 LdrpEnclaveListLock at 7ffb64a45ae0 mbstowcs at 7ffb6496fe50 A_SHAFinal at 7ffb648ec4d0 RtlpExecuteHandlerForUnwind at 7ffb64981270 ExpInterlockedPopEntrySListResume at 7ffb6497fb67 RtlpHpStackTraceEventWriter at 7ffb649e25e0 RtlpStdExtendUpperWatermark at 7ffb649db324 ZwOpenProcess at 7ffb6497c570 ZwCreateWaitablePort at 7ffb6497d960 RtlpInitializeLowFragHeap at 7ffb6492ad60 LdrpMapDllRetry at 7ffb64950158 RtlCaptureStackBackTrace at 7ffb64954220 RtlpMuiRegGetFallbackLanguageInfoByIndex at 7ffb649dde68 TpCallbackLeaveCriticalSectionOnCompletion at 7ffb64968e00 AppModelRuntimeProviderId at 7ffb64a0c1c0 RtlDosPathNameToRelativeNtPathName at 7ffb64909c4c RtlpHpConvertSegmentFlagsToFlags at 7ffb649d3314 ZwSaveKeyEx at 7ffb6497f040 RtlpIsCustomLocale at 7ffb649d7204 NtOpenKeyTransactedEx at 7ffb6497e440 ZwCreateResourceManager at 7ffb6497d7c0 RtlpLoadPolicyLanguageSpec at 7ffb649dd378 ZwPropagationFailed at 7ffb6497e760 ZwQueryInformationTransactionManager at 7ffb6497e9a0 RtlpDebugPageHeapTable at 7ffb64a3f9b0 ZwSetWnfProcessNotificationEvent at 7ffb6497f640 ceil at 7ffb6496ee30 ZwSetUuidSeed at 7ffb6497f600 NtWriteRequestData at 7ffb6497cb90 RtlpMuiRegInitLIPLanguage at 7ffb649dfd14 RtlpPossibleDeadlock at 7ffb649c6e98 RtlAddAccessDeniedAceEx at 7ffb64964620 TpIsTimerSet at 7ffb64912420 LibLoaderTelemetryInitRunOnce at 7ffb64a460b8 ZwInitiatePowerAction at 7ffb6497e020 _NLG_Dispatch2 at 7ffb64972410 NtDelayExecution at 7ffb6497c730 RtlCreateEnvironment at 7ffb6493bc70 RtlConvertLCIDToString at 7ffb649cbd00 RtlpCreateHeapEncoding at 7ffb6492983c wcsnicmp at 7ffb6496dd10 NormBuffer__Insert at 7ffb649d94ec NtSaveMergedKeys at 7ffb6497f060 NtAlpcAcceptConnectPort at 7ffb6497cf40 RtlStackDbContextSerialize at 7ffb649f4a30 TppDirectTaskVFuncs at 7ffb649f8320 NtSetInformationJobObject at 7ffb6497f2c0 RtlQueryModuleInformation at 7ffb649c2420 XRestoreSHelper at 7ffb64981180 RtlInitializeBitMapEx at 7ffb6497b740 RtlpHpMetadataHeapCreate at 7ffb6492e960 _iscsymf at 7ffb6496c870 RtlpLogHeapExtendEvent at 7ffb649e35d4 RtlProcessFlsData at 7ffb6494ae10 RtlSetGroupSecurityDescriptor at 7ffb648f0070 RtlpHpSegGetDescriptorValidateSafe at 7ffb649eb360 TpAllocAlpcCompletion at 7ffb649580b0 WerpEscalationReadUlongFromKey at 7ffb649bd7d0 PossibleDeadlockReportThreshold at 7ffb64a427d4 WinSqmCheckEscalationAddToStreamEx at 7ffb64962320 NtImpersonateThread at 7ffb6497dfa0 ZwQueryIoCompletion at 7ffb6497ea20 RtlSetTimeZoneInformation at 7ffb649cb6e0 NtQueryKey at 7ffb6497c370 ZwOpenEvent at 7ffb6497c8b0 CsrHeap at 7ffb64a45b60 RtlpLoadUmsDebugRegisterState at 7ffb649ea330 AlpcAdjustCompletionListConcurrencyCount at 7ffb649bfc40 strncpy at 7ffb64971060 RtlFindClosestEncodableLength at 7ffb649cec70 RtlFlushSecureMemoryCache at 7ffb649d42c0 RtlLockMemoryStreamRegion at 7ffb649b5f50 PromoteNode at 7ffb64943ea0 ZwUnmapViewOfSectionEx at 7ffb6497f960 memmove_s at 7ffb64977410 NtGetWriteWatch at 7ffb6497df60 RtlIsNameInExpression at 7ffb649d5080 SecurityCookieInitCount at 7ffb64a465bc TpReleaseCleanupGroupMembers at 7ffb649462e0 DbgUiDebugActiveProcess at 7ffb649ad390 EtwpRegistrationCount at 7ffb64a43528 RtlGetCurrentProcessorNumberEx at 7ffb64980b60 LdrpInsertModuleToIndexLockHeld at 7ffb6490a574 NormBuffer__ReplaceLastStartBasePair at 7ffb649d98c8 WaitForWerSvc at 7ffb649bc7f8 LdrpLargePageDllKeyHandle at 7ffb64a44f20 LdrpDelayedTlsReclaimTable at 7ffb64a461c0 RtlpInterlockedFlushSList at 7ffb6497fbe0 RtlRunDecodeUnicodeString at 7ffb64968c60 RtlSetSecurityObjectEx at 7ffb64968e30 RtlDebugPrintTimes at 7ffb6495f7c0 LdrpGenericExceptionFilter at 7ffb649b5a58 g_SbTableEntry_VerifyVersionInfoSwitch_RTL at 7ffb64a3f780 KiUserCallbackDispatch at 7ffb6497fdf0 NtQueryLicenseValue at 7ffb6497ea40 LdrSetAppCompatDllRedirectionCallback at 7ffb64962320 RtlPinAtomInAtomTable at 7ffb649c8a70 NtSetValueKey at 7ffb6497cca0 RtlpMuiRegCreateLanguageConfigList at 7ffb648e9360 RtlDumpResource at 7ffb649c69e0 RtlDebugDestroyHeap at 7ffb649e5108 NtAllocateLocallyUniqueId at 7ffb6497cea0 RtlpLogHeapAffinityManagerEnable at 7ffb649e317c __entry_from_strcat_in_strcpy at 7ffb64970ab3 NtdllMDIClientWndProcWorker at 7ffb6497c060 ZwQueryInformationEnlistment at 7ffb6497e900 ZwClose at 7ffb6497c290 RtlpCheckMuiMultiStringSafe at 7ffb648eee3c RtlQueryProcessHeapInformation at 7ffb649b76a0 LdrpHandlePendingModuleReplaced at 7ffb64944a58 AVrfpDetectVerifiedExports at 7ffb649b9bb4 RtlQueryUmsThreadInformation at 7ffb649d3c40 RtlAllocateMemoryZone at 7ffb649f7130 wcsnset_s at 7ffb6496dd80 NtReleaseSemaphore at 7ffb6497c1f0 ZwQueryInformationResourceManager at 7ffb6497e960 ui64tow at 7ffb6496cd50 ZwOpenMutant at 7ffb6497e480 i64tow at 7ffb6496cce0 RtlpRefreshCachedUILanguage at 7ffb649df5d0 RtlFlsSetValue at 7ffb649342b0 ZwCompleteConnectPort at 7ffb6497d420 RtlpProcessReflectionStartup at 7ffb649b6610 islower at 7ffb6496c9b0 RtlSubtreePredecessor at 7ffb649447f0 SecondsToStartOf1970 at 7ffb64a06b60 AVrfpPageHeapPreviousStopData at 7ffb64a445a0 NtRollbackTransaction at 7ffb6497efe0 RtlConnectToSm at 7ffb6496a710 ZwCreatePagingFile at 7ffb6497d6c0 RtlpMuiRegLoadInstalledFromKey at 7ffb649e00bc RtlDeleteElementGenericTableAvlEx at 7ffb64943bf0 NtGetNlsSectionPtr at 7ffb6497df20 LZNT1DecompressChunk at 7ffb649812a0 RtlpScanHeapAllocBlocks at 7ffb649d4aec ShowSnaps at 7ffb64a3fab0 RtlpHpGCCallback at 7ffb649472d0 RtlpHpStackTraceEnable at 7ffb649e2460 i64toa at 7ffb6496cb40 NtFindAtom at 7ffb6497c330 PssNtFreeSnapshot at 7ffb649f0b10 RtlpLfhBucketUsageUpdate at 7ffb64928210 ZwPrivilegeObjectAuditAlarm at 7ffb6497e700 RtlComputeCrc32 at 7ffb6493d5d0 RtlGetCallersAddress at 7ffb649ca910 d_inf at 7ffb64a004d0 toupper at 7ffb64971bc0 RtlSetControlSecurityDescriptor at 7ffb64960220 NtLoadDriver at 7ffb6497e0a0 gMUICacheType at 7ffb64a4434c LdrpGetAlternateResourceModuleHandleEx at 7ffb649c04f0 ZwQueryQuotaInformationFile at 7ffb6497eb00 TppTimerpFree at 7ffb64911850 NtCreateMailslotFile at 7ffb6497d660 LdrpLogVsmEnclaveLdrLoadEnclaveModuleTelemetry at 7ffb649b09fc RtlpHpVsChunkSetUnusedBytes at 7ffb649ec1ec RtlWow64PushCrossProcessWorkOntoFreeList at 7ffb649dca80 RtlCopyLuid at 7ffb64953ff0 RtlEqualSid at 7ffb64946a10 NtAccessCheck at 7ffb6497c0b0 RtlCompressWorkSpaceSizeXpressHuff at 7ffb64962260 RtlpComputeSearchPath at 7ffb6494b280 RtlLengthRequiredSid at 7ffb649570a0 NtDeleteObjectAuditAlarm at 7ffb6497daa0 RtlpMuiRegValidatePartialLanguage at 7ffb649e0e60 PsspCaptureProcessInformation at 7ffb649f159c LdrpResReadFile at 7ffb649c2bf8 RtlpDosCONOUTDevice at 7ffb649f8040 LdrpKernelbaseDllName at 7ffb649f8060 RtlpHpVsContextFreeList at 7ffb649ec3d4 RtlpLocateRelatedBlocks at 7ffb649e2e98 NtSetBootEntryOrder at 7ffb6497f0c0 RtlInitUnicodeString at 7ffb648f6a90 RtlpAnalyzeHeapFailure at 7ffb649e1234 LdrpUserDllDirectories at 7ffb64a3f3d8 LdrpPinNodeRecurse at 7ffb64959790 NtShutdownWorkerFactory at 7ffb6497f680 ZwRegisterProtocolAddressInformation at 7ffb6497ed60 KiUserExceptionDispatch at 7ffb6497fe40 RtlpHpLfhBucketUpdateStats at 7ffb64928180 LdrpFailureData at 7ffb64a44f40 NtOpenEventPair at 7ffb6497e3a0 RtlRemoveVectoredExceptionHandler at 7ffb649608b0 RtlCallEnclave at 7ffb6497ff80 RtlGuardIsValidStackPointer at 7ffb648fef94 RtlDestroyMemoryBlockLookaside at 7ffb64963350 CsrVerifyRegion at 7ffb649ac140 AlpcFreeCompletionListMessage at 7ffb6494bf50 NtWaitHighEventPair at 7ffb6497fa60 LdrpFatalHardErrorCount at 7ffb64a44f28 RtlpLFHKey at 7ffb64a46580 LdrFindEntryForAddress at 7ffb64934740 NormBuffer__GetCurrentOutputChar at 7ffb649d9400 sprintf_s at 7ffb64977470 ZwCreateToken at 7ffb6497d8a0 ZwSuspendThread at 7ffb6497f760 LdrUpdatePackageSearchPath at 7ffb649bdd10 ZwSetInformationWorkerFactory at 7ffb6497f3c0 CentennialIssueTracker_InitializedState at 7ffb64a460c8 NtIsSystemResumeAutomatic at 7ffb6497e040 LdrpLogVsmEnclaveLdrDeleteEnclaveTelemetry at 7ffb649b083c winput_s at 7ffb6497a80c RtlDeleteSecurityObject at 7ffb64959b30 set_fpsr at 7ffb64976110 RtlDeleteNoSplay at 7ffb64944600 NtThawRegistry at 7ffb6497f800 ZwCreateThread at 7ffb6497ca70 RtlGetUmsCompletionListEvent at 7ffb649d3be0 RtlCreateUnicodeString at 7ffb6490bf00 ZwSetInformationObject at 7ffb6497cc20 RtlpDisableBreakOnFailureCookie at 7ffb64a46044 ZwDeleteAtom at 7ffb6497da00 RtlpStackDbSegmentComparitor at 7ffb649f577c ZwQuerySecurityPolicy at 7ffb6497eb60 HeapSnapshotEnd at 7ffb64a0c1d0 NtAccessCheckByTypeResultListAndAuditAlarmByHandle at 7ffb6497cd60 NtAlpcCreatePortSection at 7ffb6497cfe0 RtlFreeMemoryBlockLookaside at 7ffb649f7190 RtlpLockUlockAllHeapsCallback at 7ffb6495ea60 ZwRenameKey at 7ffb6497ee20 RtlIsCapabilitySid at 7ffb648ee910 LdrpUpdateStatistics at 7ffb6490e4e4 NtCreateJobSet at 7ffb6497d5e0 LdrpUnloadIndex at 7ffb64a45ff0 RtlpUnwindHistoryTable at 7ffb64a5a3f0 iswalpha at 7ffb6496fa50 CcSaveNVContext2 at 7ffb6498025c RtlpSubSegmentDebugInitialize at 7ffb649e7a78 WinSqmEventEnabled at 7ffb64962320 NtSetQuotaInformationFile at 7ffb6497f4a0 NtStopProfile at 7ffb6497f700 LdrpUseImpersonatedDeviceMap at 7ffb64a45380 NtCreateProfile at 7ffb6497d760 RtlRegisterForWnfMetaNotification at 7ffb648e60e0 EtwpPopulatePrivateEnableInfoFromGuidEntry at 7ffb64961940 NtdllComboBoxWndProcWorker at 7ffb6497c010 vsnprintf at 7ffb6496da00 safecrt_wctomb_s at 7ffb649787c0 TppETWCallbackStop at 7ffb649ef50c ZwSetInformationProcess at 7ffb6497c430 RtlGetNextUmsListItem at 7ffb649d3bb0 ZwEnableLastKnownGood at 7ffb6497dba0 snprintf_s at 7ffb64976980 RtlpGetBootStatusPathFromRegistry at 7ffb649cb1d8 RtlpSameFunction at 7ffb648e108c NtCreateTransactionManager at 7ffb6497d900 tan at 7ffb649716e0 InterlockedPushListSList at 7ffb6497fc10 NtEnumerateDriverEntries at 7ffb6497dbe0 ZwQueryPortInformationProcess at 7ffb6497eae0 AVrfpVerifierFlags at 7ffb64a44ee8 RtlLookupElementGenericTableFull at 7ffb649d3f50 RtlpHpExtrasGet at 7ffb64926750 RtlAddVectoredExceptionHandler at 7ffb6495f2c0 wcstol at 7ffb64972240 RtlpStatusTable at 7ffb64a04210 RtlpHeapFailureInfo at 7ffb64a427f0 LdrpFindDelayloadedMethod at 7ffb649af2a4 RtlGetLengthWithoutLastFullDosOrNtPathElement at 7ffb64956980 AppModelGenericLibraryLoadFailureNoTermination at 7ffb64a0c150 NtPrepareComplete at 7ffb6497e6a0 RTL_BINARY_ARRAY::SlotFree at 7ffb649541cc ExpInterlockedPushEntrySList at 7ffb6497fba0 LdrpLogMapAndVerifyResourceFileFailure at 7ffb649b0394 NtOpenObjectAuditAlarm at 7ffb6497e4a0 RtlClearBits at 7ffb64938d50 PssNtFreeRemoteSnapshot at 7ffb649f0900 RtlInitializeHandleTable at 7ffb6495e030 ZwReplacePartitionUnit at 7ffb6497ee80 RtlpMuiRegValidateLIPLanguage at 7ffb649e0c10 WerpThreadId at 7ffb649bcd30 vscwprintf_helper at 7ffb6496d82c LdrpLoadForwardedDll at 7ffb64901f40 NlsUnicodeToOemData at 7ffb64a46548 NtRequestWaitReplyPort at 7ffb6497c4f0 ZwWaitForKeyedEvent at 7ffb6497fa20 stricmp at 7ffb6496d550 RtlpHpHeapWalk at 7ffb6493099c NlsLeadByteInfoTable at 7ffb64a43ee0 RtlDeleteTimerQueue at 7ffb649efd00 NtSetDefaultUILanguage at 7ffb6497f1c0 LdrpTraceLoadMUIDll at 7ffb649c0a30 RtlpDosDevicesUncPrefix at 7ffb649f8080 RtlSetSystemBootStatusEx at 7ffb649cb120 AVrfpVerifierStopMessageFunction at 7ffb64a44ea8 NtYieldExecution at 7ffb6497c970 EtwpCheckForEnoughStackSpace at 7ffb649ed3b8 NtCommitEnlistment at 7ffb6497d340 RtlpGetSubSegmentBlockCount at 7ffb64929bb4 NtCreateEventPair at 7ffb6497d560 RtlAddIntegrityLabelToBoundaryDescriptor at 7ffb649c8b30 NtPrePrepareComplete at 7ffb6497e660 set_statfp at 7ffb64975188 UserLoaderGuid at 7ffb649fe318 ZwQueryDefaultLocale at 7ffb6497c350 TppJobpStopCallbackGeneration at 7ffb649eea80 MS_Windows_AeSwitchBack_Provider at 7ffb64a00560 wmakepath_s at 7ffb64976f40 iswalnum at 7ffb6496fa40 DbgBreakPointWithStatus at 7ffb6497faf0 NtSetSystemEnvironmentValueEx at 7ffb6497f500 RtlSystemTimeToLocalTime at 7ffb6495a1f0 Normalization__GetSecondDecomposedCharPlane0 at 7ffb649d9ed0 AVrfpDllLoadNotificationInternal at 7ffb649b9c9c ZwWaitForSingleObject at 7ffb6497c130 RtlFindAceBySid at 7ffb649c7914 NtQueryInformationWorkerFactory at 7ffb6497e9c0 NtCancelIoFile at 7ffb6497cc40 RtlpUpcaseUnicodeStringPrivate at 7ffb649d5794 _ascii_stricmp at 7ffb6496d500 WerpEscalationIsDisabled at 7ffb649bd670 RtlpFlsContext at 7ffb64a46120 RtlpCreateIFEOKeyFilterKey at 7ffb649c1c8c RtlTimeToElapsedTimeFields at 7ffb64959ba0 TpSetDefaultPoolMaxThreads at 7ffb649eeb50 MD4Transform at 7ffb649ec55c RtlpSetupExtendedBlock at 7ffb649d33a0 RtlDosSearchPath_U at 7ffb64969bb0 RtlpValidateHeapSegment at 7ffb649e6b64 RtlWow64PushCrossProcessWorkOntoWorkList at 7ffb649dcb20 EtwpMaxLoggers at 7ffb64a43530 RtlpDosCONINDevice at 7ffb649f8050 LdrpEnclaveAddDelayloadModules at 7ffb649adda0 ZwQueryWnfStateNameInformation at 7ffb6497ec60 RtlpRemoveHeapFromUnprotectedList at 7ffb64927fb8 EtwpAddEventToBuffer at 7ffb649edf44 TppItePush at 7ffb6494670c ZwDrawText at 7ffb6497db80 strncat at 7ffb64970de0 EtwpFlushUmLogger at 7ffb649ed590 output_l at 7ffb64972730 SecondsToStartOf1980 at 7ffb64a03e70 ultoa_s at 7ffb649762a0 RtlpIsAttributeAceInSacl at 7ffb649c82e0 RtlpRemovePendingDeleteLanguages at 7ffb649e0fa4 RtlGetTokenNamedObjectPath at 7ffb64962140 gDefaultCasingTableSize at 7ffb64a46060 RtlFreeSid at 7ffb64953b50 LdrpInvertedFunctionTableSRWLock at 7ffb64a46338 _lconv_static_W_null at 7ffb64a004e8 TppETWCallbackEnqueue at 7ffb649ef3d4 RtlpHpLfhBucketAllocateSlot at 7ffb64959710 RtlpConvertToAutoInheritSecurityObject at 7ffb649c5d3c NtdllEditWndProc_W at 7ffb6497be70 LdrpLoadDll at 7ffb64902200 AVrfInternalHeapFreeNotification at 7ffb649b97f0 RtlpIsDrainRequired at 7ffb64a469c0 RtlValidSecurityDescriptor at 7ffb648f4d00 ZwQueryInformationJobObject at 7ffb6497e920 RtlIncrementCorrelationVector at 7ffb64952000 g_SxsKeepActivationContextsAlive at 7ffb64a4650d RtlDecompressFragment at 7ffb649d2200 LdrpModuleDatatableLock at 7ffb64a460b0 ZwAddDriverEntry at 7ffb6497cde0 RtlDeleteHashTable at 7ffb64959820 ZwSecureConnectPort at 7ffb6497f080 wcstolX at 7ffb64972270 RtlUpdateClonedSRWLock at 7ffb6497b710 RtlCompressWorkSpaceSizeLZNT1 at 7ffb64965c90 LdrpPinModule at 7ffb6490eb9c RtlpHpSegMgrVaCtxFree at 7ffb649eb7f4 RtlInitString at 7ffb64901180 output_s at 7ffb64977f40 RtlSetUserFlagsHeap at 7ffb649cf760 LdrpValidateEntrySection at 7ffb649008c4 RtlpStdLockAcquire at 7ffb649db57c RtlpGetCustomCultureDataFromFile at 7ffb649d6f08 RtlpRtlpCtWaitForWnfQuiescentWorker at 7ffb649dbf00 RtlEqualLuid at 7ffb649c4cc0 RtlCreateProcessReflection at 7ffb649b6080 RtlpHypervisorSharedUserVa at 7ffb64a43ec8 szSlashDynamicDst at 7ffb649fc470 RtlpHpGCTimerInitialized at 7ffb64a46364 NlsMbCodePageTag at 7ffb64a46550 RtlAppendAsciizToString at 7ffb649c8f70 RtlLookupElementGenericTable at 7ffb64944280 RtlpDllSearchPathWithOptions at 7ffb64a44358 NtRemoveIoCompletion at 7ffb6497c1d0 RtlpMuiRegGetInstalledLanguageInfoByIndex at 7ffb649de308 RtlFlushHeaps at 7ffb64946ff0 RtlLengthSidAsUnicodeString at 7ffb648f3910 ZwCreateEnlistment at 7ffb6497d540 LdrQueryModuleInfoLocalLoaderUnlock32 at 7ffb6495f7c0 RtlpInitializeLfhBitmapData at 7ffb649ea60c NtFsControlFile at 7ffb6497c7d0 LdrpIsSubstringFound at 7ffb649b4888 EtwpReferenceUmGuidEntry at 7ffb648e630c NtCancelIoFileEx at 7ffb6497d2a0 RtlIsUntrustedObject at 7ffb649c4d90 filbuf_s at 7ffb64976134 LdrpCheckAppDirType at 7ffb649b0f8c ZwIsUILanguageComitted at 7ffb6497e060 NtRollbackRegistryTransaction at 7ffb6497efc0 LdrInitializeThunk at 7ffb649517f0 RtlpDeCommitQueryDebugInfo at 7ffb649b810c ZwSetSecurityObject at 7ffb6497f4c0 RtlpFreeTraverseNodes at 7ffb6493a3fc LdrpCheckComponentOnDemandEtwEvent at 7ffb649af6a0 RtlpFlsClonePrepare at 7ffb649be5e0 Magic10000000 at 7ffb64a04170 RtlFindClearBits at 7ffb649c9510 RtlGenerate8dot3Name at 7ffb649d64f0 RtlpHpLargeAllocSizeInternal at 7ffb64963800 LdrQueryNextListEntry32 at 7ffb649aea70 NtQueryTimer at 7ffb6497c7b0 LdrpEnclaveAddDependentModule at 7ffb649ade60 EtwEnumerateProcessRegGuids at 7ffb649ecc20 RtlpMuiRegInitPartialLanguage at 7ffb649dff60 NtRollbackComplete at 7ffb6497ef80 _GSHandlerCheck_SEH at 7ffb6497bc44 LdrpLoadCompleteEvent at 7ffb64a45280 RtlInitializeNtUserPfn at 7ffb6496bf00 ZwCompactKeys at 7ffb6497d3a0 NtCompareTokens at 7ffb6497d400 RtlRealPredecessor at 7ffb649d3ee0 LdrpRetryingModuleIndex at 7ffb64a461a0 TpReleaseAlpcCompletion at 7ffb649580e0 LdrpPathLock at 7ffb64a462c0 NtManageHotPatch at 7ffb6497e200 ZwQueryValueKey at 7ffb6497c390 ZwCreateUserProcess at 7ffb6497d920 strcat_s at 7ffb64977550 NtCreatePort at 7ffb6497d700 NtRemoveProcessDebug at 7ffb6497ee00 LdrpInitCompleteEvent at 7ffb64a45378 RtlpPageHeapStop at 7ffb649bb464 g_ShimsLoading at 7ffb64a46015 RtlSecondsSince1970ToTime at 7ffb64968fa0 NtSetVolumeInformationFile at 7ffb6497f620 RtlIsSystemAceType at 7ffb64a06b78 RtlpHeapExceptionFilter at 7ffb649ea790 RtlpDiskSpeedInit at 7ffb64a46498 ZwDeleteWnfStateData at 7ffb6497db00 SbpFindMatchingContext at 7ffb6494c6b4 NtAllocateUserPhysicalPages at 7ffb6497cee0 RtlCompressBufferXpressHuffMax at 7ffb649e8e04 ZwFlushWriteBuffer at 7ffb6497dd80 RtlpMatchUILanguage at 7ffb649d72f4 WinSqmCheckEscalationSetDWORD64 at 7ffb64962320 NtQueryWnfStateData at 7ffb6497ec40 NtdllpAllocateStringRoutine at 7ffb6494d0b8 RtlpIsEmptyImageFileOptionsKey at 7ffb649c1e28 NtRecoverEnlistment at 7ffb6497ed00 NtQueryInformationThread at 7ffb6497c550 LdrpCompareServiceChecksum at 7ffb6495c5e4 RtlValidateUnicodeString at 7ffb649575d0 RtlQueryPerformanceFrequency at 7ffb6494e830 RtlpAllocateDirPrefixBlock at 7ffb649be060 RtlSetSystemBootStatus at 7ffb64964190 RtlpCreateTraverseNodes at 7ffb6493a2b0 NtdllComboListBoxProc_W at 7ffb6497be30 NtQuerySecurityAttributesToken at 7ffb6497eb20 RtlpLoadPrimaryDbgRegWrap at 7ffb64980f80 RtlpRecordBootStatusData at 7ffb649cb46c LdrpAppxGetRemediationRegistryKey at 7ffb649ac674 NtModifyDriverEntry at 7ffb6497e2c0 NtUpdateWnfStateData at 7ffb6497f9a0 RtlSetThreadPlaceholderCompatibilityMode at 7ffb6495c330 RtlpHpVsChunkFree at 7ffb649ec104 _lconv_static_decimal at 7ffb64a004e0 RtlpCopyLegacyContextArm at 7ffb649d26e0 NtResumeThread at 7ffb6497caf0 RtlFreeUnicodeString at 7ffb64909c20 atol at 7ffb6496cb20 ZwRollforwardTransactionManager at 7ffb6497f000 ZwQuerySystemEnvironmentValueEx at 7ffb6497ebe0 _ascii_strnicmp at 7ffb6496d608 RtlpQueryAssemblyInformationActivationContextDetailedInformation at 7ffb649bed54 TppETWCallbackCancel at 7ffb649ef290 NtdllComboListBoxProc_A at 7ffb6497be20 ZwTerminateThread at 7ffb6497cb10 LdrpICallHandler at 7ffb6496c4d0 RtlpHeapPerformCrossProcessQuery at 7ffb649d0a6c NtSetIoCompletion at 7ffb6497f400 PfxInitialize at 7ffb649c4990 PsspCaptureThreadInformation at 7ffb649f2a18 LdrpMscoreeDllName at 7ffb649f8888 LoadAsDataTableBlockCount at 7ffb64a442e8 PsspDuplicateSnapshotLocalToRemote at 7ffb649f36b0 RtlpIsFrameInBounds at 7ffb6494a3dc soutput_s at 7ffb64978898 ZwCreateTransactionManager at 7ffb6497d900 ZwEnumerateDriverEntries at 7ffb6497dbe0 NormBuffer__AppendAndSortDecomposed at 7ffb649d936c NtQueryPortInformationProcess at 7ffb6497eae0 RtlUnlockMemoryBlockLookaside at 7ffb649531a0 frnd at 7ffb6497bcd0 errno at 7ffb64963d20 RtlpCheckTokenMembershipGenericMapping at 7ffb649fcb20 NtdllTitleWndProc_A at 7ffb6497bd20 RtlReadOutOfProcessMemoryStream at 7ffb649b5f50 _GSHandlerCheck at 7ffb6497235c RtlCustomCPToUnicodeN at 7ffb649c37d0 RtlQueryInformationActivationContext at 7ffb64917800 RtlpModuleEnumeratorCallback at 7ffb6495cd90 ZwCreateProfile at 7ffb6497d760 RtlpBootStatusFields at 7ffb64a12b60 _realbff0000000000000 at 7ffb649fe640 ZwStopProfile at 7ffb6497f700 TppTimerpCleanupGroupMemberVFuncs at 7ffb649f8370 RtlCopySidAndAttributesArray at 7ffb649c4c00 RtlAppxIsFileOwnedByTrustedInstaller at 7ffb649ac8a0 KiUserApcHandler at 7ffb6497fc60 LdrpCallTlsInitializers at 7ffb649050fc abs at 7ffb6496e260 RtlpCompareActivationContextGuidSectionEntryByGuid at 7ffb64955440 NtEnableLastKnownGood at 7ffb6497dba0 RtlpHpLfhOwnerCleanup at 7ffb6493068c memicmp at 7ffb6496d040 NtdllTitleWndProc_W at 7ffb6497bd30 RtlFlsGetValue at 7ffb6493de10 NtSetInformationProcess at 7ffb6497c430 vswprintf_s at 7ffb64977a20 LdrpMUIEtwOutput at 7ffb649c074c RtlQuerySecurityObject at 7ffb649b71e0 RtlAddAccessFilterAce at 7ffb649c70d0 isalnum at 7ffb6496c8c0 ZwYieldExecution at 7ffb6497c970 atan at 7ffb6496e270 EtwpBufferingModeFlush at 7ffb649ed244 _mb_cur_max at 7ffb64a3ff34 TppEnqueueTimer at 7ffb649129c0 ZwPrePrepareComplete at 7ffb6497e660 LdrpEnforceIntegrityContinuity at 7ffb64a45310 RtlDebugSetUserFlagsHeap at 7ffb649e5d0c NtQueryDefaultLocale at 7ffb6497c350 ZwCommitEnlistment at 7ffb6497d340 szLastEntry at 7ffb649fc4a8 RtlpBucketSizeIndexReuseThreshold at 7ffb64a00b00 RtlUpperString at 7ffb649c9050 RtlClearAllBits at 7ffb649519f0 RtlIsValidHandle at 7ffb6493b290 ZwCreateEventPair at 7ffb6497d560 ZwOpenObjectAuditAlarm at 7ffb6497e4a0 atan2 at 7ffb6496e4d0 LZNT1FindMatchStandard at 7ffb649e87b0 RtlDoesFileExists_UstrEx at 7ffb64905e80 RtlpHpVsContextGrowInPlace at 7ffb6497b950 RtlDestroyProcessParameters at 7ffb6495e340 flswbuf at 7ffb649761e8 NtReplacePartitionUnit at 7ffb6497ee80 RtlpHpLargeAllocationDestroy at 7ffb649eadd4 ZwPrepareComplete at 7ffb6497e6a0 NtWaitForKeyedEvent at 7ffb6497fa20 RtlGetNonVolatileToken at 7ffb649d61d0 RtlpHasMachineUILock at 7ffb649dd2e0 TlgDefineProvider_annotation__TlgRtlpCapChkTraceLoggingProviderProv at 7ffb649b0df0 ZwSetDefaultUILanguage at 7ffb6497f1c0 DbgUiConvertStateChangeStructureWorker at 7ffb649ad0f0 ValidatePointer at 7ffb6494d760 RtlCSparseBitmapBitmaskRead at 7ffb64930fe8 RtlpCallSecureMemoryCallbacks at 7ffb649d43e0 NormalYearDaysPrecedingMonth at 7ffb64a04178 ZwRequestWaitReplyPort at 7ffb6497c4f0 RtlDecompressBufferProcs at 7ffb649f8d40 RtlpStackDbEntryCreate at 7ffb649f555c NtQueryWnfStateNameInformation at 7ffb6497ec60 RtlReportExceptionHelper at 7ffb649bc0d0 _imp_NtDeviceIoControlFile at 7ffb64a00ac0 RtlEnableThreadProfiling at 7ffb649aca80 RtlpNtOpenKey at 7ffb6495ca70 splitpath at 7ffb6496d1f0 RtlpExceptionHandler at 7ffb649811c0 RtlpLogHeapSubSegmentInitialize at 7ffb649e3c34 NtDrawText at 7ffb6497db80 RtlDosPathNameToNtPathName_U_WithStatus at 7ffb64909310 ZwSetSystemEnvironmentValueEx at 7ffb6497f500 RtlCompareUnicodeString at 7ffb648f9f60 RtlUnicodeStringCbCatStringN at 7ffb6494a774 RtlUdiv128 at 7ffb649dc810 LdrAccessResource at 7ffb648ff470 LdrpReleaseActCtxW at 7ffb64a46008 ZwQueryInformationWorkerFactory at 7ffb6497e9c0 g_SbCachedModuleTable_RTL at 7ffb64a42770 ZwCancelIoFile at 7ffb6497cc40 LdrpOriginalAppPackagesPath at 7ffb64a44380 NtWaitForSingleObject at 7ffb6497c130 TppWorkCallbackEpilog at 7ffb64946ec0 MuiCacheSWRLock at 7ffb64a464b0 SbSupportedOsList at 7ffb649f8270 RtlDeleteBoundaryDescriptor at 7ffb6494d0e0 RtlpInitializeSecondLevelDir at 7ffb6494f57c RtlWow64PopAllCrossProcessWorkFromWorkList at 7ffb649dc8c0 _lookuptable_s at 7ffb64a00500 NtAddDriverEntry at 7ffb6497cde0 NtSecureConnectPort at 7ffb6497f080 LdrAppxHandleIntegrityFailure at 7ffb649ac190 NtQueryInformationJobObject at 7ffb6497e920 RtlpHpTaggableHeap at 7ffb6492d64c RtlFlushNonVolatileMemoryRanges at 7ffb649d6120 wcsnlen at 7ffb64971ea0 RtlCopyUnicodeString at 7ffb648f50a0 RtlWriteRegistryValue at 7ffb6496ab60 TpCallbackUnloadDllOnCompletion at 7ffb6495e2c0 CsrIdentifyAlertableThread at 7ffb64962320 RtlpMuiRegFreeLanguageConfigList at 7ffb648e5f60 WinSqmIsOptedIn at 7ffb64962320 WerReportSQMEvent at 7ffb649bd5c0 RtlSparseArrayElementAllocate at 7ffb6492de60 RtlInitializeAtomPackage at 7ffb64962320 WerReportExceptionWorker at 7ffb649bc8b0 NtdllBaseTag at 7ffb64a4542c RtlRaiseStatus at 7ffb649dbf40 RtlpEnvironLookupTable at 7ffb64a45b80 ZwRemoveIoCompletion at 7ffb6497c1d0 TpReleaseJobNotification at 7ffb6495d8b0 ZwFsControlFile at 7ffb6497c7d0 RtlAcquirePebLock at 7ffb64959150 NtCreateEnlistment at 7ffb6497d540 NormalizationListHead at 7ffb64a3f600 RtlpMoveActCtxToFreeList at 7ffb649beb18 RtlLogStackBackTrace at 7ffb649dad00 PssNtQuerySnapshot at 7ffb649f0cd0 RtlpHpTagContextFindFreeTag at 7ffb6492e804 TppCleanupGroupRemoveMember at 7ffb64953c08 RtlpValidAttribute at 7ffb649c852c TppPoolpDefaultPoolCpuSetCount at 7ffb64a4658c handle_error at 7ffb649740bc ImportTablepHashCanonicalLists at 7ffb649bf664 SbDynamicContextDllCount at 7ffb64a42740 RtlpStackDbSegmentFindOrCreate at 7ffb649f57b4 RtlWow64PopCrossProcessWorkFromFreeList at 7ffb649dc9e0 RtlRealSuccessor at 7ffb64944820 NtCompactKeys at 7ffb6497d3a0 ZwCompareTokens at 7ffb6497d400 LdrEnumResources at 7ffb649bffb0 ZwManageHotPatch at 7ffb6497e200 RtlSetInformationAcl at 7ffb649c7a10 CsrPortMemoryRemoteDelta at 7ffb64a45b40 ZwCreatePort at 7ffb6497d700 ZwRemoveProcessDebug at 7ffb6497ee00 LdrIsModuleSxsRedirected at 7ffb649ae880 RtlpInitializeStackTraceDatabase at 7ffb649db160 TpCallbackSendPendingAlpcMessage at 7ffb6496b8e0 decomp at 7ffb64974f30 vsnwprintf_l at 7ffb6496daec NtQueryValueKey at 7ffb6497c390 RtlpMoveHeapBetweenLists at 7ffb64927e08 RtlDeleteBarrier at 7ffb649ca7d0 NtCreateUserProcess at 7ffb6497d920 AVrfpFindClosestThunkDuplicate at 7ffb649ba03c WinSqmAddToStreamEx at 7ffb6495f7c0 RtlpHpStackTraceHeapDisable at 7ffb649e26d0 RtlpMuiRegAddLanguageByName at 7ffb649dd6f8 LdrpLoaderLock at 7ffb64a3f4f8 ZwRollbackRegistryTransaction at 7ffb6497efc0 matherr_flag at 7ffb64a3ff30 NtSetSecurityObject at 7ffb6497f4c0 vsnwprintf_s at 7ffb64976ac0 ZwCancelIoFileEx at 7ffb6497d2a0 NtIsUILanguageComitted at 7ffb6497e060 LdrpLoaderLock_DEBUG at 7ffb64a3f978 ZwQueryTimer at 7ffb6497c7b0 AlpcRegisterCompletionListWorkerThread at 7ffb6494f660 ShipAssertMsgA at 7ffb649bd110 RtlpHpSegLfhVsFree at 7ffb649249b0 ZwRollbackComplete at 7ffb6497ef80 LdrQueryNextListEntry at 7ffb64941ec0 RtlpHpEnvQueryProcessorCount at 7ffb6492c6a4 RtlStartRXact at 7ffb6495f000 wtoi at 7ffb6496e1f0 wtol at 7ffb6496e240 CsrPortName at 7ffb64a45b20 ZwQueryWnfStateData at 7ffb6497ec40 RtlpProcessMemoryMap at 7ffb64a43ba0 ZwRecoverEnlistment at 7ffb6497ed00 RtlpMuiRegGetFallbackInstalledLanguageInfoByLangId at 7ffb649ddd34 ZwQueryInformationThread at 7ffb6497c550 LZNT1FindMatchMaximum at 7ffb649e8730 RtlCreateAcl at 7ffb648f1a50 RtlSidIsHigherLevel at 7ffb649c52f0 RtlLocateExtendedFeature at 7ffb649d2410 NtdllScrollBarWndProc_A at 7ffb6497bd00 RtlpHeapLogRangeDestroy at 7ffb649e16d4 LdrpFindLoadedDllByHandle at 7ffb648f868c LdrpLogVsmEnclaveLdrCreateEnclaveTelemetry at 7ffb649b0738 WinSqmGetEscalationRuleStatus at 7ffb64962320 NtDeleteWnfStateData at 7ffb6497db00 atoi64 at 7ffb6496cad0 WinSqmSetDWORD64 at 7ffb6495f7c0 ZwSetVolumeInformationFile at 7ffb6497f620 EtwpUseDescriptorType at 7ffb649ecf50 NtFlushWriteBuffer at 7ffb6497dd80 RtlGuardRestoreContext at 7ffb648feed0 VrfcoreDllString at 7ffb649f9448 NtdllScrollBarWndProc_W at 7ffb6497bd10 RtlTraceDatabaseUnlock at 7ffb649dc4c0 ZwAllocateUserPhysicalPages at 7ffb6497cee0 RtlpInitializeMap at 7ffb649d474c RtlpLogHeapLockEvent at 7ffb649e3704 RtlQueryPackageIdentity at 7ffb64949640 Crc32Ctrl at 7ffb649f88d0 LdrpBuildSystem32FileName at 7ffb64905794 swoutput_s at 7ffb6497982c RtlpGetCustomCultureData at 7ffb649d6e90 _pctype_func at 7ffb649724b0 LdrpMrdataSize at 7ffb64a5a280 LZNT1Formats at 7ffb64a1a2c0 NtQuerySystemEnvironmentValueEx at 7ffb6497ebe0 RtlSetImageMitigationPolicy at 7ffb649c0db0 RtlSetEnvironmentVariable at 7ffb6493c780 RtlReplaceSidInSd at 7ffb649c4f20 RtlCopySid at 7ffb648f4ac0 RtlpGetWindowsPolicy at 7ffb649dd1c4 RtlCreateUmsCompletionList at 7ffb649d3550 NtTerminateThread at 7ffb6497cb10 ZwSetIoCompletion at 7ffb6497f400 RtlpProcessHeapsListBuffer at 7ffb64a43c40 ZwQuerySecurityAttributesToken at 7ffb6497eb20 LdrpGetDelayloadDescriptor at 7ffb649af3e4 ZwResumeThread at 7ffb6497caf0 g_pfnSE_DllLoaded at 7ffb64a5a268 RcConsolidateFrames at 7ffb64980640 EtwpRegistrationSequence at 7ffb64a43524 NtRollforwardTransactionManager at 7ffb6497f000 RtlDebugCreateTagHeap at 7ffb649e4fc4 RtlxUnicodeStringToOemSize at 7ffb64941bf0 DeprecatedDll at 7ffb64a0c180 RtlpRegisterStackTrace at 7ffb649e41ec RtlCommitDebugInfo at 7ffb649b74f0 ZwModifyDriverEntry at 7ffb6497e2c0 ZwUpdateWnfStateData at 7ffb6497f9a0 RtlpLeakCallbackRoutine at 7ffb649d4790 WinSqmCommonDatapointSetDWORD at 7ffb64964ae0 LdrImageDirectoryEntryToLoadConfig at 7ffb648ff4d0 RtlGetSetBootStatusData at 7ffb649cae50 SbGetContextDetailsById at 7ffb6490ce18 RtlFindExportedRoutineByName at 7ffb64958800 crc32Map1_ at 7ffb64a0abb0 AlternateResourceModules at 7ffb64a44338 RtlpHpHeapGlobals at 7ffb64a43540 LeapYearDaysPrecedingMonth at 7ffb64a03e48 RtlRandomEx at 7ffb648e9c90 TpDbgSetLogRoutine at 7ffb6495f7c0 RtlWow64EnableFsRedirection at 7ffb64964730 CsrPortHandle at 7ffb64a45b48 NtSaveKeyEx at 7ffb6497f040 TpReleaseTimer at 7ffb64911890 NtOpenProcess at 7ffb6497c570 NtCreateWaitablePort at 7ffb6497d960 wcsncpy_s at 7ffb64977d30 RtlpDosNULDevice at 7ffb649f8010 RtlpGetTargetRvaFlag at 7ffb64934d58 LdrpMaximumUserModeAddress at 7ffb64a45020 RtlpGetUserOrMachineUILanguage4NLS at 7ffb649dcf90 LdrCallEnclave at 7ffb649ad560 RtlpHeapStopOn at 7ffb64a438e0 NtCompressKey at 7ffb6497d440 RtlFlushNonVolatileMemory at 7ffb649d5890 RtlpDebugPageHeapCreate at 7ffb649e44c0 RtlInitOutOfProcessMemoryStream at 7ffb6495f7c0 RtlSubscribeWnfStateChangeNotification at 7ffb648e9d50 RtlpWaitCouldDeadlock at 7ffb64916880 LdrpInvertedFunctionTable at 7ffb64a5a4d0 RtlInitializeSRWLock at 7ffb64948830 RtlpHeapStackTraceLog at 7ffb64a46a38 strspn at 7ffb649712e0 EtwTraceMessageVa at 7ffb649334a0 RtlEndWeakEnumerationHashTable at 7ffb649d23a0 RtlAddActionToRXact at 7ffb64968140 NtCreateThreadEx at 7ffb6497d840 PebLdr at 7ffb64a453c0 NtAlpcDeletePortSection at 7ffb6497d060 ZwAlertResumeThread at 7ffb6497ce40 ZwCreateEvent at 7ffb6497c9b0 NtInitiatePowerAction at 7ffb6497e020 RtlpAppPackageAuthority at 7ffb649fcb30 g_SxsFreeActivationContexts at 7ffb64a46608 RtlpCreateProcessRegistryInfo at 7ffb648f41c0 RtlpPopulateLanguageConfigList at 7ffb649df2d8 TppPoolpFree at 7ffb64961030 LdrpThunkTemplate at 7ffb64a42720 RtlpSetTimeZoneInformationWorker at 7ffb649cb778 LdrpAppxEtwGenericIntegrityFailure at 7ffb649ac3a0 ZwDelayExecution at 7ffb6497c730 RtlpMuiRegCreateLanguages at 7ffb649ddc04 RtlpWalkHeap at 7ffb649d16d0 RtlpUnregisterLockedMemoryZone at 7ffb64953290 NtQueryInformationTransactionManager at 7ffb6497e9a0 ZwOpenKeyTransactedEx at 7ffb6497e440 NtCreateResourceManager at 7ffb6497d7c0 NtPropagationFailed at 7ffb6497e760 LdrpSetProtection at 7ffb64961c6c RtlpAllocateEnvBlock at 7ffb6493d17c RtlCompressBufferLZNT1 at 7ffb649e88f0 NtSetUuidSeed at 7ffb6497f600 ZwWriteRequestData at 7ffb6497cb90 RtlpCleanupRegistryKeys at 7ffb649cc4f0 input_l at 7ffb649756a0 LdrpCompareRedirectedFunction at 7ffb649b574c NtSetWnfProcessNotificationEvent at 7ffb6497f640 TpAlpcUnregisterCompletionList at 7ffb64957fa0 wcscpy at 7ffb64971cb0 AlpcUnregisterCompletionList at 7ffb64964a80 RtlGetUnloadEventTraceEx at 7ffb649aefe0 CurDirDllLoadFailureError at 7ffb64a0c1a0 RtlpHpSegMgrApplyLargePagePolicy at 7ffb649eb550 RtlpUnloadEventTrace at 7ffb64a45440 SbpContextLock at 7ffb64a46488 RtlReleaseStackTrace at 7ffb649dad30 controlfp at 7ffb64973f80 TlgDefineProvider_annotation__TlgRtlpHpTraceLoggingProviderProv at 7ffb649b0df0 RtlpUmsExecuteYieldThreadEnd at 7ffb64980ef6 NtUnmapViewOfSectionEx at 7ffb6497f960 RtlpHpLfhContextLockUnlock at 7ffb649eaba0 RtlpHpLargeAllocationProtect at 7ffb649eaec4 TppPoolpGlobalPoolMaxThreads at 7ffb64a46588 ZwGetWriteWatch at 7ffb6497df60 RtlpCSparseBitmapUnlock at 7ffb6492e0dc RtlUnsubscribeWnfNotificationWithCompletionCallback at 7ffb64964850 RtlNumberOfSetBitsUlongPtr at 7ffb64964130 TppETWCallbackStart at 7ffb649ef470 ZwSetInformationJobObject at 7ffb6497f2c0 RtlpNtAuthority at 7ffb649fc9e0 RtlLockHeapManagerForCloning at 7ffb649cf294 RtlpCtContextFree at 7ffb649dbd80 LdrpArmProcessRelocation at 7ffb649c21cc KiUserCallbackDispatcherHandler at 7ffb6497fd60 ZwSaveMergedKeys at 7ffb6497f060 RtlGetSystemTimePrecise at 7ffb648ebaf0 ZwAlpcAcceptConnectPort at 7ffb6497cf40 NtQueryIoCompletion at 7ffb6497ea20 ZwImpersonateThread at 7ffb6497dfa0 ZwQueryKey at 7ffb6497c370 NtOpenEvent at 7ffb6497c8b0 gLocaleDataRegKey at 7ffb64a469d0 RtlTryAcquirePebLock at 7ffb64926b90 RtlpMUIEnumerateFolder at 7ffb649cd26c RtlOpenModernAppOptionsKey at 7ffb649c0d18 RtlpCapChkTelemetryRunOnceCtx at 7ffb64a463f0 LdrpMrdataUnprotected at 7ffb64a5a3b8 RtlGetExtendedFeaturesMask at 7ffb649d23f0 RtlpHpAppCompatDontChangePolicy at 7ffb6495f7c0 RtlpValidTrustSubjectContext at 7ffb6496b3d4 RtlpMuiRegLoadInstalled at 7ffb649dffb8 EtwpFreeRegistrationList at 7ffb64a46190 TppFastAlpcAdjustConcurrencyCount at 7ffb649138ac RtlpGetBlockSizeEx at 7ffb6493d1a8 RtlpApplyAclToObject at 7ffb648ee718 ZwAllocateLocallyUniqueId at 7ffb6497cea0 _except_validate_context_record at 7ffb64972428 RtlDecompressBufferEx at 7ffb64960060 RtlpHpMetadataHeapCtxGet at 7ffb6492c67c RtlCompressBufferXpressLzMax at 7ffb649e95a8 LdrpGetImageSize at 7ffb648fa8f0 TppPoolpGlobalPoolStackSize at 7ffb64a46078 NtQueryInformationEnlistment at 7ffb6497e900 RtlpWaitOnAddressWakeEntireList at 7ffb648e6358 NtClose at 7ffb6497c290 EtwpFreeStreamIndexMap at 7ffb649670e4 g_pfnSE_InitializeEngine at 7ffb64a5a240 RtlLookupFirstMatchingElementGenericTableAvl at 7ffb649671e0 RtlpBucketBlockSizes at 7ffb64a01270 RtlStringCbPrintfW at 7ffb649b7ed0 Normalization__GuessCharCountBySize at 7ffb649d9f44 RtlpAllocateTags at 7ffb649cfd80 RtlpUnlockStack at 7ffb649658cc LdrpHeap at 7ffb64a45420 _realbfe5c28f5c28f5c3 at 7ffb649ffb90 RtlpGetNtProductTypeFromRegistry at 7ffb649678b8 ZwSetValueKey at 7ffb6497cca0 wcsrchr at 7ffb64971f20 LdrpComPlusVersionName at 7ffb64a0c660 ZwQueryLicenseValue at 7ffb6497ea40 RtlpInterceptorRoutines at 7ffb649f91c0 RtlWow64RequestCrossProcessHeavyFlush at 7ffb649dcd50 RtlIsGenericTableEmptyAvl at 7ffb649d41f0 itow_s at 7ffb64976550 ZwRollbackTransaction at 7ffb6497efe0 NtCreatePagingFile at 7ffb6497d6c0 RtlpValidateHeapHdrsEnable at 7ffb64a46a44 TppWaitpCleanupGroupMemberVFuncs at 7ffb649f8330 RtlSetUmsThreadInformation at 7ffb649d3ce0 ZwGetNlsSectionPtr at 7ffb6497df20 TppETWTimerCancelNtTimer at 7ffb649ef7a0 SbAtomicCaptureContextGuid at 7ffb6494c6f0 RtlpModernAppKey at 7ffb64a442e0 Kernel32ThreadInitThunkFunction at 7ffb64a44ef0 itoa_s at 7ffb64976250 NtOpenMutant at 7ffb6497e480 TpReserveTaskPost at 7ffb6490fe18 RtlSeekMemoryStream at 7ffb649b5f50 ZwReleaseSemaphore at 7ffb6497c1f0 LdrpIsSecureProcess at 7ffb64a45430 LdrpAppHeaders at 7ffb64a45308 TppETWTimerSet at 7ffb649ef9b8 AVrfDllUnloadNotification at 7ffb649b8cc4 NtQueryInformationResourceManager at 7ffb6497e960 LdrpSuppressedExportOverrideListPtr at 7ffb64a45360 RtlpHpGCTimer at 7ffb64a46038 Wow64EnvironmentThunkTable at 7ffb649f8c50 RtlpHpMetadataAlloc at 7ffb6492c900 RtlpLogHeapDecommit at 7ffb649e3528 NtCompleteConnectPort at 7ffb6497d420 LdrpCurrentDllInitializer at 7ffb64a45ac8 RtlGetLongestNtPathLength at 7ffb64962e50 LdrpAppxGetBinaryNameKeyInformation at 7ffb649ac520 TppRaiseInvalidParameter at 7ffb649ef1d8 RtlTimeToSecondsSince1970 at 7ffb64959c90 wcsncat_s at 7ffb64977c10 RtlpHpHeapFeatures at 7ffb64a46058 TppETWPoolThreadMin at 7ffb649ef720 RtlFindSetBitsAndClear at 7ffb649c9cc0 AvrfpLoaderEntry at 7ffb64a44620 EtwCreateTraceInstanceId at 7ffb649ed040 ZwAccessCheck at 7ffb6497c0b0 RtlValidSid at 7ffb648f4e00 Magic10000 at 7ffb64a03e68 ZwSetBootEntryOrder at 7ffb6497f0c0 _ascii_memicmp at 7ffb6496cfd0 LdrpMakeUnicodeStringFromPathElement at 7ffb649b0adc RtlSplay at 7ffb64944360 ZwDeleteObjectAuditAlarm at 7ffb6497daa0 LdrpResolveDelayLoadDescriptor at 7ffb648f7358 RtlGetUnloadEventTrace at 7ffb649aefd0 LdrpAddRedirectedFunction at 7ffb649b5274 ZwFindAtom at 7ffb6497c330 RtlFlsAlloc at 7ffb649485c0 RtlIsMultiUsersInSessionSku at 7ffb64962330 RtlpFreezeTimeBias at 7ffb64a46348 TppPoolpGlobalPoolLock at 7ffb64a46480 LdrGetDllHandleByMapping at 7ffb6490ddb0 NtPrivilegeObjectAuditAlarm at 7ffb6497e700 RtlpQueryDiskWriteConstraintPolicy at 7ffb649f4744 AVrfpDebug at 7ffb64a465d4 ZwCreateMailslotFile at 7ffb6497d660 TpDbgDumpHeapUsage at 7ffb649eefe0 RtlDowncaseUnicodeChar at 7ffb649c8bf0 ZwLoadDriver at 7ffb6497e0a0 StringCchPrintfW at 7ffb649bd1a4 NtQueryQuotaInformationFile at 7ffb6497eb00 LdrpVectorHandlerList at 7ffb64a5a3c0 RtlpExceptionLogCount at 7ffb64a43b80 ZwWaitHighEventPair at 7ffb6497fa60 RtlWow64SuspendProcess at 7ffb649bb760 LdrpRemoveAlternateModuleCacheItem at 7ffb6494f154 RtlCreateUserThread at 7ffb648e56f0 LdrpHashUnicodeString at 7ffb649095ac NtCreateToken at 7ffb6497d8a0 NtSuspendThread at 7ffb6497f760 LdrpLogIntegrityContinuityTelemetry at 7ffb649b0090 NtSetInformationWorkerFactory at 7ffb6497f3c0 ui64tow_s at 7ffb64976580 RtlpWow64CtxToAmd64 at 7ffb649dcdb8 RtlCopyString at 7ffb64963ea0 RtlDosLongPathNameToNtPathName_U_WithStatus at 7ffb649acf60 ZwShutdownWorkerFactory at 7ffb6497f680 NtRegisterProtocolAddressInformation at 7ffb6497ed60 _imp_NtCreateFile at 7ffb64a00ab8 RtlpCtContextInit at 7ffb649dbddc RtlpGetFreeBlockInsidePageBoundaries at 7ffb64927acc RtlResetNtUserPfn at 7ffb6496c020 ZwOpenEventPair at 7ffb6497e3a0 RtlLocateLegacyContext at 7ffb6495f7d0 RtlpLogExceptionHandler at 7ffb649daacc NtUserPfn at 7ffb64a5a000 RtlIsStateSeparationEnabled at 7ffb64957620 ZwAlpcCreatePortSection at 7ffb6497cfe0 RtlInterlockedPopEntrySList at 7ffb6497fb60 _guard_check_icall_fptr at 7ffb64a5a1e0 NtRenameKey at 7ffb6497ee20 EtwpProviderArrivalCallback at 7ffb649ee214 RtlpUnregisterLockedMemoryBlockLookaside at 7ffb649532d0 RtlStdDeleteStackDatabase at 7ffb649dad60 ZwSetQuotaInformationFile at 7ffb6497f4a0 RtlWriteNonVolatileMemory at 7ffb649d6240 ZwCreateJobSet at 7ffb6497d5e0 RtlLookupFunctionEntry at 7ffb648fe310 RtlpDecRefWnfUserSubscription at 7ffb648e6e00 RtlpCreateServerAcl at 7ffb649c62a8 CsrGetProcessId at 7ffb649ac120 RtlpTpETWCallbackStart at 7ffb649ef470 NtCreateThread at 7ffb6497ca70 ZwThawRegistry at 7ffb6497f800 NtSetInformationObject at 7ffb6497cc20 RtlpEnsureLiveDeadListsInitialized at 7ffb649bea80 EtwpAddDebugInfoEvents at 7ffb649eddfc ZwIsSystemResumeAutomatic at 7ffb6497e040 RtlLargeIntegerToUnicode at 7ffb649caa10 RtlpHpPerHeapStackTraceCleanup at 7ffb649e1960 RtlPosixBarrier at 7ffb649ca824 ZwAccessCheckByTypeResultListAndAuditAlarmByHandle at 7ffb6497cd60 RtlpGetHeapProtection at 7ffb64926d7c g_pfnSE_GetProcAddressForCaller at 7ffb64a5a1f0 RtlpHpTagInitVar at 7ffb64a46408 RtlStdReleaseStackTrace at 7ffb649db030 NtDeleteAtom at 7ffb6497da00 LdrInitializeEnclave at 7ffb649ad710 RtlAddAuditAccessAce at 7ffb6496aac0 RtlpValidateLFHBlock at 7ffb649e7d54 RtlFreeThreadActivationContextStack at 7ffb6494e380 NtQuerySecurityPolicy at 7ffb6497eb60 RtlDebugGetUserInfoHeap at 7ffb649e54c0 ZwQuerySystemInformation at 7ffb6497c770 AVrfpSnapDllImports at 7ffb649ba844 NtAlpcDeleteSecurityContext at 7ffb6497d0c0 ZwSetCachedSigningLevel2 at 7ffb6497f120 ZwQueryInstallUILanguage at 7ffb6497e9e0 RtlIsCurrentProcess at 7ffb64951d20 vscprintf at 7ffb6496d810 LdrQueryOptionalDelayLoadedAPI at 7ffb649af1a0 DbgPrompt at 7ffb649bfd20 RtlStringFromGUID at 7ffb64949c50 RtlpStackDbEntryCleanup at 7ffb649f54d8 TppSimplepCleanupGroupMemberVFuncs at 7ffb649f83b0 ZwQueryOpenSubKeysEx at 7ffb6497eac0 NtRevertContainerImpersonation at 7ffb6497ef60 RtlpHpStackTraceAddStack at 7ffb649e1d6c strlen at 7ffb64970d20 RtlpGlobalTagHeap at 7ffb64a46968 TppReportExceptionFilter at 7ffb649ef258 RtlEqualComputerName at 7ffb64967da0 RtlpTheEmptyActivationContextData at 7ffb649fcc18 RtlKnownExceptionFilter at 7ffb649da530 WinSqmStartSessionForPartner at 7ffb64964a30 LdrpLoadKnownDll at 7ffb649095e0 RtlpDosCONDevice at 7ffb649f8030 RtlEnumerateGenericTableWithoutSplayingAvl at 7ffb64946a70 AlpcGetCompletionListLastMessageInformation at 7ffb649bfc70 LdrpLocateMrdata at 7ffb649b6000 RtlGetDeviceFamilyInfoEnum at 7ffb64954750 LdrControlFlowGuardEnforcedWithExportSuppression at 7ffb648faed8 RtlSetTimer at 7ffb649efd10 RtlGetLastWin32Error at 7ffb649d6d00 RtlpEnclaveCallDispatchFilter at 7ffb6496c410 MatchAll at 7ffb64962320 NtReplyWaitReceivePort at 7ffb6497c210 LdrpResValidateFilePath at 7ffb649c344c Normalization__GetLastChar at 7ffb649d9d38 ZwAlpcConnectPortEx at 7ffb6497cfa0 RtlpWnfETWEventNameSubRundown at 7ffb649bda98 LdrFlushAlternateResourceModules at 7ffb6496a400 RtlIpv4AddressToStringExA at 7ffb649d5a20 CfgAddressToBitState at 7ffb649351ec RegistryInfoCritSect at 7ffb64a43d00 ZwEnumerateBootEntries at 7ffb6497dbc0 SignalStartWerSvc at 7ffb649bc748 TppJobpCallbackEpilog at 7ffb64948590 RtlpProtectedPoliciesActiveCount at 7ffb64a5a2c8 RtlpHpStackDbAllocRoutine at 7ffb649e1c10 RtlpIsSubSegmentReuseable at 7ffb64922bdc RtlSidDominatesForTrust at 7ffb648ef520 RtlpFilterSacl at 7ffb649c64e4 RtlpHeapLogRangeRelease at 7ffb649e1764 RtlpValidCompoundAce at 7ffb649c87a0 NtTerminateProcess at 7ffb6497c630 RTLP_FLS_CALLBACK_ENTRY::IsEmpty at 7ffb6497b614 RtlpWakeByAddress at 7ffb648e6fcc LdrpCreateLangFallbackList at 7ffb648f5604 RtlpHpSegReportSegment at 7ffb64930efc LdrFindResourceDirectory_U at 7ffb649c0250 sscanf at 7ffb64970940 RtlIpv4AddressToStringExW at 7ffb649579b0 RtlpCheckDeviceName at 7ffb64968080 RtlpSecMemListHead at 7ffb64a3fa78 input_s at 7ffb64978e1c ZwCancelTimer at 7ffb6497ccc0 RtlPushFrame at 7ffb649476f0 ZwQueueApcThread at 7ffb6497c950 strpbrk at 7ffb649711f0 RtlpHpLfhContextCleanup at 7ffb649305fc EtwpAddBinaryInfoEvents at 7ffb649edca0 RtlpSetPreferredUILanguages at 7ffb649cddf0 RtlDeleteElementGenericTableAvl at 7ffb64943920 RtlpUmsSwitchSequence at 7ffb64980bd0 LoadAsDataTableCount at 7ffb64a44330 LdrpInitializeExecutionOptions at 7ffb649b1900 RtlpStdGetSpaceForTrace at 7ffb649db4c8 NtSetEaFile at 7ffb6497f200 RtlDebugSizeHeap at 7ffb649e606c RtlpHpLfhBucketSubsegmentStatsUpdate at 7ffb64967124 TpAllocPool at 7ffb649428f0 ZwLockVirtualMemory at 7ffb6497e1a0 EtwEventWrite at 7ffb649326b0 LdrpDependencyExist at 7ffb64901f00 ZwWaitForMultipleObjects at 7ffb6497cc00 NtdllComboBoxWndProc_A at 7ffb6497be00 RtlExecuteUmsThread at 7ffb649d39b0 ZwQueryPerformanceCounter at 7ffb6497c6d0 LdrFatalInitError at 7ffb649fe308 RtlCopyOutOfProcessMemoryStreamTo at 7ffb649b5f50 `_control87'::`2'::dazSupported at 7ffb64a3fb20 CheckHeapFillPattern at 7ffb64a00a50 wcstoi64 at 7ffb6496de70 RtlIsPartialPlaceholder at 7ffb6495c380 RtlIpv6AddressToStringExA at 7ffb649d5ae0 RtlpValidateRemoteDebugInformation at 7ffb649b85b4 RtlReleasePath at 7ffb649123b0 RtlGetThreadLangIdByIndex at 7ffb649cbe00 gDefaultLocaleId at 7ffb64a4605c RtlpHpVaMgrCtxStart at 7ffb649eb2ac NtdllDesktopWndProc_A at 7ffb6497bd60 SwitchedRtlGetVersion_Current at 7ffb64962320 matherr at 7ffb64962320 NtOpenTransaction at 7ffb6497e600 g_pfnApphelpCheckModuleProc at 7ffb64a5a208 RtlpRaiseExceptionOnPossibleDeadlock at 7ffb64a43ec1 ZwCommitComplete at 7ffb6497d320 NtConvertBetweenAuxiliaryCounterAndPerformanceCounter at 7ffb6497d480 pctype at 7ffb64a3f000 NtPlugPlayControl at 7ffb6497e640 gCustomCultureRegKey at 7ffb64a469c8 ZwPrePrepareEnlistment at 7ffb6497e680 NormBuffer__LastStartBasePair at 7ffb649d9688 RtlpWalkFrameChain at 7ffb648ff570 RtlHpQuerySegmentHeapRoutine at 7ffb649cf030 Magic86400000 at 7ffb64a03ff0 ExpInterlockedPopEntrySList at 7ffb6497fb60 NtMapViewOfSectionEx at 7ffb6497e280 LdrpAddNodeServiceTag at 7ffb64957650 RtlAddAccessAllowedAceEx at 7ffb649597f0 wcsupr at 7ffb6496e140 LdrpFindOrPrepareEnclaveModule at 7ffb649ae070 wctomb_s at 7ffb64976044 RtlAddCompoundAce at 7ffb649c72e0 NtdllDesktopWndProc_W at 7ffb6497bd70 `RtlpGetCustomCultureRegKey'::`2'::ObjAttribute at 7ffb649f9600 NtSinglePhaseReject at 7ffb6497f6c0 NtSetInformationFile at 7ffb6497c590 RtlEnclaveCallDispatcher at 7ffb6497ff10 NtPrepareEnlistment at 7ffb6497e6c0 RtlIpv6AddressToStringExW at 7ffb649314c0 RtlDecompressBuffer at 7ffb649d2180 NtAccessCheckAndAuditAlarm at 7ffb6497c5d0 RtlDeleteUmsCompletionList at 7ffb649d3780 RtlComputePrivatizedDllName_U at 7ffb649b5bd0 ImportTablepInsertModuleSorted at 7ffb649bf74c KiUserApcDispatch at 7ffb6497fce0 RtlpQueryDiskSpacePolicy at 7ffb649f4538 LdrpDispatchUserCallTarget at 7ffb6496c590 RtlpStackTraceDatabase at 7ffb64a43b78 RtlpLDCrtPage at 7ffb64a469b8 EtwpFindAndLockBufferForFlushing at 7ffb649ed528 RtlBarrier at 7ffb649ca7b0 TppIopFree at 7ffb6495d110 GetShipAssertBuffer at 7ffb649bce48 RtlControlStackTraceDataBase at 7ffb649dac98 RtlpHpGetUserInfo at 7ffb6494e03c TppExceptionFilter at 7ffb649ef094 RtlpMuiRegResizeLanguageConfigList at 7ffb649def0c RtlpGetTagName at 7ffb649d0974 RtlDeleteResource at 7ffb64912b20 ZwCreateLowBoxToken at 7ffb6497d640 RtlSetThreadWorkOnBehalfTicket at 7ffb64913840 SHA256Transform at 7ffb648ed9f8 RtlFreeUserFiberShadowStack at 7ffb649c0cd0 RtlpInterlockedPopEntrySList at 7ffb6497fb60 RtlpHeapQueryTotalReserveSize at 7ffb649d0c80 RtlpLogHeapAffinitySlotAssign at 7ffb649e3220 RtlpBusyList at 7ffb64a43bb0 NtCreateEnclave at 7ffb6497d520 EtwpGlobalSequence at 7ffb64a43520 TelemetryEventThrottle at 7ffb64a42738 tolower at 7ffb64971b80 ZwInitializeNlsFiles at 7ffb6497dfe0 ZwWorkerFactoryWorkerReady at 7ffb6497c0d0 TppWorkUnposted at 7ffb649eee90 LdrpModuleBaseAddressIndex at 7ffb64a462c8 NtMapViewOfSection at 7ffb6497c5b0 _lconv_static_null at 7ffb64a004e2 RtlAddAccessAllowedAce at 7ffb648f27b0 KiUserExceptionDispatcher at 7ffb6497fe40 strlwr at 7ffb6496d570 RtlTimeToSecondsSince1980 at 7ffb64959b60 ZwSetInformationTransaction at 7ffb6497f360 RtlpConvertRelativeToAbsoluteSecurityAttribute at 7ffb649c7dc0 LdrpAppxEtwIntegrityFailure at 7ffb649ac428 RtlFillNonVolatileMemory at 7ffb649d6070 RtlpLogHeapReuseThresholdActivate at 7ffb649e382c RtlxAnsiStringToUnicodeSize at 7ffb64902100 EtwpRemoveRegistrationFromTable at 7ffb649332f4 TppETWWorkerNodeSwitch at 7ffb649efaf0 wcsset_s at 7ffb6496de10 wsplitpath_s at 7ffb649770b0 AlpcInitializeMessageAttribute at 7ffb6494e730 strcpy_s at 7ffb649775f0 RtlQueryThreadProfiling at 7ffb649acb80 RtlIsElevatedRid at 7ffb64962680 RtlQueryPackageIdentityEx at 7ffb64949690 LdrpLogDbgPrint at 7ffb649ae528 RtlpHpSegContextCleanup at 7ffb6492f748 ZwQuerySymbolicLinkObject at 7ffb6497eba0 RtlpMuiRegGrowLanguageList at 7ffb649de6c8 isupper at 7ffb6496ca70 NtSetSystemEnvironmentValue at 7ffb6497f4e0 ZwUnloadKey2 at 7ffb6497f8e0 ZwLockProductActivationKeys at 7ffb6497e160 RtlBackoff at 7ffb64916620 EtwpPreEnableEventApiCallback at 7ffb64963c44 RtlQueryProcessBackTraceInformation at 7ffb649b7510 GetUTF32 at 7ffb649d8cfc LdrpKnownDllPath at 7ffb64a44f10 EtwpAcquireGuidEntryExclusive at 7ffb648e62dc AvrfMiniLoadDll at 7ffb649bab04 RtlAdjustPrivilege at 7ffb64957e90 RtlpTraceDatabaseFree at 7ffb649dc57c ZwQuerySection at 7ffb6497cad0 ZwOpenKey at 7ffb6497c2f0 LdrpSendDllNotifications at 7ffb6490cb28 CsrpClientConnectToServer at 7ffb6492b754 TppAlpcpFree at 7ffb649625f0 itoa at 7ffb6496cb80 RtlGetProcessHeaps at 7ffb649cef90 RtlIpv4AddressToStringA at 7ffb64960270 CsrClientProcess at 7ffb64a45b10 RtlStringCchCopyExW at 7ffb649b0bf4 RtlpLeakList at 7ffb64a43bc0 RtlCriticalSectionLock at 7ffb64a462f8 ZwQueryEvent at 7ffb6497cb70 longjmp at 7ffb6496fe20 RtlpHeapHandleError at 7ffb649e1610 RtlConsoleMultiByteToUnicodeN at 7ffb649c3660 RtlpGuardGrantSuppressedCallAccess at 7ffb64934c88 NtOpenDirectoryObject at 7ffb6497cbb0 PsspCaptureHandleInformation at 7ffb649f1fb4 _imp_ZwQueryValueKey at 7ffb64a00ae0 RtlCreateInvertedFunctionTableCacheEntry at 7ffb649bfdd4 RtlHpHeapManagerStart at 7ffb649ea734 RtlIpv4AddressToStringW at 7ffb64957a90 LdrpWorkCompleteEvent at 7ffb64a452b0 itow at 7ffb6496cd20 ZwOpenKeyedEvent at 7ffb6497e460 RtlpGetContainingRange at 7ffb649d0824 LdrQueryImageFileExecutionOptions at 7ffb649593a0 RtlpMuiRegGetString at 7ffb649de654 ZwDebugContinue at 7ffb6497d9e0 LdrpHashAsciizString at 7ffb649b5b94 ZwQueryOpenSubKeys at 7ffb6497eaa0 NtSetInformationKey at 7ffb6497f2e0 RtlpLDPreviousPage at 7ffb64a469b0 LdrpGetNewTlsVector at 7ffb64935960 ApiSetpSearchForApiSet at 7ffb64909150 EtwEventWriteFull at 7ffb649321c0 RtlpCompareActivationContextDataTOCEntryById at 7ffb64947690 gSystemLocale at 7ffb64a43b88 ZwQueryDriverEntryOrder at 7ffb6497e860 RtlpSignalSystemDirsModification at 7ffb649be478 _report_rangecheckfailure at 7ffb6496c350 RtlpUnhandledExceptionFilter at 7ffb64a45350 NtAddAtom at 7ffb6497c990 NtQueryObject at 7ffb6497c2b0 NtReplyWaitReceivePortEx at 7ffb6497c610 RtlpInitializeLangRegistryInfo at 7ffb648e5ee0 RtlCreateBoundaryDescriptor at 7ffb64960140 ZwSetInformationDebugObject at 7ffb6497f280 RtlCheckSystemBootStatusIntegrity at 7ffb649cac90 NtCreateProfileEx at 7ffb6497d780 RtlpInitializeNonVolatileFlush at 7ffb649d5918 ZwLoadKeyEx at 7ffb6497e120 NtUnloadDriver at 7ffb6497f8a0 RtlpDestroyExecutionRequiredRequest at 7ffb649e4604 vscprintf_helper at 7ffb6496d82c RtlInitializeConditionVariable at 7ffb64948830 ZwEnumerateSystemEnvironmentValuesEx at 7ffb6497dc00 AvrfpAPILookupCallbacksEnabled at 7ffb64a5a298 ZwAlpcCreateSecurityContext at 7ffb6497d040 RtlpStackTraceDatabaseLogPrefix at 7ffb649e4430 iswctype at 7ffb6496fb10 RtlWow64LogMessageInEventLogger at 7ffb649b6d80 RtlpFreeDebugInfo at 7ffb64915e50 RtlpDosDevicesPrefix at 7ffb649f8220 FindDirectoryEntry at 7ffb6494d79c IsHangulLV at 7ffb64967d60 DbgUserBreakPoint at 7ffb6497fae0 LdrpQueryAndUpdateVerifierLaunchCounter at 7ffb649b4c38 NtLockFile at 7ffb6497e140 DebugPrompt at 7ffb6497fb20 LdrQueryModuleInfoFromLdrEntry32 at 7ffb649ae8c0 NtFilterTokenEx at 7ffb6497dca0 RtlpQueryCriticalSectionOwnerInformation at 7ffb649b813c strcmp at 7ffb64970bb0 NtNotifyChangeKey at 7ffb6497e320 swinput_s at 7ffb6497a710 LdrpConstructModernAppKeyName at 7ffb649b10cc LdrpWorkInProgress at 7ffb64a452e8 RtlCopyMappedMemory at 7ffb64963be0 RtlpAtomMapAtomToHandleEntry at 7ffb6493b214 RtlCreateProcessParameters at 7ffb649b6c30 NormBuffer__IsBlocked at 7ffb649d95b4 makepath_s at 7ffb64976840 NtFreeVirtualMemory at 7ffb6497c470 TpWaitOutstandingCallbackCount at 7ffb6490ffec RtlpValidateRange at 7ffb649b84a8 NtAlpcQueryInformation at 7ffb6497d180 AppModelLibraryLoadFailureNgenBinary at 7ffb64a0c110 AlpcGetOutstandingCompletionListMessageCount at 7ffb64964aa0 NtThawTransactions at 7ffb6497f820 pTblPtrs at 7ffb64a46368 TpSetTimer at 7ffb64912460 ZwRestoreKey at 7ffb6497ef20 LdrpForkInProgress at 7ffb64a44ef9 EtwpGetCpuSpeedFromRegistry at 7ffb648e434c sptype at 7ffb64975064 RtlpBitsClearTotal at 7ffb64a06990 g_pfnSE_LdrEntryRemoved at 7ffb64a5a258 TppIopCleanupGroupMemberVFuncs at 7ffb649f8410 RtlpGetReservedBlockSize at 7ffb649e7918 RtlpNullString at 7ffb649f8400 RtlFreeUserStack at 7ffb6495e300 RtlpNlsCompareLocaleNames at 7ffb648f6ec0 RtlComputeLfnChecksum at 7ffb649d647c RtlCopyMemoryNonTemporal at 7ffb649808e0 iswprint at 7ffb6496fab0 UseWOW64 at 7ffb64a45428 ZwAdjustGroupsToken at 7ffb6497ce00 ZwQueryFullAttributesFile at 7ffb6497e8a0 RtlIdnToAscii at 7ffb6490c740 RtlpLogExceptionDispatch at 7ffb649da928 HeapCommitFailAvoidTriageRules at 7ffb649e1220 RtlWalkFrameChain at 7ffb649542c0 NtdllDispatchMessage_A at 7ffb6497bfa0 FastPebLock at 7ffb64a44fe0 RtlpMuiRegConfigMatchesInstalled at 7ffb649dd918 RtlFindMessage at 7ffb64947d20 NtGetDevicePowerState at 7ffb6497dea0 RtlpSecMemLock at 7ffb64a46978 RtlAddVectoredContinueHandler at 7ffb649b8bb0 NtCancelTimer2 at 7ffb6497d2e0 RtlCompressBufferProcs at 7ffb649f8d90 RtlpHpVaMgrCtxQuery at 7ffb64930034 NtGetMUIRegistryInfo at 7ffb6497dec0 RtlpCreateExecutionRequiredRequest at 7ffb649e4504 RtlpLockedMemoryZoneCount at 7ffb64a46034 NtCallbackReturn at 7ffb6497c150 AvrfAppVerifierMode at 7ffb64a5a29c RtlpTimeout at 7ffb64a44f00 RtlFatIllegalTable at 7ffb64a18100 ZwOpenThreadTokenEx at 7ffb6497c690 RtlTryConvertSRWLockSharedToExclusiveOrRelease at 7ffb649c6960 _lookuptable at 7ffb64a003c0 ZwQueryDirectoryFileEx at 7ffb6497e820 RtlpInitializeLfhRandomDataArray at 7ffb64929898 LdrIsResItemExist at 7ffb648f8600 OemTransUniDefaultChar at 7ffb64a427d0 _imp_NtQueryValueKey at 7ffb64a00af0 Nls844UnicodeUpcaseTable at 7ffb64a46510 NtAddBootEntry at 7ffb6497cdc0 RtlAreAnyAccessesGranted at 7ffb649c4ba0 _security_check_cookie at 7ffb6496c1b0 ZwAdjustPrivilegesToken at 7ffb6497c8d0 RtlpTpIoCallback at 7ffb649efd20 RtlMapGenericMask at 7ffb648f2690 ZwRegisterThreadTerminatePort at 7ffb6497ed80 LdrpVehLock at 7ffb64a46500 RtlpGetAlternateCodePage at 7ffb649d6dec TppFreeDirectParamsCache at 7ffb6495a198 RtlAddSIDToBoundaryDescriptor at 7ffb6495dde0 ZwRequestPort at 7ffb6497eec0 ZwModifyBootEntry at 7ffb6497e2a0 NtWaitForMultipleObjects32 at 7ffb6497c3f0 NtOpenRegistryTransaction at 7ffb6497e520 strcspn at 7ffb64970c70 LdrVerifyImageMatchesChecksum at 7ffb649aef70 RtlpSetMachineUILanguagesImmediate at 7ffb649cdc18 strncmp at 7ffb64970f90 SbpTraceContextUpdate at 7ffb649effe8 ZwCreateWaitCompletionPacket at 7ffb6497d940 RtlpSearchWidth at 7ffb64a06a90 LdrpDefaultExtension at 7ffb649f8210 NormBuffer__LastStartBase at 7ffb649d965c RtlpHpStackDbLogStackDbEnd at 7ffb649e1c68 RtlLengthSid at 7ffb64940980 RtlCalculateUserShadowStackSizes at 7ffb649c0b04 CsrInitOnceDone at 7ffb64a45b11 RtlCompareMemory at 7ffb64980830 RtlTraceDatabaseLock at 7ffb649dc490 NtQueryMutant at 7ffb6497ea80 RtlCleanUpTEBLangLists at 7ffb648e5dd0 RtlpUnloadEventTraceExSize at 7ffb64a427b0 RtlpMuiRegValidateInstalled at 7ffb649e083c NtManagePartition at 7ffb6497e220 RtlEnterUmsSchedulingMode at 7ffb649d38d0 NtAssociateWaitCompletionPacket at 7ffb6497d260 RtlpDetachThreadFromUmsCompletionList at 7ffb649d3e78 NtConnectPort at 7ffb6497d460 NtPulseEvent at 7ffb6497e780 RtlpWin32NtRootSlash at 7ffb649f8778 LdrQueryModuleInfoFromLdrEntry at 7ffb64941ee0 swprintf at 7ffb6496d750 ZwReplyPort at 7ffb6497c230 NormBuffer__GetLastChar at 7ffb649d9458 RtlUnlockBootStatusData at 7ffb649cb140 NtOpenSymbolicLinkObject at 7ffb6497e5a0 ZwGetNextProcess at 7ffb6497dee0 RtlpHpSegVsAllocate at 7ffb64956f00 RtlpWaitOnAddressSpinCycleCount at 7ffb64a43b6c ZwAlpcDisconnectPort at 7ffb6497d0e0 NtdllListBoxWndProcWorker at 7ffb6497c050 RtlFreeOemString at 7ffb64969500 ZwCompareObjects at 7ffb6497d3c0 LdrpEventAddUnicodeString at 7ffb649af89c RtlEqualDomainName at 7ffb6490ae90 TppWorkerpInnerExceptionFilter at 7ffb649efc04 RtlULongLongSub at 7ffb64938328 RtlInitCodePageTable at 7ffb649c3930 LdrpAuditIntegrityContinuity at 7ffb64a45358 RtlAvlRemoveNode at 7ffb64945060 RtlpUmsPrimaryContextWrap at 7ffb64980fa0 NtdllStaticWndProc_W at 7ffb6497bed0 NtOpenSemaphore at 7ffb6497e560 DWORDToBigEndian at 7ffb648ec5dc NormalYearDayToMonth at 7ffb64a04000 LdrResFindResourceDirectory at 7ffb649360d0 RtlInsertInvertedFunctionTable at 7ffb64900e0c RtlpHpGCFlushCallback at 7ffb6492ead0 NtSetEventBoostPriority at 7ffb6497c650 RtlEnumerateGenericTable at 7ffb64944010 TlgCreateWsz at 7ffb649b0db0 handle_exc at 7ffb64974898 NtSetInformationVirtualMemory at 7ffb6497f3a0 RtlpWin32NtUncRoot at 7ffb649f87a8 LdrpFindLoadedDllByMappingFile at 7ffb64958fe8 TppSimplepFree at 7ffb64917300 NtSetLowWaitHighEventPair at 7ffb6497f480 RtlpGetHeapInterceptorIndex at 7ffb649e1568 RtlPrepareForProcessCloning at 7ffb6497b420 RtlCheckSandboxedToken at 7ffb649642e0 NtResetWriteWatch at 7ffb6497ef00 LZNT1CompressChunk at 7ffb649e846c RtlpGetVolumeHandle at 7ffb6496ba38 DbgUiSetThreadDebugObject at 7ffb649ad4f0 NtSystemDebugControl at 7ffb6497f780 RtlpInitializeThreadActivationContextStack at 7ffb6494e494 ctrlfp at 7ffb64975104 NtAlpcQueryInformationMessage at 7ffb6497d1a0 LdrQueryModuleInfoLocalLoaderLock32 at 7ffb6495f7c0 NtAdjustTokenClaimsAndDeviceGroups at 7ffb6497ce20 LdrpUnalignedUserCallTargetBitMap at 7ffb64a5a3b0 TraceLoggingMetadataEnd at 7ffb64a0c081 NtWriteFileGather at 7ffb6497c410 TppWaitpValidateWait at 7ffb64911470 RtlIsGenericTableEmpty at 7ffb64958490 RtlpShutdownProcessFlags at 7ffb64a46558 ZwAssignProcessToJobObject at 7ffb6497d240 RtlpExtendListLookup at 7ffb6492ae10 NtdllpReallocateStringRoutine at 7ffb649b5004 NlsActiveCodePageIsUTF8 at 7ffb64a42797 RtlpMuiRegGetLanginfoTypeNSpec at 7ffb649cd6c0 EtwpFinalizeRelogFileHeaderStats at 7ffb649edfb4 NtQueryAttributesFile at 7ffb6497c850 RtlpAllocateAtomTableEntry at 7ffb6493b500 RtlInitializeGenericTable at 7ffb6495c2f0 NtdllHkINLPCWPSTRUCT_W at 7ffb6497bf30 TrkContext at 7ffb64a46a10 LdrpResSearchResourceHandle at 7ffb649c2cac RtlCrc32 at 7ffb64964b90 RtlpSaveUmsDebugRegisterState at 7ffb649ea394 RtlpFreeActivationContext at 7ffb649624c4 NtFlushVirtualMemory at 7ffb6497dd60 handle_qnan1 at 7ffb64974b08 RtlReplaceSystemDirectoryInPath at 7ffb649659a0 TppPoolAddWorker at 7ffb64910030 RtlSectionTableFromVirtualAddress at 7ffb648ff050 NtCreateKeyTransacted at 7ffb6497d600 NtdllGhostWndProcWorker at 7ffb6497c090 RtlpConvertCultureNamesToLCIDs at 7ffb649cc9f0 RtlHeapTrkInitialize at 7ffb649d78e0 LdrpGetNtPathFromDosPath at 7ffb64909c94 RtlpLogHeapCreateEvent at 7ffb649e34b0 RtlpCheckBusyBlockTail at 7ffb649d30e4 RtlGUIDFromString at 7ffb64949b70 TpReleaseWork at 7ffb64911790 RtlpNotOwnerCriticalSection at 7ffb649c6d40 LdrpProcessInitContextRecord at 7ffb64a45388 RtlpLookupFunctionEntryForStackWalks at 7ffb64900340 RtlUmsThreadYield at 7ffb649d3d20 crc32Mult_ at 7ffb64a0b3b0 NtCreatePartition at 7ffb6497d6e0 RtlDllShutdownInProgress at 7ffb648e71e0 get_printf_count_output at 7ffb64975f6c ZwOpenPartition at 7ffb6497e4c0 GetProcessIptTrace at 7ffb649f42c8 AltResMemBlockCount at 7ffb64a44344 ZwRecoverTransactionManager at 7ffb6497ed40 EtwEventWriteTransfer at 7ffb649326f0 RtlpHpQueryVA at 7ffb649300f0 RtlRunOnceComplete at 7ffb648eb240 ZwAlpcSetInformation at 7ffb6497d200 LdrpSignalModuleMapped at 7ffb64900dac RtlRemoveInvertedFunctionTable at 7ffb6494fc5c LdrpCorFixupImage at 7ffb649af008 TppStartThreadData at 7ffb64910908 NtAccessCheckByType at 7ffb6497cd00 RtlpConvertLCIDsToCultureNames at 7ffb649ccc00 memchr at 7ffb6496ff30 _chkstk at 7ffb649810e0 ZwQueryInformationFile at 7ffb6497c2d0 RtlQueryProcessPlaceholderCompatibilityMode at 7ffb649d9100 ZwOpenSection at 7ffb6497c790 LdrpImageEntry at 7ffb64a44fc8 RtlCreateProcessParametersEx at 7ffb6493bc00 LdrQueryProcessModuleInformationEx2 at 7ffb649aeaa4 NtDuplicateObject at 7ffb6497c830 TppIteWakeWaiters at 7ffb6494673c LdrpGetDelayloadAPIInfo at 7ffb6495ef3c WindowsHeapSnapshotProvider at 7ffb649fc9a0 RtlpStdExtendLowerWatermark at 7ffb649db244 RtlpHpRaiseFatalLimitError at 7ffb649e1b5c NtImpersonateClientOfPort at 7ffb6497c490 NtQuerySystemTime at 7ffb6497cbf0 ZwSetDriverEntryOrder at 7ffb6497f1e0 ZwCreateSemaphore at 7ffb6497d800 RtlpNtSetValueKey at 7ffb64968f70 NtOpenKeyTransacted at 7ffb6497e420 LdrpFreeTls at 7ffb6494db94 EtwTraceMessage at 7ffb64933470 ZwTraceControl at 7ffb6497f840 LdrQueryProcessModuleInformationEx at 7ffb64954e24 ZwTranslateFilePath at 7ffb6497f860 LdrpActualBitmapSize at 7ffb64a45260 CsrpHeapCommitRoutine at 7ffb64962320 RtlpFlushHeapsCallback at 7ffb6492ea50 RtlpExtendedHeapInformationGenerator at 7ffb649d01b0 setjmpex at 7ffb64981ee0 ZwAlpcOpenSenderProcess at 7ffb6497d140 RtlpRegistryPaths at 7ffb649f8c20 RtlGetCurrentPeb at 7ffb649d6c40 RtlCheckBootStatusIntegrity at 7ffb649cab30 iswgraph at 7ffb6496fa90 NtdllImeWndProcWorker at 7ffb6497c080 RtlActivateActivationContext at 7ffb649508f0 NtRestoreKey at 7ffb6497ef20 AVrfpEnableHeapVerifier at 7ffb649b9f24 PsspCaptureAuxiliaryPages at 7ffb649f1740 RtlpConvertAbsoluteToRelativeSecurityAttribute at 7ffb649c7a50 RtlpGetChainHead at 7ffb64946e80 NtdllButtonWndProc_W at 7ffb6497bdf0 RtlTraceDatabaseValidate at 7ffb649dc4e0 ZwThawTransactions at 7ffb6497f820 flsbuf_s at 7ffb64972720 _lconv_c at 7ffb64a3f340 RtlCompressBufferXpressLz at 7ffb649e9510 g_ShimsEnabled at 7ffb64a46014 LdrpWorkQueueLock at 7ffb64a452c0 WNF_SEB_DEV_MNF_CUSTOM_NOTIFICATION_RECEIVED at 7ffb64a03da8 RtlOsDeploymentState at 7ffb649db920 ZwNotifyChangeKey at 7ffb6497e320 RtlpMuiRegGetFallbackLanguageInfoByLangId at 7ffb649ddfc4 RtlUnlockCurrentThread at 7ffb64965840 ZwLockFile at 7ffb6497e140 NtdllDefWindowProc_W at 7ffb6497bd90 ZwFilterTokenEx at 7ffb6497dca0 TppIopCancelPendingCallbacks at 7ffb649ee9f0 TraceLoggingRegisterEx at 7ffb648e7de8 LdrpEventAddAnsiString at 7ffb649af838 ZwAlpcQueryInformation at 7ffb6497d180 LdrSetMUICacheType at 7ffb6496b460 RtlPrefixUnicodeString at 7ffb648fa030 ZwFreeVirtualMemory at 7ffb6497c470 LdrpInitializeExceptionTable at 7ffb649b18b0 RtlNumberGenericTableElements at 7ffb64961910 RtlpValidateContextFlags at 7ffb648fee08 ZwCallbackReturn at 7ffb6497c150 LdrpFreeLoadContextOfNode at 7ffb64944924 NtOpenThreadTokenEx at 7ffb6497c690 ZwGetMUIRegistryInfo at 7ffb6497dec0 RtlpHpSegLfhExtendContext at 7ffb6492ff10 wctomb_s_l at 7ffb64975f8c LdrpGetRcConfig at 7ffb648f8930 LdrpDereferenceEnclave at 7ffb649add54 LdrpInitializeEnclaves at 7ffb649ae190 invalid_parameter at 7ffb6496c0d8 NtQueryDirectoryFileEx at 7ffb6497e820 wcscat at 7ffb64971c70 LdrpIsVerifierActivationFilterMatched at 7ffb649b4954 DataLoadLockCount at 7ffb64a44348 DbgUiConvertStateChangeStructure at 7ffb649ad0d0 WinSqmEndSession at 7ffb6495f7c0 RtlpQuerySecurityDescriptor at 7ffb64947bd0 LdrUnloadDll at 7ffb6490f3b0 RtlRegisterSecureMemoryCacheCallback at 7ffb649d4330 NtAdjustGroupsToken at 7ffb6497ce00 NtQueryFullAttributesFile at 7ffb6497e8a0 FatalUserCallbackException at 7ffb64a0c1b0 ZwCancelTimer2 at 7ffb6497d2e0 LdrUnloadAlternateResourceModule at 7ffb6494ef50 TppPoolpGlobalPool at 7ffb64a46470 TpSetPoolMaxThreadsSoftLimit at 7ffb6495f770 DbgPrint at 7ffb649337a0 ZwGetDevicePowerState at 7ffb6497dea0 LoadFailureOperational at 7ffb64a0c1e0 TppTimerpTaskVFuncs at 7ffb649f8360 UninitUser32Proc at 7ffb6496bed0 NtRequestPort at 7ffb6497eec0 NtModifyBootEntry at 7ffb6497e2a0 ZwWaitForMultipleObjects32 at 7ffb6497c3f0 ZwOpenRegistryTransaction at 7ffb6497e520 RtlpDeleteEmptyImageFileOptionsKey at 7ffb649c1da8 snprintf at 7ffb6496d060 EtwpGetKmRegHandle at 7ffb64933bf8 RtlpScanProcessVirtualMemory at 7ffb649d4d2c RtlpGetCriticalSectionContentionCount at 7ffb649c6ca4 RtlpTraceDatabaseAllocate at 7ffb649dc530 memcpy_s at 7ffb64977370 NtCreateWaitCompletionPacket at 7ffb6497d940 NtdllMenuWndProc_W at 7ffb6497bd50 RtlpLogHeapReallocateEvent at 7ffb649e3780 AVrfpParseVerifierDllsString at 7ffb649ba508 ZwAddBootEntry at 7ffb6497cdc0 XpressHighBitIndexTable at 7ffb64a01790 RtlFindAceByType at 7ffb648f26f0 crc32Map32_ at 7ffb64a06bb0 WinSqmCommonDatapointSetString at 7ffb64964ae0 RtlGetLengthWithoutTrailingPathSeperators at 7ffb6496ab00 RtlCheckRegistryKey at 7ffb648e3260 RtlInsertElementGenericTable at 7ffb64944110 LdrpGetProcApphelpCheckModule at 7ffb649b11ec NtRegisterThreadTerminatePort at 7ffb6497ed80 LdrProcessRelocationBlock at 7ffb649c2190 LdrSetDefaultDllDirectories at 7ffb6495e900 SwitchedRtlGetVersion_Win8 at 7ffb64964ae0 RtlpUnlockHeapManagerForCloning at 7ffb649d1360 NtAdjustPrivilegesToken at 7ffb6497c8d0 RtlpHpOverrideGCInterval at 7ffb649d0ee8 RtlIsActivationContextActive at 7ffb649becf0 TppIopCallbackEpilog at 7ffb64948590 NtReplyPort at 7ffb6497c230 AVrfpSetProcessVerifierOptions at 7ffb649ba760 EtwTraceEventInstance at 7ffb649ed0a0 RtlNewSecurityObjectEx at 7ffb648eebf0 CompareNamesCaseSensitive at 7ffb649c46a4 NtAlpcDisconnectPort at 7ffb6497d0e0 ZwOpenSymbolicLinkObject at 7ffb6497e5a0 RtlNormalizeString at 7ffb6495d1f0 RtlGetFunctionTableListHead at 7ffb649bfea0 NtGetNextProcess at 7ffb6497dee0 wcslwr_s at 7ffb6496dc90 ZwManagePartition at 7ffb6497e220 ZwAssociateWaitCompletionPacket at 7ffb6497d260 TppAlpcpCleanupGroupMemberVFuncs at 7ffb649f87b8 EtwSendNotification at 7ffb64933350 RtlpHpTlLogGCScheduled at 7ffb649e7448 ZwQueryMutant at 7ffb6497ea80 RtlRestoreSystemBootStatusDefaults at 7ffb649cb0e0 ZwPulseEvent at 7ffb6497e780 _remainder_piby2 at 7ffb649741ec AlpcGetHeaderSize at 7ffb6494e7d0 PrivateLoggerNotificationGuid at 7ffb649fc9d0 ZwConnectPort at 7ffb6497d460 ZwResetWriteWatch at 7ffb6497ef00 _guard_fids_table at 7ffb649f9870 ZwSetInformationVirtualMemory at 7ffb6497f3a0 statfp at 7ffb649751b0 ZwSetLowWaitHighEventPair at 7ffb6497f480 ZwSystemDebugControl at 7ffb6497f780 AeSbContextUpdateEvent at 7ffb64a0c170 ZwAlpcQueryInformationMessage at 7ffb6497d1a0 RtlpGetExtraStuffPointerUnsafe at 7ffb649d0924 RtlpLockStack at 7ffb64961598 ZwAdjustTokenClaimsAndDeviceGroups at 7ffb6497ce20 LdrControlFlowGuardEnforced at 7ffb648faf10 LdrQueryModuleInfoLocalLoaderLock at 7ffb64964ac0 ResourceEntryBinarySearch at 7ffb648f9a64 RtlpBreakPointHeap at 7ffb649e63a0 RtlCallEnclaveReturn at 7ffb6497ffeb RtlCopyLuidAndAttributesArray at 7ffb649c4bd0 DbgUiRemoteBreakin at 7ffb649ad490 wcstok_s at 7ffb64977e30 NtCompareObjects at 7ffb6497d3c0 RtlLengthCurrentClearRunForwardEx at 7ffb649ca118 LeapYearDayToMonth at 7ffb64a03e80 RtlUnsubscribeWnfStateChangeNotification at 7ffb648e63b0 load_config_used at 7ffb649f8b10 ZwSetEventBoostPriority at 7ffb6497c650 RtlSetProcessDebugInformation at 7ffb649b7d20 DbgUiContinue at 7ffb649ad0a0 RtlpMuiRegFreeLanguageList at 7ffb648f5754 LdrpLogNewDllLoadInternal at 7ffb649b04f4 RtlConstructCrossVmEventPath at 7ffb649d2390 strupr_s at 7ffb6496d6e0 ZwOpenSemaphore at 7ffb6497e560 RtlpHpSegReportPageRange at 7ffb649ebc28 RtlMuiRegAddLIPParent at 7ffb649df710 RtlpGetExtraStuffPointer at 7ffb6494e2dc RtlAddRefMemoryStream at 7ffb64962320 TppPHDelete at 7ffb64916294 RtlHpInitializeHeapManager at 7ffb649e7304 LoadMUIDllGuid at 7ffb64a1a440 RtlIoDecodeMemIoResource at 7ffb649ced20 LdrpRedirectionByFunctionCalloutFunc at 7ffb64a45270 RtlAreBitsClear at 7ffb649c90b0 RtlULongToUShort at 7ffb6495636c LdrpUnloadIndexEx at 7ffb64a45ff4 RtlDosPathNameToRelativeNtPathName_U at 7ffb649093a0 RtlInterlockedPushEntrySList at 7ffb649476b0 RtlAbortRXact at 7ffb6495e3e0 g_hUserDiagnosticProvider at 7ffb64a43b90 EtwpRegistrationTable at 7ffb64a46430 RtlpDiskSpeedPolicy at 7ffb64a42718 TpAdjustBindingCount at 7ffb64911bc0 NtdllSwitchWindowProc_A at 7ffb6497bdc0 LdrpFindTlsEntry at 7ffb649051e4 ZwFlushVirtualMemory at 7ffb6497dd60 NlsMbOemCodePageTag at 7ffb64a46518 NtdllDispatchDefWindowProc_A at 7ffb6497bf80 RtlpHpLfhOwnerLockUnlock at 7ffb649eac64 getbuf at 7ffb649761f8 snwprintf at 7ffb6496d110 ZwWriteFileGather at 7ffb6497c410 RtlpOptimizeWaitOnAddressWaitList at 7ffb648e7658 g_SbTableEntry_HeapPaddingAndLFHSubsegmentCommitSwitch_RTL at 7ffb64a3f630 ZwQueryAttributesFile at 7ffb6497c850 RtlExitUserThread at 7ffb6494cf00 NtdllSwitchWindowProc_W at 7ffb6497bdd0 RtlpFlsFree at 7ffb64954010 NtAssignProcessToJobObject at 7ffb6497d240 RtlpMuiRegGetFallbackLanguageInfoByName at 7ffb649de18c filwbuf_s at 7ffb649635c0 NtOpenPartition at 7ffb6497e4c0 RtlSecondsSince1980ToTime at 7ffb649c44a0 NtRecoverTransactionManager at 7ffb6497ed40 VerSetConditionMask at 7ffb64958450 RtlWnfCompareChangeStamp at 7ffb649bd9d0 RtlpTpIoDllNotificationCookie at 7ffb64a464d0 RtlpMuiRegGetStringIndexInPool at 7ffb648f69fc g_pfnSE_ShimDllLoaded at 7ffb64a5a210 RtlpHpSegProtect at 7ffb649ebb48 RtlDeregisterWait at 7ffb649642d0 ZwCreatePartition at 7ffb6497d6e0 NtdllMDIActivateDlgProc_A at 7ffb6497bfc0 TppCleanupGroupAddMember at 7ffb649427b0 LdrpInsertDataTableEntry at 7ffb6490a6bc swprintf_s at 7ffb649779f0 ZwAccessCheckByType at 7ffb6497cd00 g_pfnSE_InstallAfterInit at 7ffb64a5a218 ConditionVariableSpinCycleCount at 7ffb64a43b84 RtlpRandomExConstantVector at 7ffb64a43920 NtAlpcSetInformation at 7ffb6497d200 RtlIoEncodeMemIoResource at 7ffb649cedc0 NtdllMDIActivateDlgProc_W at 7ffb6497bfd0 _imp_ZwClose at 7ffb64a00ad8 RtlImageNtHeader at 7ffb648fb9e0 ZwCreateKeyTransacted at 7ffb6497d600 NormBuffer__AppendEx at 7ffb6495d5f0 PsspCaptureImageInformation at 7ffb649f19c8 RtlGetCurrentTransaction at 7ffb6494c7b0 RtlpHpLfhSubsegmentFree at 7ffb64930808 RtlpBitsClearHigh at 7ffb64a127b0 RtlpLockedSectionList at 7ffb64a3f580 ungetwc_nolock at 7ffb6497b22c NtTraceControl at 7ffb6497f840 LdrpSpecialCacheTypeHandle at 7ffb649c0938 RtlUnlockProcessHeapOnProcessTerminate at 7ffb6494ad90 NtTranslateFilePath at 7ffb6497f860 NtdllMessageWindowProc_W at 7ffb6497bdb0 RtlFindClearRuns at 7ffb649c9860 WinSqmSetIfMinDWORD at 7ffb6495f7c0 RtlDosPathSeperatorsString at 7ffb649f80b0 ZwOpenKeyTransacted at 7ffb6497e420 RtlpCaptureContext2 at 7ffb649801a0 RtlpSlashSlashDot at 7ffb649f8250 WinSqmIsOptedInEx at 7ffb64962320 vDbgPrintExWithPrefix at 7ffb649bfdb0 GetResourceDirectoryEntry at 7ffb6494d4d4 NtAlpcOpenSenderProcess at 7ffb6497d140 ApiSetpSearchForApiSetHost at 7ffb6490520c NtOpenSection at 7ffb6497c790 RtlResetRtlTranslations at 7ffb649c3aa0 RtlGetInterruptTimePrecise at 7ffb649c4170 ZwDuplicateObject at 7ffb6497c830 RtlpCaptureContext at 7ffb64980060 RtlpSetInstallLanguage at 7ffb649cd730 NtQueryInformationFile at 7ffb6497c2d0 LdrpDropLastInProgressCount at 7ffb6495381c RtlInitializeSListHead at 7ffb64953870 TlgDefineProvider_annotation__TlgCentennialIssueTracker_TraceLoggingProviderProv at 7ffb649b0df0 RtlpHpTagReAllocateHeap at 7ffb6492692c LdrpImportRedirectionPresent at 7ffb64a45268 ZwImpersonateClientOfPort at 7ffb6497c490 ZwQuerySystemTime at 7ffb6497cbf0 NtSetDriverEntryOrder at 7ffb6497f1e0 NtCreateSemaphore at 7ffb6497d800 RtlInitStrongEnumerationHashTable at 7ffb64946b90 RtlpMuiRegGetOrAddLangInfo at 7ffb649de560 PssNtDuplicateSnapshot at 7ffb649f0880 InitRegistryInfoCritSect at 7ffb64a464b8 strchr at 7ffb64970b70 AvrfpAPILookupCallbackName at 7ffb649f9458 RtlpCopyLegacyContextAmd64 at 7ffb649d24f4 log at 7ffb6496fb40 SbGetContextDetailsByGuid at 7ffb6490ce40 RtlInitializeSid at 7ffb648ebac0 LdrpLogCFGModuleInfoTelemetry at 7ffb649635f4 CurDirDllLoadFailureWarning at 7ffb64a0c1f0 RtlpInitializeUCRIndex at 7ffb64963414 RtlInitAnsiStringEx at 7ffb649012c0 ZwReplyWaitReceivePort at 7ffb6497c210 RtlpGuardSynchronizeRestorePc at 7ffb64980810 RtlpDosPRNDevice at 7ffb649f8000 ispunct at 7ffb6496ca10 NtAlpcConnectPortEx at 7ffb6497cfa0 RtlCreateHashTableEx at 7ffb64968fd0 PossibleDeadlockReportCounter at 7ffb64a4695c ValidateStd3Range at 7ffb64960764 RtlpLogHeapFreeEvent at 7ffb649e3680 RtlImageDirectoryEntryToData at 7ffb6495e5e0 pow at 7ffb64981f80 RtlCloneUserProcess at 7ffb649b6980 AVrfpQueryProcessVerifierOptions at 7ffb649ba69c RtlpCrtHeapAddress at 7ffb64a469a0 NtSetCachedSigningLevel2 at 7ffb6497f120 LdrpFreeUnicodeString at 7ffb6490e224 NtQueryInstallUILanguage at 7ffb6497e9e0 ComputeNameLength at 7ffb649c4824 RtlpGetSetBootStatusData at 7ffb649cb33c RtlpValidRelativeAttribute at 7ffb649c881c NtQuerySystemInformation at 7ffb6497c770 RtlpDosCOMDevice at 7ffb649f80a0 RtlInitializeBitMap at 7ffb64957640 ZwAlpcDeleteSecurityContext at 7ffb6497d0c0 ZwRevertContainerImpersonation at 7ffb6497ef60 cos at 7ffb6496ef50 TpCallbackSetEventOnCompletion at 7ffb64963ee0 RtlResetStackOverflow at 7ffb649bd878 RtlZombifyActivationContext at 7ffb649bea00 RtlDebugAllocateHeap at 7ffb649e47c8 EtwpRegistrationCompare at 7ffb6494bef8 RtlQueryInterfaceMemoryStream at 7ffb649b5f50 strstr at 7ffb649713b0 TppWaitpTaskVFuncs at 7ffb649f8350 NtQueryOpenSubKeysEx at 7ffb6497eac0 _lconv_static_W_decimal at 7ffb64a004e4 g_dwLastErrorToBreakOn at 7ffb64a469c4 RtlpUnloadEventTraceExNumber at 7ffb64a42790 RtlSetHeapDebuggingInformation at 7ffb649cf694 RtlpDllSearchPath at 7ffb64a44368 RtlpExecuteUmsThread at 7ffb64980bd1 RtlUnhandledExceptionFilter2 at 7ffb649da550 LoadAsDataTable at 7ffb64a44328 NtQueueApcThread at 7ffb6497c950 NtdllFilteredProcessRedirectingWndProc_W at 7ffb6497bff0 RtlpMatchUserLanguage at 7ffb649d73bc RtlpCapChkTelemetryRunOnce at 7ffb64963840 NtCancelTimer at 7ffb6497ccc0 RtlDecompressFragmentNS at 7ffb64964ad0 CsrReadOnlySharedMemorySize at 7ffb64a45b38 RtlpHpLargeAllocSetExtraPresent at 7ffb64963d38 RtlIdnToUnicode at 7ffb6490bf90 isalpha at 7ffb6496c8f0 RtlDestroyQueryDebugBuffer at 7ffb649551a0 ChkSum at 7ffb649d2298 NtEnumerateBootEntries at 7ffb6497dbc0 RtlpLogHeapValidateEvent at 7ffb649e3d70 PssNtFreeWalkMarker at 7ffb649f0ca0 ZwTerminateProcess at 7ffb6497c630 RtlRunOnceInitialize at 7ffb64948830 RtlpPushPageDescriptor at 7ffb649d4908 RtlpWow64ThunkEnvironment32To64 at 7ffb6493c43c RtlpForceCSToUseEvents at 7ffb64a43ec2 NtWaitForMultipleObjects at 7ffb6497cc00 sqrt at 7ffb64970830 _imp_NtClose at 7ffb64a00ac8 VSMEnclaveProvidersRegistered at 7ffb64a464d8 NtQueryPerformanceCounter at 7ffb6497c6d0 RtlpNumberOfProtectedHeaps at 7ffb64a46040 NtLockVirtualMemory at 7ffb6497e1a0 RtlQueryProtectedPolicy at 7ffb6495f4e0 RtlDoesNameContainWildCards at 7ffb649d5030 WerpAllocateAndInitializeSid at 7ffb649bc958 RtlQueryDynamicTimeZoneInformation at 7ffb649cb540 strtoul at 7ffb649716a0 g_hPrivLoggerNotificationProvider at 7ffb64a43508 RTL_BINARY_ARRAY::Cleanup at 7ffb6497b5c8 RtlAllocateActivationContextStack at 7ffb6494e300 RtlUpcaseUnicodeStringToAnsiString at 7ffb649c8d30 TppQueueRemoveHead at 7ffb649efba0 AlpcRundownCompletionList at 7ffb64964a60 EtwpGetMaxLogger at 7ffb6495fbd0 umatherr at 7ffb64974e54 LdrpRecordUnloadEvent at 7ffb6494d23c RtlpHpExtrasAppend at 7ffb649ea924 LdrpCleanupThreadTlsData at 7ffb6494dc50 LdrpCorProcessImports at 7ffb64962d98 DebugPrint at 7ffb6497fb00 LdrpMrdataHeapUnprotected at 7ffb64a5a288 RtlpMuiRegDupLanguageList at 7ffb648f2dac XpressHashFunction at 7ffb64a191e0 RtlpWnfETWEventSubscribe at 7ffb649bdbb8 ZwSetEaFile at 7ffb6497f200 RtlpHpSegLfhVsDecommit at 7ffb64926010 RtlAreAllAccessesGranted at 7ffb64959b20 AlpcGetMessageFromCompletionList at 7ffb64911e70 RtlpAllocateHeapRaiseException at 7ffb649d3074 ZwSinglePhaseReject at 7ffb6497f6c0 ZwSetInformationFile at 7ffb6497c590 EtwpProvLock at 7ffb64a46440 RtlpHpLargeReAlloc at 7ffb649eaf40 ZwPrepareEnlistment at 7ffb6497e6c0 TpAlpcRegisterCompletionList at 7ffb64957fe0 ZwMapViewOfSectionEx at 7ffb6497e280 LdrpLoaderLockAcquisitionCount at 7ffb64a45ac0 RtlGetTickCount at 7ffb649c4410 g_pShimEngineModule at 7ffb64a45398 LdrLoadEnclaveModule at 7ffb649ad8b0 RtlFindLeastSignificantBit at 7ffb64963e30 RtlGetFullPathName_U at 7ffb6495fe30 LdrpDetourExist at 7ffb64a45300 ZwAccessCheckAndAuditAlarm at 7ffb6497c5d0 RtlpWalkLFHBlock at 7ffb649e7dd4 RtlpHpPerHeapStackTraceInitialize at 7ffb649e1b00 CanComposeHangul at 7ffb649d92c4 ZwOpenTransaction at 7ffb6497e600 RtlLengthSecurityDescriptor at 7ffb6494be10 TpTimerOutstandingCallbackCount at 7ffb64910db0 RtlpGetHeapBlock at 7ffb649d45a4 RtlpGetFirstBlockAddress at 7ffb649e7854 NtPrePrepareEnlistment at 7ffb6497e680 RtlpCopyRemoteDebugInformation at 7ffb649b7f50 LdrpDoDebuggerBreak at 7ffb649b11ac NtCommitComplete at 7ffb6497d320 RtlDeNormalizeProcessParams at 7ffb649b6ca0 ZwConvertBetweenAuxiliaryCounterAndPerformanceCounter at 7ffb6497d480 EtwpInsertRegistration at 7ffb648eac1c ZwPlugPlayControl at 7ffb6497e640 RtlReportFatalFailure at 7ffb649d9260 ZwCreateEnclave at 7ffb6497d520 RtlRestoreContext at 7ffb64980310 NtInitializeNlsFiles at 7ffb6497dfe0 RtlpHpSegPageRangeSplit at 7ffb649ebab0 NtWorkerFactoryWorkerReady at 7ffb6497c0d0 _except_validate_jump_buffer at 7ffb64972468 RtlpHpStackTraceDisable at 7ffb649e240c LoaderFatalErrorThread at 7ffb64a0c120 RtlDebugQueryTagHeap at 7ffb649e5664 ZwMapViewOfSection at 7ffb6497c5b0 LdrpValidateUserCallTargetES at 7ffb6496c540 RtlDeCommitDebugInfo at 7ffb649b7500 RtlpCheckPseudoEnvironmentVariable at 7ffb648fa770 NtCreateLowBoxToken at 7ffb6497d640 WinSqmIncrementDWORD at 7ffb6495f7c0 RtlGetMultiTimePrecise at 7ffb649c4220 RtlReleaseSRWLockExclusive at 7ffb64915cb0 RtlCancelTimer at 7ffb649efcf0 TppPoolpDefaultPoolCpuSetLock at 7ffb64a46478 RtlxRemoveInvertedFunctionTable at 7ffb6494fc90 RtlWow64EnableFsRedirectionEx at 7ffb64964730 isleadbyte at 7ffb6496fa18 RtlpFindEntry at 7ffb649260ec ApiSetQueryApiSetPresence at 7ffb64954a30 RtlpAddLanguagesToMultiSZ at 7ffb649cc0ac RtlQueryEnvironmentVariable_U at 7ffb6493c510 EtwRegisterTraceGuidsA at 7ffb648e7a10 RtlGetExtendedContextLength at 7ffb64900d60 TppUpdatePoolNodeStatus at 7ffb64911ab8 ZwSetSystemEnvironmentValue at 7ffb6497f4e0 EtwpAllocateRegistration at 7ffb648ea92c Normalization__GetFirstDecomposedCharPlane0 at 7ffb649d9ccc RtlpHpSegReAlloc at 7ffb649257b8 RtlNtdllName at 7ffb649f93c0 NtQuerySymbolicLinkObject at 7ffb6497eba0 NtdllDialogWndProc_W at 7ffb6497be50 LdrVerifyMappedImageMatchesChecksum at 7ffb649d22c8 RtlIdentifierAuthoritySid at 7ffb64958910 NtUnloadKey2 at 7ffb6497f8e0 NtLockProductActivationKeys at 7ffb6497e160 TppFreeWait at 7ffb64910300 RtlBarrierForDelete at 7ffb649ca7c0 RtlpLogHeapFailure at 7ffb649ea8a4 RtlpInvalidatePathCache at 7ffb6495ea40 RtlDecompressBufferLZNT1 at 7ffb649e8a00 NtSetInformationTransaction at 7ffb6497f360 AlpcGetCompletionListMessageAttributes at 7ffb649bfc90 RtlUpcaseUnicodeStringToCountedOemString at 7ffb649c8e40 TpPostWork at 7ffb649165f0 RtlStackDbStackAdd at 7ffb649f4d78 vswprintf_l at 7ffb6496d954 RtlSubAuthorityCountSid at 7ffb64946fe0 RtlpValidateHeap at 7ffb649e63c8 RtlFreeActivationContextStack at 7ffb6494e3c0 ZwOpenDirectoryObject at 7ffb6497cbb0 ReportExceptionInternal at 7ffb649bb9f4 RtlInitWeakEnumerationHashTable at 7ffb649d23b0 Normalization__CanCombinableCharactersCombine at 7ffb649d9a98 TlgDefineProvider_annotation__Tlgg_VsmEnclaveTraceProviderProv at 7ffb649b0df0 RtlpMuiRegResizeLanguages at 7ffb649defd8 LdrpMapDllFullPath at 7ffb6490e528 RtlInitializeContext at 7ffb649d8d70 errcode at 7ffb64974754 NtOpenKeyedEvent at 7ffb6497e460 RtlpRandomExInit at 7ffb64a46410 LdrpReleaseTlsEntry at 7ffb6495d7bc RtlUnicodeStringCbCopyStringN at 7ffb6494a810 StringCchCopyNW at 7ffb649f0344 DbgPrintReturnControlC at 7ffb649bfcd0 RtlpTimeoutDisable at 7ffb64a44ef8 NtQuerySection at 7ffb6497cad0 RtlpLegacyApplicationCapabilityNames at 7ffb649f8150 RtlpHpEnvEnableSimulatedLargePageCommit at 7ffb64a43688 ultow at 7ffb6496cd70 NtOpenKey at 7ffb6497c2f0 RtlpHpStackTrackingContext at 7ffb64a46390 NtQueryEvent at 7ffb6497cb70 RtlGetSessionProperties at 7ffb649c4ce0 pow_special at 7ffb64975210 RtlpAddWaitBlockToWaitList at 7ffb648e7520 ZwCreateProfileEx at 7ffb6497d780 _longjmp_internal at 7ffb64982b50 NtLoadKeyEx at 7ffb6497e120 ZwUnloadDriver at 7ffb6497f8a0 NtdllHkINLPCWPRETSTRUCT_W at 7ffb6497bf50 ZwAddAtom at 7ffb6497c990 RtlCreateHashTable at 7ffb6494f3f0 RtlpTpResumeImpersonation at 7ffb64911164 RtlSetSaclSecurityDescriptor at 7ffb64948520 ZwQueryObject at 7ffb6497c2b0 guard_check_icall_nop at 7ffb6495f7c0 ZwReplyWaitReceivePortEx at 7ffb6497c610 RtlpQueryEafPlusModuleList at 7ffb649c2008 memcmp at 7ffb6496ff60 NtSetInformationDebugObject at 7ffb6497f280 LdrpAdvapi32DllHandle at 7ffb64a464f0 RtlpImageDirectoryEntryToData32 at 7ffb648fefc4 NtEnumerateSystemEnvironmentValuesEx at 7ffb6497dc00 pwctype at 7ffb64a3f008 RtlpHpStackDbFreeRoutine at 7ffb649e1c40 NtAlpcCreateSecurityContext at 7ffb6497d040 bsearch_s at 7ffb6496ed20 InsertModuleFunctions<_IMAGE_THUNK_DATA32,unsigned long,2147483648> at 7ffb649bf4e0 NtQueryOpenSubKeys at 7ffb6497eaa0 ZwSetInformationKey at 7ffb6497f2e0 RtlOpenCurrentUser at 7ffb64909b40 EtwpOneSecond at 7ffb64a06b18 NtDebugContinue at 7ffb6497d9e0 NtdllHkINLPCWPRETSTRUCT_A at 7ffb6497bf40 RtlpMuiRegAddBaseLanguage at 7ffb649df8e0 RtlTraceDatabaseCreate at 7ffb649dc180 AVrfpDllUnloadNotificationInternal at 7ffb649b9d78 NtQueryDriverEntryOrder at 7ffb6497e860 RtlpLogHeapAllocateEvent at 7ffb649e32c4 RtlpGetUserLocaleName at 7ffb649d7124 RtlpHpVaMgrFree at 7ffb6492dae4 ZwQueryInformationAtom at 7ffb6497e8c0 ZwAlpcImpersonateClientContainerOfPort at 7ffb6497d100 NtdllButtonWndProc_A at 7ffb6497bde0 RtlpLowFragHeapGlobalFlags at 7ffb64a46070 RtlEnumerateGenericTableLikeADirectory at 7ffb649d3fa0 ZwCreateProcess at 7ffb6497d740 vswprintf at 7ffb6496d940 EtwpReplySend at 7ffb64a4352c LdrpDllNotificationList at 7ffb64a3f560 EtwpGetCpuSpeed at 7ffb648e4340 LdrpInitParallelLoadingSupport at 7ffb6495c9cc ZwAllocateReserveObject at 7ffb6497cec0 RtlpDosAUXDevice at 7ffb649f8020 RtlpGetAssemblyStorageMapRootLocation at 7ffb649bf324 RtlpIntegerChars at 7ffb64a00d50 RtlEraseUnicodeString at 7ffb649632e0 LdrpDllNotificationLock at 7ffb64a3f3f0 ZwReleaseWorkerFactoryWorker at 7ffb6497edc0 RtlpHpStackDbLogStackDbSnapshot at 7ffb649e1ce0 RtlGetCurrentProcessorNumber at 7ffb64980b20 NtSetInformationTransactionManager at 7ffb6497f380 RtlExtendedMagicDivide at 7ffb64959cd0 ZwOpenProcessTokenEx at 7ffb6497c6b0 ZwUnmapViewOfSection at 7ffb6497c5f0 EtwpIncrementUmLoggerFile at 7ffb649ed81c NtdllDefWindowProc_A at 7ffb6497bd80 szBias at 7ffb649fc430 RtlpCallInterceptRoutine at 7ffb649cff44 RtlpUpdateUCRIndexInsert at 7ffb64928a14 NtQueryBootEntryOrder at 7ffb6497e7c0 RtlRemoteCall at 7ffb649d8ea0 RtlpHpLfhBucketActivate at 7ffb6492a9b0 EtwpRegisterPrivateSession at 7ffb649eda44 RtlpTpIoRegisteredLock at 7ffb64a464c0 LdrFastFailInLoaderCallout at 7ffb64962e60 ZwUnsubscribeWnfStateChange at 7ffb6497f980 NtPrivilegedServiceAuditAlarm at 7ffb6497e720 szDaylightName at 7ffb649fc3b0 RtlDestroyMemoryZone at 7ffb649633b0 RtlIdnToNameprepUnicode at 7ffb649d8d30 wcschr at 7ffb64971ce0 ZwNotifyChangeSession at 7ffb6497e360 RtlDebugReAllocateHeap at 7ffb649e57b0 ZwQueryInformationPort at 7ffb6497e940 RtlpHeapTrkLeakCallback at 7ffb649d8470 vscwprintf at 7ffb6496d920 RtlpWaitForCriticalSection at 7ffb6495f7c0 LdrpRetryQueue at 7ffb64a452a0 RtlSetSecurityObject at 7ffb6495af10 RtlQueryWnfMetaNotification at 7ffb64962210 RtlpMuiRegFreeStringPool at 7ffb648e5f60 RealPredecessor at 7ffb64943ef8 TpDisablePoolCallbackChecks at 7ffb64963de0 RtlpExceptionLog2 at 7ffb64a46570 RtlUnicodeToCustomCPN at 7ffb649c3cd0 RtlFindMostSignificantBit at 7ffb64963f80 LdrpHashTable at 7ffb64a45040 NtMapUserPhysicalPagesScatter at 7ffb6497c110 wcsstr at 7ffb64971fb0 RtlpLockedSectionListLock at 7ffb64a46378 set_errno_from_matherr at 7ffb64974e20 KiUserCallForwarder at 7ffb6497fc90 RtlpTestHookInit at 7ffb64a46490 ZwReplyWaitReplyPort at 7ffb6497eea0 NtSetLowEventPair at 7ffb6497f460 RtlpHeapLogRangeCreate at 7ffb649e1630 NtOpenThread at 7ffb6497e5c0 LibLoaderTelemetryInitOnce at 7ffb64964570 LdrGetFailureData at 7ffb649ae870 RtlEnterCriticalSection at 7ffb648fb400 LdrpForkActiveLock at 7ffb64a462e8 NtFilterToken at 7ffb6497dc80 ZwSetBootOptions at 7ffb6497f0e0 RtlpTpETWCallbackEnqueue at 7ffb649ef3d4 NtdllMenuWndProc_A at 7ffb6497bd40 RtlpAllocDeallocQueryBuffer at 7ffb648e3ba4 RtlpPreviousStartAddress at 7ffb64a469a8 RtlpIsLFHZoneAllocation at 7ffb649e7a20 NtSetHighWaitLowEventPair at 7ffb6497f240 iswlower at 7ffb6496faa0 RtlCreateAtomTable at 7ffb6493b560 TppJobpCleanupGroupMemberVFuncs at 7ffb649f8868 wchartodigit at 7ffb64973b14 RtlInsertElementGenericTableAvl at 7ffb64943960 RtlpWnfCalculateAndSetNextTimer at 7ffb6496b670 RtlAcquireReleaseSRWLockExclusive at 7ffb6495cb30 ZwQuerySecurityObject at 7ffb6497eb40 _initiallocalestructinfo at 7ffb649f8ae8 LdrpCompleteProcessCloning at 7ffb649b5148 NlsUnicodeToMbAnsiData at 7ffb64a46950 LdrpIsNlsUtf8Process at 7ffb649b51f0 RtlDeleteRegistryValue at 7ffb6496b370 NtAccessCheckByTypeResultListAndAuditAlarm at 7ffb6497cd40 ZwOpenThreadToken at 7ffb6497c530 ZwSetTimerResolution at 7ffb6497f5e0 ExpInterlockedPopEntrySListFault at 7ffb6497fb77 NtSetLdtEntries at 7ffb6497f440 RtlpIsNameInExpressionPrivate at 7ffb649d520c wcstoul at 7ffb649722a0 RtlFnToFxFrame at 7ffb649d6c54 SessionNotificationGuid at 7ffb64a00c18 RtlpHpParametersVerify at 7ffb649e7394 RtlpNtCreateKey at 7ffb64968f30 ZwAlpcCreateSectionView at 7ffb6497d020 RtlpTpIoTreeLock at 7ffb64a464c8 ZwReleaseKeyedEvent at 7ffb6497eda0 CcSaveNVContext at 7ffb64980117 RtlpHpHeapReportCounters at 7ffb649567c0 LdrpMrdataHeap at 7ffb64a5a278 NtAlpcDeleteSectionView at 7ffb6497d0a0 ZwSetIRTimer at 7ffb6497f260 RtlpTpIoDllProcessUnloads at 7ffb649efe6c RtlpGetModifiedProcessCookie at 7ffb649e1598 RtlpHpStackTraceEtwCallback at 7ffb649e2510 RtlSetBits at 7ffb64935fc0 RtlProtectedAccess at 7ffb64a0b640 RtlDisableThreadProfiling at 7ffb649aca10 RtlAddResourceAttributeAce at 7ffb649c7450 mbstrlen at 7ffb649751d8 g_disableEscalation at 7ffb64a465d8 NtAlertThreadByThreadId at 7ffb6497ce80 RtlWakeAddressSingle at 7ffb648e63d0 TppETWTimerExpiration at 7ffb649ef89c RtlDosLongPathNameToRelativeNtPathName_U_WithStatus at 7ffb649acf90 RtlInitUnicodeStringEx at 7ffb64908e70 TlsBitMap at 7ffb64a45340 RtlpProtectedHeapsList at 7ffb64a3f9a8 NtDeleteDriverEntry at 7ffb6497da40 ZwSetInformationEnlistment at 7ffb6497f2a0 NtFlushKey at 7ffb6497dd20 XSaveCHelper at 7ffb64981140 RtlDebugWalkHeap at 7ffb649e61f0 NtDisplayString at 7ffb6497db60 XSaveSHelper at 7ffb64981160 _toascii at 7ffb6496c8b0 AVrfInitializeVerifier at 7ffb649b8d88 NtGetCurrentProcessorNumber at 7ffb6497de60 NtQueryVolumeInformationFile at 7ffb6497c9d0 RtlpHpStackTraceAllocFindMapping at 7ffb649e2170 RtlNumberOfClearBits at 7ffb649ca1f0 RtlCrc32Table at 7ffb64a01390 SbFilterProcedure_RTL at 7ffb64964b10 NtReadOnlyEnlistment at 7ffb6497ece0 NormalizationList__Lookup at 7ffb6495d78c RtlpWin32NtUncRootSlash at 7ffb649f8798 RtlStdInitializeStackDatabase at 7ffb649dada0 qsort at 7ffb64970040 memccpy at 7ffb6496cfa0 ZwOpenIoCompletion at 7ffb6497e3c0 RtlClearBit at 7ffb6497b730 NullGuid at 7ffb64a00c08 RtlpProtectedPoliciesTotalCount at 7ffb64a5a2cc VsmEnclaveTelemetryInitOnce at 7ffb649b0d50 NtLoadKey2 at 7ffb6497e100 NtdllDispatchDefWindowProc_W at 7ffb6497bf90 RtlCompressBufferXpressLzStandard at 7ffb649e9bf0 RtlpAffinityState at 7ffb64a436a0 RtlpLogHeapContractEvent at 7ffb649e33f8 WinSqmCommonDatapointSetStreamEx at 7ffb64964ae0 RtlpHpVsCalculateChunkRequiredSize at 7ffb6497b934 NtUnlockVirtualMemory at 7ffb6497f940 RtlAppendUnicodeStringToString at 7ffb649061c0 RtlpReportHeapFailure at 7ffb649e43b8 RtlpHpLfhSubsegmentFindEmptyUnits at 7ffb64917474 LdrpResMapFile at 7ffb649c2884 TppPoolpSerializedPool at 7ffb64a46458 RtlpHeapInvalidBreakPoint at 7ffb64a43910 RtlpCompareConfigNodeWithSpec at 7ffb649cc94c RtlpLogHeapSubSegmentFreeCached at 7ffb649e3b84 RtlpDecrementWnfSerializationGroup at 7ffb648e78bc RtlpTimeFieldsToTimeNoLeapSeconds at 7ffb6493d8e8 RtlEnclaveCallDispatchReturn at 7ffb6497ff41 ImportTablepInsertFunctionSorted at 7ffb649bf74c RtlpOptimizeSRWLockList at 7ffb649578a8 gBaseAddress at 7ffb64a46370 RtlpIsUtf8Process at 7ffb64941bc4 ZwApphelpCacheControl at 7ffb6497ca30 WinSqmAddToAverageDWORD at 7ffb6495f7c0 ZwQueryAuxiliaryCounterFrequency at 7ffb6497e7a0 WerpEscalationIsWMRSendStringSet at 7ffb649bd720 ZwReadFile at 7ffb6497c170 RtlpPerformHeapMaintenance at 7ffb6492b160 RtlTpETWCallbackDequeue at 7ffb649eff4c RtlpHpStackTraceSerialize at 7ffb649e2a10 CsrPortHeap at 7ffb64a45b50 HeapSnapshotSnap at 7ffb64a0c220 RtlpTargetCompare at 7ffb64964b00 NtCreateDirectoryObjectEx at 7ffb6497d500 RtlpStackDbSegmentRemoveRef at 7ffb649f5dc0 crc64Mult_ at 7ffb64a131f0 SwitchedRtlGetVersion_WinBLUE at 7ffb64964af0 LdrpDecrementModuleLoadCountEx at 7ffb6490f458 RtlpHpMetadataHeapStart at 7ffb6492c9fc LdrpMrdataBase at 7ffb64a5a290 AVrfpVerifierDllsString at 7ffb64a443a0 LdrDisableThreadCalloutsForDll at 7ffb64956920 clrfp at 7ffb649750e0 NtReleaseMutant at 7ffb6497c4b0 RtlpWnfETWEventUnsubscribe at 7ffb649bdc64 RtlIsCriticalSectionLockedByThread at 7ffb6490a550 RtlCreateUmsThreadContext at 7ffb649d3670 AVrfpHandleTraces at 7ffb64a465d0 NtdllMessageWindowProc_A at 7ffb6497bda0 NtRecoverResourceManager at 7ffb6497ed20 RtlpMuiRegLangInfoMatchesSpec at 7ffb649de768 ZwOpenJobObject at 7ffb6497e3e0 LdrpCODScenarioLock at 7ffb64a465b0 TpWaitForAlpcCompletion at 7ffb64958040 LdrpMappingInfoIndex at 7ffb64a462d8 ZwEnumerateKey at 7ffb6497c6f0 LdrQueryInLoadOrderModuleList at 7ffb64963320 RtlpHpTagContext at 7ffb64a43b40 LdrpIllegalCWDDevices at 7ffb64a464dc RtlpFindMessageInTable at 7ffb64947ddc LdrpWorkQueue at 7ffb64a452f0 RtlpMuiRegResizeLanguageList at 7ffb649def70 RtlWriteMemoryStream at 7ffb649b5f50 SendMessageToWERService at 7ffb649bc53c RtlpHpLfhContextAllocate at 7ffb64925b44 RtlpMuiRegConfigListAddLanguage at 7ffb649dd7d0 NtCloseObjectAuditAlarm at 7ffb6497c810 WinSqmSetIfMaxDWORD at 7ffb6495f7c0 ZwQueryBootOptions at 7ffb6497e7e0 LdrpSetAlternateResourceModuleHandle at 7ffb64938df0 ZwInitializeRegistry at 7ffb6497e000 RtlFindNextForwardRunClear at 7ffb649c9b90 NtAllocateUuids at 7ffb6497cf00 WerEscalationLazyInit at 7ffb649bd220 _security_cookie at 7ffb64a5d4e0 ZwAllocateVirtualMemoryEx at 7ffb6497cf20 LdrpInitializeCriticalSectionExceptionGlobalMitigation at 7ffb649b17f0 ZwOpenProcessToken at 7ffb6497e500 RtlpFreeHandleForAtom at 7ffb6493b9d4 RtlInterlockedFlushSList at 7ffb6494d870 RtlUnwind at 7ffb648fade0 WerpPathTail at 7ffb6494b228 NtUnloadKeyEx at 7ffb6497f900 EtwEventWriteEx at 7ffb64932660 ZwMakeTemporaryObject at 7ffb6497e1e0 NtResetEvent at 7ffb6497eee0 NtResumeProcess at 7ffb6497ef40 RtlMultipleFreeHeap at 7ffb649cf450 LdrpFindLoadedDllByAddress at 7ffb64934790 LdrpMrdataLock at 7ffb64a45010 ZwCreateSectionEx at 7ffb6497d7e0 LdrpFindDelayloadedMethodInDescriptor at 7ffb649af350 LdrpParseForwarderDescription at 7ffb6494eb40 TpSetWait at 7ffb6490f120 woutput_l at 7ffb649730c0 alloca_probe at 7ffb649810e0 strcat at 7ffb64970a10 StringCbPrintfA at 7ffb649ae7ec LdrpInitializeProcess at 7ffb649b2748 RtlUnicodeStringToCountedOemString at 7ffb649c8c00 AeSbCallEvent at 7ffb64a00570 PfxFindPrefix at 7ffb649c48b0 RtlpDosLPTDevice at 7ffb649f8090 RtlpHpVsContextFreeInternal at 7ffb649ec22c RtlDosPathNameToRelativeNtPathName_U_WithStatus at 7ffb649076b0 NtSetTimer at 7ffb6497cce0 RtlpHpEnvHandle at 7ffb64a438b0 NtEnumerateValueKey at 7ffb6497c310 RtlGetDaclSecurityDescriptor at 7ffb64951a20 ShipAssert at 7ffb649bcfc0 NtQueryTimerResolution at 7ffb6497ec20 Normalization__CanCombineWithStartFirstPair at 7ffb649d9c44 ZwOpenResourceManager at 7ffb6497e540 sin at 7ffb6496f370 RtlpUnsuppressForwardReferencingCallTarget at 7ffb649d7754 RtlpHpLargeAllocReport at 7ffb649ead34 RtlpUserPolicies at 7ffb64a46590 NtFreezeTransactions at 7ffb6497dde0 RtlWow64GetCurrentMachine at 7ffb64945ca0 ZwExtendSection at 7ffb6497dc40 NtSetTimer2 at 7ffb6497f5a0 RtlExpandEnvironmentStrings at 7ffb648f71b0 RtlLookupFunctionTable at 7ffb6497b690 RtlpUnWaitCriticalSection at 7ffb649c7070 AVrfpEnableVerifierOptions at 7ffb649b9f90 ZwSetInformationResourceManager at 7ffb6497f300 NtReadFileScatter at 7ffb6497c670 RtlEthernetAddressToStringA at 7ffb649d59b0 ZwCompareSigningLevels at 7ffb6497d3e0 KiUserApcDispatcher at 7ffb6497fce0 RtlOwnerAcesPresent at 7ffb649674d0 RtlRemoveVectoredContinueHandler at 7ffb649b8bd0 RtlDoesFileExists_U at 7ffb6493d2b0 RtlCopyMemoryStreamTo at 7ffb649b5f50 LdrpCreateActCtxLanguageW at 7ffb64a45ff8 NtdllFilteredProcessRedirectingWndProc_A at 7ffb6497bfe0 RtlpMuiRegGetLangInfoIndex at 7ffb649de428 LdrGetDllDirectory at 7ffb6495cff0 NtSetSystemPowerState at 7ffb6497f540 TpInitializePackage at 7ffb6495be5c RtlReportCriticalFailure at 7ffb649d919c RtlEthernetAddressToStringW at 7ffb649d5c00 LdrpGenSecurityCookie at 7ffb6494dae0 RtlpHpTagContextFindMapping at 7ffb6492e84c ZwCreateMutant at 7ffb6497d680 LdrpInsertModuleToIndex at 7ffb6495e750 RtlDecompressFragmentLZNT1 at 7ffb649e8ba0 LdrpManifestProberRoutine at 7ffb64a46000 NtShutdownSystem at 7ffb6497f660 RtlpProtectedHeapsListBuffer at 7ffb64a43c20 SbpResolveBasedOnName at 7ffb649f0288 RtlpHpLfhContextCompact at 7ffb6492ed18 _xmm at 7ffb649fe650 EtwpGetUmLoggerInfoFromContext at 7ffb648e58f4 RtlpHpHeapUnlock at 7ffb648f6fec ZwWriteFile at 7ffb6497c1b0 LdrInitState at 7ffb64a464e0 fgetwc_nolock at 7ffb6497b1e4 NtCreateJobObject at 7ffb6497d5c0 RtlWakeAddressSingleNoFence at 7ffb649dc890 RtlStringCbLengthW at 7ffb648ec2b4 g_LdrpWow64SuspendLocalThread at 7ffb64a5a270 iswxdigit at 7ffb6496fad0 RtlpInitializeStackTraceLog at 7ffb649e2ce8 TransformMD5 at 7ffb64940bc0 NtdllpFreeStringRoutine at 7ffb6494d0e0 RtlpValidateSDOffsetAndSize at 7ffb648f4cd4 NtGetNextThread at 7ffb6497df00 RtlEnumProcessHeaps at 7ffb649cef80 ZwAlpcConnectPort at 7ffb6497cf80 RtlIsValidIndexHandle at 7ffb6493b250 RtlGetFrame at 7ffb649ae510 NtFreeUserPhysicalPages at 7ffb6497dda0 RtlpMuiRegCreateStringPool at 7ffb649ddc98 RtlIsProcessorFeaturePresent at 7ffb64900ce0 NtUnlockFile at 7ffb6497f920 RtlpInitWaitOnAddress at 7ffb649dc8a0 LdrGetProcedureAddress at 7ffb6495df10 g_SxsLiveActivationContexts at 7ffb64a46618 RtlpInterlockedPushEntrySList at 7ffb6497fba0 RtlCopyExtendedContext at 7ffb649d23d0 LdrpGenRandom at 7ffb64900c98 ZwCreateCrossVmEvent at 7ffb6497d4a0 LdrpCaptureCriticalThunks at 7ffb649b5074 g_isErrorOriginProviderEnabled at 7ffb64a4655c SystemTraceControlGuid at 7ffb649fc658 RealSuccessor at 7ffb64946ad0 EtwEventRegister at 7ffb648ea640 wcsupr_s at 7ffb6496e170 RtlGetCurrentServiceSessionId at 7ffb6491fcb0 RtlpDynamicFunctionTableLock at 7ffb64a44350 ZwEnumerateTransactionObject at 7ffb6497dc20 LdrpInitializeProcessWrapperFilter at 7ffb649b47e0 RtlpHpSegPageRangeCoalesce at 7ffb649168d0 TppCompleteThreadData at 7ffb64910998 NlsOemToUnicodeData at 7ffb64a46538 RtlpUnwindOpSlotTable at 7ffb64a02258 EtwUnregisterTraceGuids at 7ffb64933150 ZwLoadEnclaveData at 7ffb6497e0c0 RtlpCopyProcString at 7ffb6493c2bc LdrpNtDllDataTableEntry at 7ffb64a453a0 NtStartProfile at 7ffb6497f6e0 InitSecurityCookie at 7ffb649b0dfc RtlpQueryDiskSpeedPolicy at 7ffb649649b8 NtAlpcSendWaitReceivePort at 7ffb6497d1e0 RtlDelete at 7ffb64944560 ZwSetDefaultLocale at 7ffb6497f1a0 RtlDuplicateUnicodeString at 7ffb64957490 `RtlpGetUserLocaleName'::`2'::KeyValueName at 7ffb649f95e0 EtwEventWriteString at 7ffb649ecd20 RtlpTimeToTimeFieldsNoLeapSeconds at 7ffb649c44c8 ZwWaitForAlertByThreadId at 7ffb6497f9e0 RtlpGetStackLimits at 7ffb648fee9c strlwr_s at 7ffb6496d5a0 ZwQueryInformationProcess at 7ffb6497c3d0 RtlNumberGenericTableElementsAvl at 7ffb64961900 EtwpSendSessionNotification at 7ffb648e5d10 RtlQueryInformationActiveActivationContext at 7ffb6495f220 NtAreMappedFilesTheSame at 7ffb6497d220 RtlLockBootStatusData at 7ffb649cafd0 LdrpMergeParentBaseLanguagesToList at 7ffb649cbb2c ZwOpenKeyEx at 7ffb6497e400 NtAccessCheckByTypeAndAuditAlarm at 7ffb6497cbd0 TpSetPoolWorkerThreadIdleTimeout at 7ffb64942890 NtReadVirtualMemory at 7ffb6497c890 RtlpFreeUserBlockToHeap at 7ffb6492a83c DbgUiGetThreadDebugObject at 7ffb649ad400 vsprintf at 7ffb6496d900 RtlpTreeDoubleRotateNodes at 7ffb64945a2c ZwNotifyChangeMultipleKeys at 7ffb6497e340 lfind at 7ffb6496cec0 flsbuf at 7ffb64972720 ZwRaiseHardError at 7ffb6497ecc0 NtAddAtomEx at 7ffb6497cda0 RtlEnumerateGenericTableWithoutSplaying at 7ffb64944870 RtlpFreeAllAtom at 7ffb6493ba6c RtlpGetFileSize at 7ffb649d7024 ZwLoadKey at 7ffb6497e0e0 ZwDuplicateToken at 7ffb6497c8f0 NtdllDialogWndProc_A at 7ffb6497be40 LdrpInitialize at 7ffb64951818 RtlQueryInformationAcl at 7ffb64957910 RtlEqualString at 7ffb64941b10 SbGetContextDetailsByVersion at 7ffb6490de60 RtlCloneMemoryStream at 7ffb649b5f50 LdrpApplyFileNameRedirection at 7ffb64905470 NtQueryDefaultUILanguage at 7ffb6497c930 RtlIsNonEmptyDirectoryReparsePointAllowed at 7ffb649d9180 RtlpAllocateSecondLevelDir at 7ffb6494f59c RtlpWnfETWEventPublish at 7ffb649bdb28 RtlpHpLfhSubsegmentSizeBlockInternal at 7ffb648e1c3c strtok_s at 7ffb64977880 NtTestAlert at 7ffb6497f7e0 RtlValidAcl at 7ffb648f4e40 LdrGetProcedureAddressEx at 7ffb64949150 NlsMbOemCodePageTables at 7ffb64a46940 RtlpValidAttributeAce at 7ffb649c86ac ZwOpenTransactionManager at 7ffb6497e620 bsearch at 7ffb6496ec20 RtlApplyRXactNoFlush at 7ffb6495e3b0 NtSignalAndWaitForSingleObject at 7ffb6497f6a0 vsnprintf_s at 7ffb649769b0 RtlpHpSegMgrVaCtxInsert at 7ffb649eb970 RtlpCheckDynamicTimeZoneInformation at 7ffb648e2d90 NtVdmControl at 7ffb6497f9c0 TppWorkpFree at 7ffb64956ec0 szDaylightStart at 7ffb649fc370 RtlSubtreeSuccessor at 7ffb649d3f20 LdrpForkConditionVariable at 7ffb64a462f0 Normalization__IsNormalized at 7ffb649d9f6c IsOverlaySupportedPath at 7ffb6493b65c ZwAlpcImpersonateClientOfPort at 7ffb6497d120 ltoa at 7ffb6496cb80 RtlpCompareKnownAces at 7ffb649c53c0 RtlpStaticDebugInfo at 7ffb64a43d40 RtlpPopulateContext at 7ffb64946cac SlashSystem32SlashString at 7ffb649f8240 RtlpFlushHeap at 7ffb6492ea6c ultoa at 7ffb6496cbd0 TppTerminateProcess at 7ffb649ef27c LdrpSystemDllBase at 7ffb64a453a8 ZwSetHighEventPair at 7ffb6497f220 RtlpGetMultiStringLength at 7ffb649cd1fc RtlReleaseMemoryStream at 7ffb64962320 RtlpTpWaitFinalizationCallback at 7ffb6495c040 NtRemoveIoCompletionEx at 7ffb6497ede0 ZwCreateWorkerFactory at 7ffb6497d9a0 RtlQueryTokenHostIdAsUlong64 at 7ffb64961180 RtlpDeleteData at 7ffb64957040 ZwSetInformationToken at 7ffb6497f340 ltow at 7ffb6496cd20 RtlValidProcessProtection at 7ffb649c1c40 ZwMapUserPhysicalPages at 7ffb6497e260 TppCleanupGroupMemberpNoPoolList at 7ffb64a3fa98 RtlSidDominates at 7ffb64946930 RtlAddAtomToAtomTable at 7ffb6493ad20 NtSetTimerEx at 7ffb6497f5c0 NtOpenSession at 7ffb6497e580 RtlpSearchPath at 7ffb64a44360 EtwpGetUmProcessImageInfo at 7ffb649ed750 RtlpHpOptIntoSegmentHeap at 7ffb649d0d04 NtCancelSynchronousIoFile at 7ffb6497d2c0 RtlpMuiFreeLangRegistryInfo at 7ffb648e5f10 ZwSetInformationThread at 7ffb6497c250 ZwNotifyChangeDirectoryFile at 7ffb6497e2e0 StringCbLengthW at 7ffb6494d800 NtQueryDirectoryObject at 7ffb6497e840 ZwOpenEnlistment at 7ffb6497e380 isgraph at 7ffb6496c980 RtlpHpSegHeapCheckCommitLimit at 7ffb649305d8 ZwTraceEvent at 7ffb6497cc60 RtlMultipleAllocateHeap at 7ffb649cf3d0 ZwSetDefaultHardErrorPort at 7ffb6497f180 LdrUnregisterDllNotification at 7ffb649aeec0 NtSerializeBoot at 7ffb6497f0a0 KiUserCallbackDispatcherContinue at 7ffb6497fe14 ZwWaitLowEventPair at 7ffb6497fa80 WerpFreeSid at 7ffb649bcc68 RtlpHpVsContextAllocateInternal at 7ffb649189a0 EtwpGuidEntryCompare at 7ffb649629c0 RtlpTpETWCallbackStop at 7ffb649ef50c ZwQueryInformationToken at 7ffb6497c4d0 ZwCreateIoCompletion at 7ffb6497d5a0 LdrpCompareResourceNames_U at 7ffb648f9be8 FindEmailAt at 7ffb649d8cc8 RtlNumberOfSetBitsInRange at 7ffb649ca240 EtwSetMark at 7ffb64968cc0 ZwFreezeTransactions at 7ffb6497dde0 LdrpPotentialTlsLeaks at 7ffb64a45244 ZwEnumerateValueKey at 7ffb6497c310 RtlpMuiRegGrowStringPool at 7ffb649de6f0 EtwpWriteBufferCompressed at 7ffb649ee704 RtlpHpLargeAllocSize at 7ffb64963740 ZwQueryTimerResolution at 7ffb6497ec20 NtOpenResourceManager at 7ffb6497e540 LdrpCreatePendingEnclaveModule at 7ffb649adb00 ZwSetTimer2 at 7ffb6497f5a0 RtlpMUIGetAllInstalledLang at 7ffb649cd5d0 RtlpExeSearchPath at 7ffb64a44370 WerEscalationReadImageVersionInfoForModuleBase at 7ffb6494d518 RtlSetMemoryStreamSize at 7ffb649b5f50 RtlpTpTimerFinalizationCallback at 7ffb6495a170 NtExtendSection at 7ffb6497dc40 TpSetDefaultPoolCpuSets at 7ffb649eeaf8 NtCreateSectionEx at 7ffb6497d7e0 guard_check_icall at 7ffb64972710 NtMakeTemporaryObject at 7ffb6497e1e0 RtlQueryWnfStateDataWithExplicitScope at 7ffb649629e0 ZwResetEvent at 7ffb6497eee0 ZwResumeProcess at 7ffb6497ef40 TppDestroyTimer at 7ffb64911af4 ZwSetTimer at 7ffb6497cce0 RtlDestroyEnvironment at 7ffb6495e340 VsmEnclaveTelemetryInitRunOnce at 7ffb64a465a8 WNF_WER_SERVICE_START at 7ffb64a0f8c8 EtwpDemuxUmTraceHandle at 7ffb649ed424 ZwSetSystemPowerState at 7ffb6497f540 LdrpOverrideExportSuppression at 7ffb649b4b2c RtlSubAuthoritySid at 7ffb64945c80 CsrServerApiRoutine at 7ffb64a45b08 wcscmp at 7ffb64971d10 NtCreateMutant at 7ffb6497d680 RtlpHpStackTraceRemoveStack at 7ffb649e2994 LdrpMakePermanentImageCommit at 7ffb64951d4c RtlInitializeGenericTableAvl at 7ffb6495fc30 RtlpHpLfhOwnerListLockUnlock at 7ffb649eabf0 SRWLockSpinCycleCount at 7ffb64a43ec4 RtlNewSecurityObjectWithMultipleInheritance at 7ffb64967d10 ZwShutdownSystem at 7ffb6497f660 RtlCompareAltitudes at 7ffb649d1f70 LdrGetDllHandleByName at 7ffb64956c40 NtdllEditWndProcWorker at 7ffb6497c040 RtlValidRelativeSecurityDescriptor at 7ffb648f4b60 RtlpHpVaMgrRangeSplit at 7ffb6492dc64 NtCompareSigningLevels at 7ffb6497d3e0 RtlpMuiRegCreateRegistryInfo at 7ffb649ddc60 RtlQueryTagHeap at 7ffb649cf4c0 NtSetInformationResourceManager at 7ffb6497f300 ZwReadFileScatter at 7ffb6497c670 AVrfpPageHeapStopData at 7ffb64a44ec0 RtlpHpVsSubsegmentFree at 7ffb64930e08 LdrpDllDirectory at 7ffb64a46020 `RtlpGetCookieValue'::`2'::CookieValue at 7ffb64a46018 TppCleanupGroupMemberRelease at 7ffb649117f4 RTL_BINARY_ARRAY::ChunkAllocate at 7ffb6497b53c RtlDeleteElementGenericTable at 7ffb64944080 NlsMbAnsiCodePageTables at 7ffb64a46540 ShipAssertGetBufferInfo at 7ffb649bd0e0 fabs at 7ffb6496f830 ZwFreeUserPhysicalPages at 7ffb6497dda0 RtlCommitMemoryStream at 7ffb649b5f50 RtlRevertMemoryStream at 7ffb649b5f50 ZwUnlockFile at 7ffb6497f920 RtlpSearchPathMode at 7ffb64a46508 PsspCaptureIptTrace at 7ffb649f1440 TppETWCallbackDequeue at 7ffb649ef338 RtlpHpVaMgrRangeCleanup at 7ffb6492f848 labs at 7ffb6496e260 RtlGetConsoleSessionForegroundProcessId at 7ffb649d6c00 NtWriteFile at 7ffb6497c1b0 RtlpBitsClearLow at 7ffb64a01170 ZwCreateJobObject at 7ffb6497d5c0 RtlSetPortableOperatingSystem at 7ffb649cb4c0 RtlInitializeHistoryTable at 7ffb649576e4 towupper at 7ffb64971c60 NtdllComboBoxWndProc_W at 7ffb6497be10 _imp_NtOpenKey at 7ffb64a00af8 RtlInitAnsiString at 7ffb64901180 TppHeapTag at 7ffb64a46080 ZwGetNextThread at 7ffb6497df00 RtlStackDbStackRemove at 7ffb649f5364 RtlPopFrame at 7ffb649480c0 NtAlpcConnectPort at 7ffb6497cf80 RtlpHpSegSetExtraPresent at 7ffb649267bc RtlIsPackageSid at 7ffb64962180 NlsUnicodeToAnsiData at 7ffb64a46528 NtLoadEnclaveData at 7ffb6497e0c0 TpCallbackReleaseSemaphoreOnCompletion at 7ffb649eefa0 NormBuffer__ReplaceLastStartBase at 7ffb649d9850 DbgBreakPointWithStatusEnd at 7ffb6497faf2 NtSetDefaultLocale at 7ffb6497f1a0 ZwStartProfile at 7ffb6497f6e0 TppCallbackSendAndDestroyAlpcMessage at 7ffb6495e564 ZwAlpcSendWaitReceivePort at 7ffb6497d1e0 CsrAllocateCaptureBuffer at 7ffb6492bbc0 wcscspn at 7ffb64971d50 AVrfpVerifierLock at 7ffb64a445e0 RtlIsValidOemCharacter at 7ffb649d6b30 isspace at 7ffb6496ca40 NtCreateCrossVmEvent at 7ffb6497d4a0 TppPoolpDefaultPoolCpuSets at 7ffb64a43460 ungetc_nolock at 7ffb64976140 szStandardName at 7ffb649fc410 g_werEscalationData at 7ffb64a465e0 RcFrameConsolidation at 7ffb64980640 wcsncmp at 7ffb64971e10 NtEnumerateTransactionObject at 7ffb6497dc20 RtlCopySecurityDescriptor at 7ffb649477e0 ZwAccessCheckByTypeAndAuditAlarm at 7ffb6497cbd0 RTL_BINARY_ARRAY::SlotAllocate at 7ffb64948720 CsrFreeCaptureBuffer at 7ffb6492b810 RtlpValidateSidBuffer at 7ffb6495c910 WinSqmStartSqmOptinListener at 7ffb64962320 RtlGetElementGenericTableAvl at 7ffb649d40d0 RtlpSetHeapDebuggingInformation at 7ffb649d1290 KiUserCallbackDispatcher at 7ffb6497fdf0 NtOpenKeyEx at 7ffb6497e400 NtNotifyChangeMultipleKeys at 7ffb6497e340 NtRaiseHardError at 7ffb6497ecc0 ZwReadVirtualMemory at 7ffb6497c890 RtlIsDosDeviceName_U at 7ffb64909340 LdrpDefaultDllDirectories at 7ffb64a4601c LdrpMapAndSnapWork at 7ffb64a45288 WerpIsDebugPortPresent at 7ffb649bccac RtlIsParentOfChildAppContainer at 7ffb6495f810 LdrpFreeReplacedModule at 7ffb649448ec RtlpMemoryBlockLookasideLock at 7ffb64a46350 LdrpResFileSize at 7ffb649c2710 NtWaitForAlertByThreadId at 7ffb6497f9e0 ZwAreMappedFilesTheSame at 7ffb6497d220 RtlDrainNonVolatileFlush at 7ffb649d5860 RtlGetEnabledExtendedFeatures at 7ffb6495fe10 NtQueryInformationProcess at 7ffb6497c3d0 RtlExtendCorrelationVector at 7ffb64951f70 NtOpenTransactionManager at 7ffb6497e620 RtlxOemStringToUnicodeSize at 7ffb64902100 RtlWow64CallFunction64 at 7ffb64964730 ZwTestAlert at 7ffb6497f7e0 d_max at 7ffb64a004d8 AVrfpCurrentUserKeyPath at 7ffb64a449c0 RtlpDosPathNameToRelativeNtPathName_U at 7ffb64905ff0 RtlpHpVsChunkDecommit at 7ffb649ebf3c ZwSignalAndWaitForSingleObject at 7ffb6497f6a0 AVrfOpenCurrentUserImageFileOptionsKey at 7ffb649b9888 NtLoadKey at 7ffb6497e0e0 EtwpAllocateUmGuidEntry at 7ffb648e5f8c ZwAddAtomEx at 7ffb6497cda0 _report_gsfailure at 7ffb6496c200 RtlpValidAttributeInfo at 7ffb649c8720 RtlpDynamicFunctionTableTree at 7ffb64a5a2a8 RtlpEnsureTailingSlashAndAddToList at 7ffb649be0a8 ZwQueryDefaultUILanguage at 7ffb6497c930 floor at 7ffb6496f910 RtlReadThreadProfilingData at 7ffb649acbb0 NtDuplicateToken at 7ffb6497c8f0 LdrpQueryIllegalCWDDevices at 7ffb649b4d60 CompatCachepLookupCdb at 7ffb649094ec LdrpInitializeNlsInfo at 7ffb649b2708 NtSetHighEventPair at 7ffb6497f220 RtlpTpIoDllUnloaded at 7ffb64968638 RtlComputeImportTableHash at 7ffb649bf7d0 RtlpHeapLogRangeReserve at 7ffb649e1808 RtlpLDNumBlocks at 7ffb64a46980 NtMapUserPhysicalPages at 7ffb6497e260 szTimeZoneKeyName at 7ffb64a19188 PsspCaptureVaSpaceInformation at 7ffb649f1ad0 ZwRemoveIoCompletionEx at 7ffb6497ede0 ApiSetQueryApiSetPresenceEx at 7ffb649b5940 RtlpTraceDatabaseInternalFind at 7ffb649dc75c NtCreateWorkerFactory at 7ffb6497d9a0 RtlpHpLfhBucketInitialize at 7ffb6492a8d4 vsprintf_s at 7ffb649774a0 NtSetInformationToken at 7ffb6497f340 MD5Final at 7ffb649409a0 AVrfpVerifierProvidersList at 7ffb64a44610 RtlpHpStackTraceAllocRemove at 7ffb649e2238 ZwVdmControl at 7ffb6497f9c0 RtlUnsubscribeWnfNotificationWaitForCompletion at 7ffb648e63f0 LdrpProcessWork at 7ffb6490e2ec RtlIsCriticalSectionLocked at 7ffb649c6a80 LdrpResValidateFileHandle at 7ffb649c33f0 RtlpQueryFilesInAssemblyInformationActivationContextDetailedInformation at 7ffb649befe4 LdrpPolicyBits at 7ffb64a42714 NtAlpcImpersonateClientOfPort at 7ffb6497d120 PssNtWalkSnapshot at 7ffb649f1100 RtlSetCurrentTransaction at 7ffb649476c0 RtlpHpReallocMove at 7ffb64925974 NtWaitLowEventPair at 7ffb6497fa80 PsspWalkInfoClass_PSS_WALK_THREADS at 7ffb649f3378 NtTraceEvent at 7ffb6497cc60 NtSetDefaultHardErrorPort at 7ffb6497f180 ZwSerializeBoot at 7ffb6497f0a0 RtlEndStrongEnumerationHashTable at 7ffb6495f7c0 RtlpProbeUserBufferSafe at 7ffb6494dfc8 NtQueryInformationToken at 7ffb6497c4d0 NtCreateIoCompletion at 7ffb6497d5a0 NormBuffer__SortBeforeSameClass at 7ffb649d99d0 MD4Final at 7ffb649ec460 NtSetInformationThread at 7ffb6497c250 NtNotifyChangeDirectoryFile at 7ffb6497e2e0 ComposeHangulLV at 7ffb649d9308 RtlDecodeRemotePointer at 7ffb649bb920 ZwQueryDirectoryObject at 7ffb6497e840 RtlpMemoryBlockLookasideCriticalRoutines at 7ffb649f8cd0 ZwSetTimerEx at 7ffb6497f5c0 RtlpPrintErrorInformation at 7ffb649e3e68 ZwOpenSession at 7ffb6497e580 CsrCaptureTimeout at 7ffb649ac100 SetLastWin32ErrorEvent at 7ffb64a0c160 ZwCancelSynchronousIoFile at 7ffb6497d2c0 UseCOR at 7ffb64a45368 RtlLogStackTrace at 7ffb649dad10 NtOpenEnlistment at 7ffb6497e380 RtlNumberOfClearBitsInRange at 7ffb649ca210 splitpath_s at 7ffb64976bb0 LdrpDestroyNode at 7ffb6494c1d4 LdrSetDllManifestProber at 7ffb64962350 LdrSetImplicitPathOptions at 7ffb649aee50 RtlpEmptyString at 7ffb649f8070 RtlpLeakHeapAddress at 7ffb64a46990 NtOpenProcessTokenEx at 7ffb6497c6b0 NtUnmapViewOfSection at 7ffb6497c5f0 LdrpCheckPolicy at 7ffb6496120c RtlpHpLfhContextInitialize at 7ffb6492bcec NtReleaseWorkerFactoryWorker at 7ffb6497edc0 ZwSetInformationTransactionManager at 7ffb6497f380 TppJobpFree at 7ffb64963560 RtlIsNormalizedString at 7ffb649da460 ZwQueryBootEntryOrder at 7ffb6497e7c0 RtlpUnloadEventTraceEx at 7ffb64a45fe8 RtlUniform at 7ffb64952a60 LdrProcessRelocationBlockEx at 7ffb649c21c0 NlsUnicodeToMbOemData at 7ffb64a46948 NtQueryInformationAtom at 7ffb6497e8c0 RtlCrc64 at 7ffb649d2b40 NtAlpcImpersonateClientContainerOfPort at 7ffb6497d100 EtwLogTraceEvent at 7ffb64966600 LdrpTargetCompare at 7ffb6495e730 RtlQueryWnfStateData at 7ffb6495bf70 PrivateLoggerNotificationEntry at 7ffb64a43510 RtlDeregisterSecureMemoryCacheCallback at 7ffb649d4200 NtAllocateReserveObject at 7ffb6497cec0 RtlpLargestLfhBlock at 7ffb64a427a0 RtlpMemoryZoneCriticalRoutines at 7ffb649f8fd0 NtCreateProcess at 7ffb6497d740 RtlQueryPerformanceCounter at 7ffb648ebbb0 RtlpCopyMappedMemoryEx_ExceptionFilter at 7ffb649d2ab0 LdrpLogEtwEvent at 7ffb649afc58 RtlpUpdateTagEntry at 7ffb649d14cc ZwMapUserPhysicalPagesScatter at 7ffb6497c110 NtdllGhostWndProc_W at 7ffb6497bf10 NormBuffer__RewindOutputCharacter at 7ffb649d9988 CsrPortBaseTag at 7ffb64a45b58 NtdllDispatchMessage_W at 7ffb6497bfb0 wcstombs at 7ffb649722e0 RtlpTpIoDllNotification at 7ffb64968570 LdrpFatalExceptionFilter at 7ffb649b597c wcslen at 7ffb64971da0 LdrpHandleUnprotectedDelayLoad at 7ffb649af498 NtReplyWaitReplyPort at 7ffb6497eea0 TppETWTimerExpirationBegin at 7ffb649ef93c RtlCreateRegistryKey at 7ffb649cb500 RtlpHpStackTraceProviderHandle at 7ffb64a46388 EtwpGuidEntryTable at 7ffb64a46420 NtNotifyChangeSession at 7ffb6497e360 EtwpTrackDebugIdForSession at 7ffb649ee530 TlgDefineProvider_annotation__TlgLdrpMuiResourceLoaderTraceLoggingProviderProv at 7ffb649b0df0 NtUnsubscribeWnfStateChange at 7ffb6497f980 RtlpHpStackTraceSerializeRemote at 7ffb649e2b00 RtlpHpSegPageRangeComputeLargePageCost at 7ffb649eba18 ZwPrivilegedServiceAuditAlarm at 7ffb6497e720 NtdllGhostWndProc_A at 7ffb6497bf00 RtlpNtMakeTemporaryKey at 7ffb649e1190 EtwpCreateRegGuidsContext at 7ffb648eb320 LdrpCreateLoaderEvents at 7ffb6495ca1c _initiallocinfo at 7ffb64a3f010 RtlpLookupSafeCurDirList at 7ffb649be140 NtQueryInformationPort at 7ffb6497e940 RtlpQueryDiskWriteConstraintPolicyByHandle at 7ffb649f47ac RtlEqualWnfChangeStamps at 7ffb64964a20 TppSimplepTaskVFuncs at 7ffb649f83d0 RtlIsNameLegalDOS8Dot3 at 7ffb649d6980 ZwSetHighWaitLowEventPair at 7ffb6497f240 RtlUnicodeStringCat at 7ffb64957818 g_LdrpWow64LdrpInitialize at 7ffb64a5a220 ZwFilterToken at 7ffb6497dc80 NtSetBootOptions at 7ffb6497f0e0 RtlQueryTimeZoneInformation at 7ffb648e2b70 RtlFirstFreeAce at 7ffb648f4b00 EtwpQueryUmLogger at 7ffb649ed8f0 RtlpDphInitFailureFlags at 7ffb64a43b68 RtlDebugZeroHeap at 7ffb649e627c ValidateRegistrLangType at 7ffb649df6b8 LdrpVchLock at 7ffb64a464f8 crc64Map32_ at 7ffb64a133f0 RtlpMaxNumberOfProtectedHeaps at 7ffb64a42798 ZwSetLowEventPair at 7ffb6497f460 ZwOpenThread at 7ffb6497e5c0 UpcaseUnicodeToUTF8NHelper at 7ffb649c4050 RtlResetMemoryBlockLookaside at 7ffb649c8b40 strset_s at 7ffb64976ee0 LdrpSectionTableFromVirtualAddress at 7ffb64938cb0 RtlCopyBitMap at 7ffb649c9160 RtlWeaklyEnumerateEntryHashTable at 7ffb649d23c0 RtlValidateProcessHeaps at 7ffb649cfc40 RtlLocalTimeToSystemTime at 7ffb649c4430 RtlGetNtGlobalFlags at 7ffb6497b770 TppCheckForTransactions at 7ffb64915bdc wcspbrk at 7ffb64971ed0 RtlpMuiRegValidateAndGetInstallFallbackBase at 7ffb649e079c wcslwr at 7ffb6496dc30 NtReleaseKeyedEvent at 7ffb6497eda0 wctype at 7ffb649ffea0 vDbgPrintEx at 7ffb649bfd80 RtlFailedCriticalDebugAllocations at 7ffb64a44eec NtAlpcCreateSectionView at 7ffb6497d020 RtlpUnwindEpilogue at 7ffb649db708 NtQuerySecurityObject at 7ffb6497eb40 WinSqmCheckEscalationSetString at 7ffb64962320 ZwAccessCheckByTypeResultListAndAuditAlarm at 7ffb6497cd40 NtOpenThreadToken at 7ffb6497c530 NtSetTimerResolution at 7ffb6497f5e0 RtlDebugSetUserValueHeap at 7ffb649e5ed8 EtwpFindDebugId at 7ffb649ee140 RtlCompressBuffer at 7ffb64960820 RtlFreeAnsiString at 7ffb64909c20 RtlInterlockedPushListSListEx at 7ffb649d9030 ZwSetLdtEntries at 7ffb6497f440 RtlpLogHeapSubSegmentAlloc at 7ffb649e3974 RtlpPerformanceCounterFrequency at 7ffb64a463e8 RtlFormatMessage at 7ffb649d6300 AVrfpSnapAlreadyLoadedDlls at 7ffb649ba7b8 LdrpLogEtwDllSearchResults at 7ffb649af9a4 TppWorkpCleanupGroupMemberVFuncs at 7ffb649f8390 TppDestroyTimerSubQueue at 7ffb64961140 Nls844UnicodeLowercaseTable at 7ffb64a46520 raise_exc at 7ffb64974b70 RtlUnicodeStringToLcid at 7ffb649cbfa0 RtlWow64GetThreadSelectorEntry at 7ffb649bb5a0 strupr at 7ffb6496d690 RtlpBitsClearAnywhere at 7ffb64a128b0 RtlpGetImageBaseViaQueryVirtualMemory at 7ffb648fea3c RtlOpenImageFileOptionsKey at 7ffb649c0d00 wcscpy_s at 7ffb64977b80 ZwDisplayString at 7ffb6497db60 RtlEnumerateGenericTableAvl at 7ffb64946a50 NtdllImeWndProc_A at 7ffb6497bee0 NtdllStaticWndProc_A at 7ffb6497bec0 RtlpCompareProtectedPolicyEntry at 7ffb64955440 ZwDeleteDriverEntry at 7ffb6497da40 RtlSetBit at 7ffb6495f760 NtSetInformationEnlistment at 7ffb6497f2a0 WerpBreakIntoDebuggerIfPresent at 7ffb649bca48 ZwFlushKey at 7ffb6497dd20 RtlResetMemoryZone at 7ffb649c8ba0 isdigit at 7ffb6496c950 ZwAlpcDeleteSectionView at 7ffb6497d0a0 NtSetIRTimer at 7ffb6497f260 RtlpWnfMetaCallbackProc at 7ffb649640f0 LdrpCorExeMainRoutine at 7ffb64a45438 szStandardStart at 7ffb649fc3d0 LdrpActiveThreadCount at 7ffb64a45240 NtdllImeWndProc_W at 7ffb6497bef0 ZwAlertThreadByThreadId at 7ffb6497ce80 PfxRemovePrefix at 7ffb649c4ad0 RtlQueryThreadPlaceholderCompatibilityMode at 7ffb6495f200 g_sqmSessionHandle at 7ffb64a427b8 RtlpGetLocaleDataKey at 7ffb649d7080 ZwLoadKey2 at 7ffb6497e100 g_SxsCurrentDeadActivationContexts at 7ffb64a46600 RtlCreateSecurityDescriptor at 7ffb648effd0 strtoi64 at 7ffb649726e4 RtlApplicationVerifierStop at 7ffb649bb3c0 ZwUnlockVirtualMemory at 7ffb6497f940 RtlpGetStackTraceAddress at 7ffb649db150 RtlpHpReAllocWithExceptionProtection at 7ffb64924b74 MD4Update at 7ffb649ecaf0 RtlCSparseBitmapStart at 7ffb649ebca0 RtlImageNtHeaderEx_ExceptionFilter at 7ffb649d8d54 RtlAddAuditAccessAceEx at 7ffb64969470 fputwc_nolock at 7ffb64976060 ZwReadOnlyEnlistment at 7ffb6497ece0 NtdllHkINLPCWPSTRUCT_A at 7ffb6497bf20 RtlIsPartialPlaceholderFileInfo at 7ffb649d90a0 TppETWPoolThreadMax at 7ffb649ef6a0 UserDiagnosticProviderCallback at 7ffb649d6d20 ZwGetCurrentProcessorNumber at 7ffb6497de60 ZwQueryVolumeInformationFile at 7ffb6497c9d0 RtlWerpReportException at 7ffb649bc530 `RtlpGetLocaleDataKey'::`2'::KeyPath at 7ffb649f95f0 RtlpMemoryZoneLock at 7ffb64a46358 GetProcessIptTraceSize at 7ffb649f43ec LdrpCODScenarioTriggered at 7ffb64a465a4 RtlpLogHeapSubSegmentActivate at 7ffb649e38d0 RtlCheckForOrphanedCriticalSections at 7ffb6495cf40 NtOpenIoCompletion at 7ffb6497e3c0 LdrpCreateSoftwareEnclave at 7ffb649adbe4 AlternateResourceModuleCount at 7ffb64a44340 LdrpLogVsmEnclaveLdrInitializeEnclaveTelemetry at 7ffb649b091c ZwCreateDirectoryObjectEx at 7ffb6497d500 g_SxsTrackReleaseStacks at 7ffb64a4650c LdrIsEnclaveAddress at 7ffb649ad810 RtlQueueApcWow64Thread at 7ffb649bb550 RtlpLfhBucketIndexMap at 7ffb64a00d60 RtlpStackTraceDatabaseHeapEnum at 7ffb649db210 RtlpGetLowFragHeapMetadataSize at 7ffb649e78d8 iswascii at 7ffb6496fa60 RtlpMakeXpressCallback at 7ffb649ea2e4 RtlSetProxiedProcessId at 7ffb64964330 ZwReleaseMutant at 7ffb6497c4b0 _imp_ZwOpenKey at 7ffb64a00ad0 RtlpRunTable at 7ffb64a06000 _NLG_Return2 at 7ffb64972420 RtlpCurDirRef at 7ffb64a45b70 NtApphelpCacheControl at 7ffb6497ca30 RtlpHpScheduleCompaction at 7ffb649166b4 NtQueryAuxiliaryCounterFrequency at 7ffb6497e7a0 Wow64LdrpInitialize at 7ffb64964714 RtlpHpVaMgrAllocAligned at 7ffb6492e3e0 TpWaitForJobNotification at 7ffb6495d870 RtlpSetProcMergedLangList at 7ffb6495f8d8 TppPHInsert at 7ffb64912a5c NtReadFile at 7ffb6497c170 RtlAppendUnicodeToString at 7ffb648f5120 LdrpDebugFlags at 7ffb64a3fab0 NtDllName at 7ffb649f9390 NtAllocateVirtualMemoryEx at 7ffb6497cf20 RtlGetProcessHeapsCallback at 7ffb649cf010 NtdllListBoxWndProc_W at 7ffb6497be90 NtQueryBootOptions at 7ffb6497e7e0 RtlUnlockMemoryZone at 7ffb64953200 NtInitializeRegistry at 7ffb6497e000 CsrCaptureMessageBuffer at 7ffb6492bc90 ZwAllocateUuids at 7ffb6497cf00 RtlGetSaclSecurityDescriptor at 7ffb64955ee0 RtlAbsoluteToSelfRelativeSD at 7ffb64947a60 ZwUnloadKeyEx at 7ffb6497f900 LdrQueryModuleInfoLocalLoaderUnlock at 7ffb64964a40 LdrDeleteEnclave at 7ffb649ad680 NtOpenProcessToken at 7ffb6497e500 memset at 7ffb64982fc0 RtlpPlaceActivationContextOnLiveList at 7ffb649bec4c _report_securityfailure at 7ffb6496c36c RaiseException at 7ffb649746c0 RtlSetAttributesSecurityDescriptor at 7ffb649c5230 PfxInsertPrefix at 7ffb649c49b0 RtlpWalkLowFragHeapSegment at 7ffb649e8418 NtEnumerateKey at 7ffb6497c6f0 RtlpHeapAddListEntry at 7ffb649265b4 ZwRecoverResourceManager at 7ffb6497ed20 NtdllListBoxWndProc_A at 7ffb6497be80 RtlpHpSegContextInitialize at 7ffb6492c0e4 AVrfpEnabledSystemWide at 7ffb64a44608 RtlpHeapHeaderFieldOffsets at 7ffb649f9660 NtOpenJobObject at 7ffb6497e3e0 AlpcGetMessageAttribute at 7ffb6494e790 TppPoolpList at 7ffb64a3f610 LdrGetDllHandle at 7ffb649017f0 TppETWTimerSetNtTimer at 7ffb649efa6c RtlEncodeRemotePointer at 7ffb649bb990 ZwCloseObjectAuditAlarm at 7ffb6497c810 TpReleaseIoCompletion at 7ffb64942120 RtlpUpdateUCRIndexRemove at 7ffb6495fee0