Generated by JEB on 2019/08/01

PE: C:\Windows\System32\drivers\ksecdd.sys Base=0x1C0000000 SHA-256=1FA9473A9DB591E951AF7BB88914816C441671E4DC6C97EB2649D0104D88247E
PDB: ksecdd.pdb GUID={1C1D7EBF-7926-79BE-7C89BFE90720FF54} Age=1

935 located named symbols:
0x1C0011C20: "LookupAccountName " ??_C@_0BD@MNALNBCD@LookupAccountName?6?$AA@
0x1C001E490: ProcessSecurityContextMarshalParams
0x1C0002E00: "long __cdecl KsecIoctlInsertProtectedProcessAddress(void * __ptr64,unsigned long)" ?KsecIoctlInsertProtectedProcessAddress@@YAJPEAXK@Z
0x1C0011494: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag11" ?__midl_frag11@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C000D9A0: BCryptRegisterConfigChangeNotify
0x1C000FEC0: "struct _NDR64_POINTER_FORMAT const __midl_frag84" ?__midl_frag84@@3U_NDR64_POINTER_FORMAT@@B
0x1C0011660: "struct _NDR64_RANGED_STRING_FORMAT const __midl_frag171" ?__midl_frag171@@3U_NDR64_RANGED_STRING_FORMAT@@B
0x1C000BFAC: "long __cdecl KSecSerializeSchannelAuthDataV5(void * __ptr64,unsigned long * __ptr64,void * __ptr64 * __ptr64)" ?KSecSerializeSchannelAuthDataV5@@YAJPEAXPEAKPEAPEAX@Z
0x1C000ADC8: "long __cdecl CopyExtraBuffers(struct _SecBufferInfoArray * __ptr64,struct _SecBufferDesc * __ptr64)" ?CopyExtraBuffers@@YAJPEAU_SecBufferInfoArray@@PEAU_SecBufferDesc@@@Z
0x1C000CB00: SecSetPagingMode
0x1C0016630: KsecConnectEvent
0x1C0001E40: BCryptImportKey
0x1C0016320: "unsigned long KsecValidVmCount" ?KsecValidVmCount@@3KA
0x1C00191F8: "__cdecl _imp_ExAcquireFastMutex" __imp_ExAcquireFastMutex
0x1C0010798: "No extension to handle IOCTL 0x%" ??_C@_0CE@PNONBHEN@No?5extension?5to?5handle?5IOCTL?50x?$CF@
0x1C00124F8: "No extension to handle Shutdown " ??_C@_0CN@BIDJHGGC@No?5extension?5to?5handle?5Shutdown?5@
0x1C00115B0: "struct _NDR64_CONFORMANT_STRING_FORMAT const __midl_frag94" ?__midl_frag94@@3U_NDR64_CONFORMANT_STRING_FORMAT@@B
0x1C0011540: "struct __midl_frag49_t const __midl_frag49" ?__midl_frag49@@3U__midl_frag49_t@@B
0x1C00166C8: "struct _KSEC_BCRYPT_EX_FUNCTIONS * __ptr64 __ptr64 gKsecpBCryptExtension" ?gKsecpBCryptExtension@@3PEAU_KSEC_BCRYPT_EX_FUNCTIONS@@EA
0x1C0019080: "__cdecl _imp_RtlFreeUnicodeString" __imp_RtlFreeUnicodeString
0x1C0016710: "struct _SEC_BUILTIN_KPACKAGE * __ptr64 __ptr64 KsecDeferredPackages" ?KsecDeferredPackages@@3PEAU_SEC_BUILTIN_KPACKAGE@@EA
0x1C0011B48: "EnumeratePackages " ??_C@_0BD@MKFDINKI@EnumeratePackages?6?$AA@
0x1C0001200: SecFreeForKsecCaller
0x1C000FD40: "struct __midl_frag58_t const __midl_frag58" ?__midl_frag58@@3U__midl_frag58_t@@B
0x1C0011648: "struct _NDR64_RANGED_STRING_FORMAT const __midl_frag172" ?__midl_frag172@@3U_NDR64_RANGED_STRING_FORMAT@@B
0x1C00116A0: "unsigned char const __midl_frag191" ?__midl_frag191@@3EB
0x1C00104CC: "KSecDD" ??_C@_06DFECHEJG@KSecDD?$AA@
0x1C0019408: "__cdecl _imp_RtlMapSecurityErrorToNtStatus" __imp_RtlMapSecurityErrorToNtStatus
0x1C0016238: "__cdecl _security_cookie_complement" __security_cookie_complement
0x1C001C620: CallSPM
0x1C000C740: KSecLocatePackageById
0x1C0010138: "struct __midl_frag159_t const __midl_frag159" ?__midl_frag159@@3U__midl_frag159_t@@B
0x1C00102D8: "struct __midl_frag189_t const __midl_frag189" ?__midl_frag189@@3U__midl_frag189_t@@B
0x1C00103C0: "struct __midl_frag199_t const __midl_frag199" ?__midl_frag199@@3U__midl_frag199_t@@B
0x1C0019110: "__cdecl _imp_ObfDereferenceObject" __imp_ObfDereferenceObject
0x1C00116A1: "unsigned char const __midl_frag190" ?__midl_frag190@@3EB
0x1C000D680: BCryptDeriveKeyPBKDF2
0x1C000BD68: "struct _SECPKG_KERNEL_FUNCTION_TABLE * __ptr64 __cdecl KSecLocatePackageByIdEx(unsigned long)" ?KSecLocatePackageByIdEx@@YAPEAU_SECPKG_KERNEL_FUNCTION_TABLE@@K@Z
0x1C00235AC: TBAllocateBuffer
0x1C001C264: SecpGetLogonSessionData
0x1C00192C0: "__cdecl _imp_PsGetCurrentServerSilo" __imp_PsGetCurrentServerSilo
0x1C0004650: NegSetPagingMode
0x1C00115C8: "struct __midl_frag108_t const __midl_frag108" ?__midl_frag108@@3U__midl_frag108_t@@B
0x1C000F6A0: "struct __midl_frag128_t const __midl_frag128" ?__midl_frag128@@3U__midl_frag128_t@@B
0x1C000F620: "struct __midl_frag148_t const __midl_frag148" ?__midl_frag148@@3U__midl_frag148_t@@B
0x1C00116C8: "struct __midl_frag198_t const __midl_frag198" ?__midl_frag198@@3U__midl_frag198_t@@B
0x1C0001120: KSecDereferenceListEntry
0x1C0019018: "__cdecl _imp_RpcAsyncCompleteCall" __imp_RpcAsyncCompleteCall
0x1C0016318: "unsigned char * NtlmTag" ?NtlmTag@@3PAEA
0x1C001E950: LsaLookupAuthenticationPackage
0x1C0016728: "char const * __ptr64 const __ptr64 DebugComponentName" ?DebugComponentName@@3PEBDEB
0x1C0019410: "__cdecl _imp_RtlInitUnicodeString" __imp_RtlInitUnicodeString
0x1C0002FD4: "long __cdecl KsecIoctlDupLsaHandle(void * __ptr64,unsigned long,void * __ptr64,unsigned long,unsigned long * __ptr64)" ?KsecIoctlDupLsaHandle@@YAJPEAXK0KPEAK@Z
0x1C000B724: SspipSslSetCredentialsAttributes
0x1C0005810: "__cdecl guard_dispatch_icall_nop" _guard_dispatch_icall_nop
0x1C0019210: "__cdecl _imp_MmUnlockPagableImageSection" __imp_MmUnlockPagableImageSection
0x1C0011688: "struct __midl_frag219_t const __midl_frag219" ?__midl_frag219@@3U__midl_frag219_t@@B
0x1C0022530: AcquireCredentialsHandleMarshalParams
0x1C00207E0: SecpAddCredentials
0x1C000FD88: "struct _NDR64_POINTER_FORMAT const __midl_frag55" ?__midl_frag55@@3U_NDR64_POINTER_FORMAT@@B
0x1C001158C: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag80" ?__midl_frag80@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C000FF10: "struct __midl_frag105_t const __midl_frag105" ?__midl_frag105@@3U__midl_frag105_t@@B
0x1C00115F0: "struct __midl_frag135_t const __midl_frag135" ?__midl_frag135@@3U__midl_frag135_t@@B
0x1C0011620: "struct __midl_frag155_t const __midl_frag155" ?__midl_frag155@@3U__midl_frag155_t@@B
0x1C000F5B0: "struct __midl_frag165_t const __midl_frag165" ?__midl_frag165@@3U__midl_frag165_t@@B
0x1C00102E8: "struct __midl_frag185_t const __midl_frag185" ?__midl_frag185@@3U__midl_frag185_t@@B
0x1C00103F0: "struct __midl_frag206_t const __midl_frag206" ?__midl_frag206@@3U__midl_frag206_t@@B
0x1C001E290: SspiCreateAsyncContext
0x1C000BDF8: "long __cdecl KSecSerializeSchannelAuthDataV4(void * __ptr64,unsigned long * __ptr64,void * __ptr64 * __ptr64)" ?KSecSerializeSchannelAuthDataV4@@YAJPEAXPEAKPEAPEAX@Z
0x1C00117A0: "__cdecl TraceLoggingMetadata" _TraceLoggingMetadata
0x1C0019188: "__cdecl _imp_IoGetRequestorProcess" __imp_IoGetRequestorProcess
0x1C0019248: MmHighestUserAddress
0x1C0012718: "KsecIoctlAllocPool: Output buffe" ??_C@_0DC@BDPGMPDO@KsecIoctlAllocPool?3?5Output?5buffe@
0x1C0022460: SspiInitializeSecurityContextAsyncW
0x1C000D700: BCryptDestroySecret
0x1C0001E00: BCryptCloseAlgorithmProvider
0x1C000D7D0: BCryptEnumAlgorithms
0x1C00191E0: "__cdecl _imp_PsIsProtectedProcess" __imp_PsIsProtectedProcess
0x1C000FF70: "struct __midl_frag134_t const __midl_frag134" ?__midl_frag134@@3U__midl_frag134_t@@B
0x1C0011608: "struct __midl_frag144_t const __midl_frag144" ?__midl_frag144@@3U__midl_frag144_t@@B
0x1C00100C0: "struct __midl_frag154_t const __midl_frag154" ?__midl_frag154@@3U__midl_frag154_t@@B
0x1C000F540: "struct __midl_frag174_t const __midl_frag174" ?__midl_frag174@@3U__midl_frag174_t@@B
0x1C0010290: "struct __midl_frag184_t const __midl_frag184" ?__midl_frag184@@3U__midl_frag184_t@@B
0x1C0011698: "struct __midl_frag194_t const __midl_frag194" ?__midl_frag194@@3U__midl_frag194_t@@B
0x1C00116E8: "struct __midl_frag207_t const __midl_frag207" ?__midl_frag207@@3U__midl_frag207_t@@B
0x1C0019218: "__cdecl _imp_MmLockPagableDataSection" __imp_MmLockPagableDataSection
0x1C0011F60: "SspipProcessSecurityContext: Out" ??_C@_0EG@BGAPPODK@SspipProcessSecurityContext?3?5Out@
0x1C00192A0: "__cdecl _imp_ExpInterlockedPushEntrySList" __imp_ExpInterlockedPushEntrySList
0x1C0019120: "__cdecl _imp_IoCreateDevice" __imp_IoCreateDevice
0x1C000FE30: "struct __midl_frag59_t const __midl_frag59" ?__midl_frag59@@3U__midl_frag59_t@@B
0x1C00106B8: "SspipProcessSecurityContext: Ext" ??_C@_0DM@COGIKIHB@SspipProcessSecurityContext?3?5Ext@
0x1C00115D0: "struct __midl_frag107_t const __midl_frag107" ?__midl_frag107@@3U__midl_frag107_t@@B
0x1C0010038: "struct __midl_frag137_t const __midl_frag137" ?__midl_frag137@@3U__midl_frag137_t@@B
0x1C0011630: "struct __midl_frag157_t const __midl_frag157" ?__midl_frag157@@3U__midl_frag157_t@@B
0x1C00116A8: "struct __midl_frag187_t const __midl_frag187" ?__midl_frag187@@3U__midl_frag187_t@@B
0x1C0010340: "struct __midl_frag197_t const __midl_frag197" ?__midl_frag197@@3U__midl_frag197_t@@B
0x1C0011748: "Negotiate" ??_C@_1BE@ELFOBFGL@?$AAN?$AAe?$AAg?$AAo?$AAt?$AAi?$AAa?$AAt?$AAe?$AA?$AA@
0x1C0005500: BCryptSetProperty
0x1C000FE08: "struct __midl_frag48_t const __midl_frag48" ?__midl_frag48@@3U__midl_frag48_t@@B
0x1C001D430: NegInitKernelPackage
0x1C0007CEC: DisconnectRpcConnectionAsync
0x1C000FF40: "struct __midl_frag106_t const __midl_frag106" ?__midl_frag106@@3U__midl_frag106_t@@B
0x1C0011610: "struct __midl_frag146_t const __midl_frag146" ?__midl_frag146@@3U__midl_frag146_t@@B
0x1C00116B8: "struct __midl_frag186_t const __midl_frag186" ?__midl_frag186@@3U__midl_frag186_t@@B
0x1C0010300: "struct __midl_frag196_t const __midl_frag196" ?__midl_frag196@@3U__midl_frag196_t@@B
0x1C0005050: OpenSyncEvent
0x1C0019378: "__cdecl _imp_PsGetPermanentSiloContext" __imp_PsGetPermanentSiloContext
0x1C00127D0: "[%d] Mem alloc : 0x%p; size %lu" ??_C@_0CC@EDFNLGBD@?$FL?$CFd?$FN?5Mem?5alloc?5?5?3?50x?$CFp?$DL?5size?5?$CFlu@
0x1C001C330: LsaFreeReturnBuffer
0x1C0024170: NegGetContextToken
0x1C0019180: "__cdecl _imp_IofCompleteRequest" __imp_IofCompleteRequest
0x1C0012BF8: "KsecValidateAddress: Range not f" ??_C@_0DK@FFAEAKCO@KsecValidateAddress?3?5Range?5not?5f@
0x1C000FE50: "struct __midl_frag101_t const __midl_frag101" ?__midl_frag101@@3U__midl_frag101_t@@B
0x1C00192D0: "__cdecl _imp_KeQueryMaximumProcessorCountEx" __imp_KeQueryMaximumProcessorCountEx
0x1C00046E0: SecAllocateForcePool
0x1C0011ED8: "SspipProcessSecurityContext: Fai" ??_C@_0DF@FOIKJAJA@SspipProcessSecurityContext?3?5Fai@
0x1C001944C: "__cdecl _IMPORT_DESCRIPTOR_HAL" __IMPORT_DESCRIPTOR_HAL
0x1C0001A40: "void * __ptr64 __cdecl KsecpRemoveRpcConnection(struct _EPROCESS * __ptr64)" ?KsecpRemoveRpcConnection@@YAPEAXPEAU_EPROCESS@@@Z
0x1C0011718: "struct __midl_frag100_t const __midl_frag100" ?__midl_frag100@@3U__midl_frag100_t@@B
0x1C0010070: "struct __midl_frag140_t const __midl_frag140" ?__midl_frag140@@3U__midl_frag140_t@@B
0x1C0010170: "struct __midl_frag160_t const __midl_frag160" ?__midl_frag160@@3U__midl_frag160_t@@B
0x1C00101F0: "struct __midl_frag170_t const __midl_frag170" ?__midl_frag170@@3U__midl_frag170_t@@B
0x1C000F410: "struct __midl_frag180_t const __midl_frag180" ?__midl_frag180@@3U__midl_frag180_t@@B
0x1C0010390: "struct __midl_frag203_t const __midl_frag203" ?__midl_frag203@@3U__midl_frag203_t@@B
0x1C000DF0C: "public: long __cdecl AsyncSspiMarshaler<struct KernelAllocator>::Allocate<struct _AsyncAcquireCredentialsHandleParams>(struct _AsyncAcquireCredentialsHandleParams * __ptr64 * __ptr64,unsigned long * __ptr64) __ptr64" ??$Allocate@U_AsyncAcquireCredentialsHandleParams@@@?$AsyncSspiMarshaler@UKernelAllocator@@@@QEAAJPEAPEAU_AsyncAcquireCredentialsHandleParams@@PEAK@Z
0x1C0019088: "__cdecl _imp_wcschr" __imp_wcschr
0x1C0024170: NegMakeSignature
0x1C0024180: DecryptMessage
0x1C0010668: "minio\security\base\lsa\security" ??_C@_0DG@DBDICBIP@minio?2security?2base?2lsa?2security@
0x1C00115B8: "struct __midl_frag103_t const __midl_frag103" ?__midl_frag103@@3U__midl_frag103_t@@B
0x1C00101D0: "struct __midl_frag163_t const __midl_frag163" ?__midl_frag163@@3U__midl_frag163_t@@B
0x1C00103D0: "struct __midl_frag200_t const __midl_frag200" ?__midl_frag200@@3U__midl_frag200_t@@B
0x1C00116A4: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag181" ?__midl_frag181@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C00045A4: "__cdecl TlgWrite" _TlgWrite
0x1C00122E8: "Failed to enable process-notify " ??_C@_0CP@LFBCHILJ@Failed?5to?5enable?5process?9notify?5@
0x1C0019430: "__cdecl _guard_dispatch_icall_fptr" __guard_dispatch_icall_fptr
0x1C0013098: "KsecIoctlCopyVm: KsecFindValidVm" ??_C@_0DO@ELBEPEAC@KsecIoctlCopyVm?3?5KsecFindValidVm@
0x1C00035F8: "long __cdecl KsecCopyVirtualMemory(struct _EPROCESS * __ptr64,void const * __ptr64,struct _EPROCESS * __ptr64,void * __ptr64,unsigned __int64)" ?KsecCopyVirtualMemory@@YAJPEAU_EPROCESS@@PEBX0PEAX_K@Z
0x1C0011E58: "SspipProcessSecurityContext: Too" ??_C@_0DL@GGKLKEKF@SspipProcessSecurityContext?3?5Too@
0x1C000B824: KsecShutdown
0x1C00166F8: "unsigned long KsecDeferredPackageCount" ?KsecDeferredPackageCount@@3KA
0x1C0024010: QuerySecurityContextToken
0x1C000FEF0: "struct __midl_frag102_t const __midl_frag102" ?__midl_frag102@@3U__midl_frag102_t@@B
0x1C000F720: "struct __midl_frag122_t const __midl_frag122" ?__midl_frag122@@3U__midl_frag122_t@@B
0x1C00100B0: "struct __midl_frag142_t const __midl_frag142" ?__midl_frag142@@3U__midl_frag142_t@@B
0x1C00116D8: "struct __midl_frag201_t const __midl_frag201" ?__midl_frag201@@3U__midl_frag201_t@@B
0x1C000F380: "struct __midl_frag221_t const __midl_frag221" ?__midl_frag221@@3U__midl_frag221_t@@B
0x1C00054A0: BCryptImportKeyPair
0x1C000D16C: "long __cdecl KsecIoctlFreePool(void * __ptr64,unsigned long)" ?KsecIoctlFreePool@@YAJPEAXK@Z
0x1C0012D68: "KsecIoctlAllocVm: Bad params: 0x" ??_C@_0CO@CGDKONIO@KsecIoctlAllocVm?3?5Bad?5params?3?50x@
0x1C000FDE8: "struct _NDR64_POINTER_FORMAT const __midl_frag46" ?__midl_frag46@@3U_NDR64_POINTER_FORMAT@@B
0x1C000257C: "void __cdecl LogKsecTelemetry(void)" ?LogKsecTelemetry@@YAXXZ
0x1C0011518: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag43" ?__midl_frag43@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C001D6F0: AsyncSspiHandleIoctlIpcResponse
0x1C00190C8: "__cdecl _imp_ExAcquirePushLockSharedEx" __imp_ExAcquirePushLockSharedEx
0x1C0021850: ApplyControlToken
0x1C000DA40: BCryptSecretAgreement
0x1C0019308: "__cdecl _imp_IoCsqRemoveNextIrp" __imp_IoCsqRemoveNextIrp
0x1C00050C0: "long __cdecl TelemetryInitialize(void)" ?TelemetryInitialize@@YAJXZ
0x1C00192E0: "__cdecl _imp_KeInitializeSpinLock" __imp_KeInitializeSpinLock
0x1C00114F8: "struct __midl_frag69_t const __midl_frag69" ?__midl_frag69@@3U__midl_frag69_t@@B
0x1C0024170: NegSealMessage
0x1C001C350: KSecReferenceListEntryPaged
0x1C0012DD0: "KsecIoctlAllocVm: ObReferenceObj" ??_C@_0EE@GNEHDNAM@KsecIoctlAllocVm?3?5ObReferenceObj@
0x1C000457C: "__cdecl TlgKeywordOn" _TlgKeywordOn
0x1C001EB44: CreateRpcConnection
0x1C000DB40: SslDecryptPacket
0x1C00192F0: "__cdecl _imp_KeInitializeGuardedMutex" __imp_KeInitializeGuardedMutex
0x1C0024340: NegQueryContextAttributes
0x1C00191B8: "__cdecl _imp_ZwQueryInformationToken" __imp_ZwQueryInformationToken
0x1C0021A40: QuerySecurityPackageInfoW
0x1C001C330: FreeContextBuffer
0x1C00124D0: "Unexpected driver function: 0x%x" ??_C@_0CC@LOABCLHF@Unexpected?5driver?5function?3?50x?$CFx@
0x1C0016460: "struct _KSEC_VALID_ADDRESS_RANGE * __ptr64 __ptr64 KsecValidAddresses" ?KsecValidAddresses@@3PEAU_KSEC_VALID_ADDRESS_RANGE@@EA
0x1C0019108: "__cdecl _imp_KeWaitForSingleObject" __imp_KeWaitForSingleObject
0x1C0010410: "struct __midl_frag97_t const __midl_frag97" ?__midl_frag97@@3U__midl_frag97_t@@B
0x1C0019330: "__cdecl _imp_KeReleaseSpinLock" __imp_KeReleaseSpinLock
0x1C00193F8: "__cdecl _imp_ZwWaitForSingleObject" __imp_ZwWaitForSingleObject
0x1C00164E8: "struct _EX_PUSH_LOCK KsecValidAddressLock" ?KsecValidAddressLock@@3U_EX_PUSH_LOCK@@A
0x1C00193A0: "__cdecl _imp_PsDereferenceSiloContext" __imp_PsDereferenceSiloContext
0x1C000B5D4: SspipSslQueryCredentialsAttributes
0x1C0012240: "LoadCngExtension: IoCallDriver(I" ??_C@_0FE@MEOGKNGN@LoadCngExtension?3?5IoCallDriver?$CII@
0x1C0001A08: KsecDisconnectRpcConnection
0x1C0019170: "__cdecl _imp_ObSetSecurityObjectByPointer" __imp_ObSetSecurityObjectByPointer
0x1C0010A90: "unsigned long * KsecQuerySizes" ?KsecQuerySizes@@3PAKA
0x1C001B000: KsecddSiloContextSlot
0x1C0019070: "__cdecl _imp_RtlNtStatusToDosErrorNoTeb" __imp_RtlNtStatusToDosErrorNoTeb
0x1C0012F60: "KsecIoctlFreeVm: ObReferenceObje" ??_C@_0ED@CLKAAFDF@KsecIoctlFreeVm?3?5ObReferenceObje@
0x1C0005840: memcpy
0x1C000AFE8: SspipLogonUser
0x1C00193B0: "__cdecl _imp_PsGetCurrentThreadId" __imp_PsGetCurrentThreadId
0x1C0012458: "Failed to enable async sspi: 0x%" ??_C@_0CD@JGNEEMKP@Failed?5to?5enable?5async?5sspi?3?50x?$CF@
0x1C0016700: "__cdecl _@@_PchSym_@00@KxulyqvxgPillgKxunrmrlUhvxfirgbUyzhvUohzUhvxfirgbUwireviUlyquivUznwGEUhvxkxsCOlyq@ksecdd" __@@_PchSym_@00@KxulyqvxgPillgKxunrmrlUhvxfirgbUyzhvUohzUhvxfirgbUwireviUlyquivUznwGEUhvxkxsCOlyq@ksecdd
0x1C0021A84: DeleteUserModeContext
0x1C00227A0: KsecAsyncPcwCallback
0x1C00114B4: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag22" ?__midl_frag22@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C0019158: "__cdecl _imp_IoRegisterShutdownNotification" __imp_IoRegisterShutdownNotification
0x1C0008BC0: SspNtStatusToSecStatus
0x1C0012130: "LoadCngExtension: IoBuildDeviceI" ??_C@_0FG@HLGHJPMH@LoadCngExtension?3?5IoBuildDeviceI@
0x1C0011B20: "GetUserInfo " ??_C@_0N@BCOMJHOG@GetUserInfo?6?$AA@
0x1C0007A60: CredpUnmarshalBytes
0x1C0012528: "Failed to init security interfac" ??_C@_0CJ@LBOFNGGC@Failed?5to?5init?5security?5interfac@
0x1C0016498: KsecConnectionMutex
0x1C000F790: "struct __midl_frag79_t const __midl_frag79" ?__midl_frag79@@3U__midl_frag79_t@@B
0x1C0011DA8: " " ??_C@_1M@OHDLHOBP@?$AA?$AH?$AA?$AI?$AA?$AM?$AA?6?$AA?$AN?$AA?$AA@
0x1C000A3B0: SspiEncodeStringsAsAuthIdentity
0x1C0019168: "__cdecl _imp_IoDeleteDevice" __imp_IoDeleteDevice
0x1C000DBC0: SslEncryptPacket
0x1C0012F38: "KsecIoctlFreeVm: Bad params: 0x%" ??_C@_0CI@BLLFPOOB@KsecIoctlFreeVm?3?5Bad?5params?3?50x?$CF@
0x1C0019418: "__cdecl _imp_wcscmp" __imp_wcscmp
0x1C00166C0: "struct _KSEC_SSL_EX_FUNCTIONS * __ptr64 __ptr64 gKsecpSslExtension" ?gKsecpSslExtension@@3PEAU_KSEC_SSL_EX_FUNCTIONS@@EA
0x1C00055BD: "__cdecl _C_specific_handler" __C_specific_handler
0x1C001DFC0: SspiFreeAsyncContext
0x1C0019100: "__cdecl _imp_IofCallDriver" __imp_IofCallDriver
0x1C00021A0: MIDL_user_free
0x1C0020F0C: CredpMarshalChar
0x1C0019030: "__cdecl _imp_RpcBindingUnbind" __imp_RpcBindingUnbind
0x1C0016718: "void * __ptr64 __ptr64 KsecPagableSection" ?KsecPagableSection@@3PEAXEA
0x1C00115FC: "struct _NDR64_CONFORMANT_STRING_FORMAT const __midl_frag138" ?__midl_frag138@@3U_NDR64_CONFORMANT_STRING_FORMAT@@B
0x1C0016620: "struct _EX_EXTENSION * __ptr64 __ptr64 KsecExtensionRegistration" ?KsecExtensionRegistration@@3PEAU_EX_EXTENSION@@EA
0x1C00129B8: "[%d] Failed handle 0x%lx dup: 0x" ??_C@_0CF@BJAMNPK@?$FL?$CFd?$FN?5Failed?5handle?50x?$CFlx?5dup?3?50x@
0x1C0016340: "unsigned long KsecRpcConnectionsCountPeak" ?KsecRpcConnectionsCountPeak@@3KA
0x1C0005840: memmove
0x1C0012868: "KsecIoctlCopyPool: Bad params: 0" ??_C@_0CK@JEAALJC@KsecIoctlCopyPool?3?5Bad?5params?3?50@
0x1C0002534: "void __cdecl FlushKsecSspiTelemetry(void)" ?FlushKsecSspiTelemetry@@YAXXZ
0x1C00211DC: SecpGetUserInfo
0x1C0010240: "struct __midl_frag96_t const __midl_frag96" ?__midl_frag96@@3U__midl_frag96_t@@B
0x1C001C3E0: AddRefSiloKsecddLsaState
0x1C0016468: gKsecpMiscExtension
0x1C000C910: KSecSerializeSchannelAuthData
0x1C000CFA4: "long __cdecl KsecIoctlCopyPool(void * __ptr64,unsigned long)" ?KsecIoctlCopyPool@@YAJPEAXK@Z
0x1C00193C8: "__cdecl _imp_RtlCopyUnicodeString" __imp_RtlCopyUnicodeString
0x1C0012E18: "KsecIoctlAllocVm: process 0x%p i" ??_C@_0DL@BNFNKNEA@KsecIoctlAllocVm?3?5process?50x?$CFp?5i@
0x1C0011D60: "DisconnectRpcConnectionAsync: Rp" ??_C@_0EG@JNDLJMCJ@DisconnectRpcConnectionAsync?3?5Rp@
0x1C000560C: "__cdecl _GSHandlerCheckCommon" __GSHandlerCheckCommon
0x1C0021A00: LsaEnumerateLogonSessions
0x1C00190E8: "__cdecl _imp_IoGetDeviceObjectPointer" __imp_IoGetDeviceObjectPointer
0x1C0019040: "__cdecl _imp_RpcSsDestroyClientContext" __imp_RpcSsDestroyClientContext
0x1C0002DC0: "long __cdecl KsecIoctlRemoveProtectedProcessAddress(void * __ptr64,unsigned long)" ?KsecIoctlRemoveProtectedProcessAddress@@YAJPEAXK@Z
0x1C00106A0: "SspiInitAsyncInterface" ??_C@_0BH@PADJBKFE@SspiInitAsyncInterface?$AA@
0x1C001D5B0: IoctlIpcHandleFunctionReturn
0x1C00018C0: BCryptGetProperty
0x1C00166D8: "unsigned long KSecLsaBp" ?KSecLsaBp@@3KA
0x1C00190F8: "__cdecl _imp_IoBuildDeviceIoControlRequest" __imp_IoBuildDeviceIoControlRequest
0x1C0019370: "__cdecl _imp_PsIsHostSilo" __imp_PsIsHostSilo
0x1C00192C8: "__cdecl _imp_KeQueryActiveProcessorCountEx" __imp_KeQueryActiveProcessorCountEx
0x1C001F460: KsecRegisterExtension
0x1C000FCB0: "struct _NDR64_POINTER_FORMAT const __midl_frag30" ?__midl_frag30@@3U_NDR64_POINTER_FORMAT@@B
0x1C0001010: SspiFreeAuthIdentity
0x1C00114A4: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag15" ?__midl_frag15@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C00131E0: "Error printing message " ??_C@_0BI@NMGKDACI@Error?5printing?5message?6?$AA@
0x1C0010AE8: "unsigned long * KsecPackageTags" ?KsecPackageTags@@3PAKA
0x1C0024170: NegVerifySignature
0x1C0012678: "KSec: Connection failed, postpon" ??_C@_0CF@IDBLOHPG@KSec?3?5Connection?5failed?0?5postpon@
0x1C0019148: "__cdecl _imp_PsStartSiloMonitor" __imp_PsStartSiloMonitor
0x1C0001D60: BCryptVerifySignature
0x1C0016628: KsecSystemProcessHandle
0x1C0011FE8: "SspipProcessSecurityContext: Fai" ??_C@_0DF@HNEOCPHP@SspipProcessSecurityContext?3?5Fai@
0x1C0019190: "__cdecl _imp_ObfReferenceObject" __imp_ObfReferenceObject
0x1C0011598: "struct __midl_frag91_t const __midl_frag91" ?__midl_frag91@@3U__midl_frag91_t@@B
0x1C0001BA0: MapSecurityError
0x1C00130E0: "KsecIoctlCopyVm: KsecCopyVirtual" ??_C@_0EN@HDPIECIM@KsecIoctlCopyVm?3?5KsecCopyVirtual@
0x1C00166E8: DebugInfoLevel
0x1C0019238: "__cdecl _imp_PsGetThreadProcessId" __imp_PsGetThreadProcessId
0x1C00129E0: "[%d] Handle dup : 0x%lx -> 0x%lx" ??_C@_0CC@GFHPIJBJ@?$FL?$CFd?$FN?5Handle?5dup?5?3?50x?$CFlx?5?9?$DO?50x?$CFlx@
0x1C0011C80: "GetBinding scRet = %x " ??_C@_0BH@PADPILGD@GetBinding?5scRet?5?$DN?5?$CFx?6?$AA@
0x1C00219E0: EnumerateSecurityPackagesW
0x1C00131F8: "default" ??_C@_1BA@HANLFFFG@?$AAd?$AAe?$AAf?$AAa?$AAu?$AAl?$AAt?$AA?$AA@
0x1C00126A0: "KsecFastIoDeviceControl: Control" ??_C@_0EB@EGEBIKIC@KsecFastIoDeviceControl?3?5Control@
0x1C000DDF0: SslOpenProvider
0x1C0001300: KsecRemoveValidAddressCommon
0x1C0019318: "__cdecl _imp_IoCsqInsertIrpEx" __imp_IoCsqInsertIrpEx
0x1C0019200: "__cdecl _imp_ExReleaseFastMutex" __imp_ExReleaseFastMutex
0x1C0008810: "int __cdecl SspiHelperIsEncodedNullUserName(unsigned short const * __ptr64)" ?SspiHelperIsEncodedNullUserName@@YAHPEBG@Z
0x1C0013278: "Exception %d while accessing %p " ??_C@_0CI@EHGMBOMJ@Exception?5?$CFd?5while?5accessing?5?$CFp?5@
0x1C00031C0: "long __cdecl KsecInsertValidVm(void * __ptr64,struct _EPROCESS * __ptr64,unsigned char * __ptr64,unsigned long,unsigned long)" ?KsecInsertValidVm@@YAJPEAXPEAU_EPROCESS@@PEAEKK@Z
0x1C000D540: BCryptDecrypt
0x1C0011E98: "SspipProcessSecurityContext: Nul" ??_C@_0DJ@BMKNFKMM@SspipProcessSecurityContext?3?5Nul@
0x1C0013350: "Failed to initialize ksecdd perf" ??_C@_0DK@KFFHEFLL@Failed?5to?5initialize?5ksecdd?5perf@
0x1C00122A0: "The driver failed to install the" ??_C@_0EG@JHMKGKPM@The?5driver?5failed?5to?5install?5the@
0x1C000AC70: SspiValidateAuthIdentity
0x1C000D850: BCryptExportKey
0x1C0007E50: "int __cdecl LocalCredIsMarshaledCredentialW(unsigned short const * __ptr64)" ?LocalCredIsMarshaledCredentialW@@YAHPEBG@Z
0x1C0012FA8: "KsecIoctlFreeVm: KsecRemoveValid" ??_C@_0DO@KGAEENIA@KsecIoctlFreeVm?3?5KsecRemoveValid@
0x1C0019358: "__cdecl _imp_EtwSetInformation" __imp_EtwSetInformation
0x1C0019160: "__cdecl _imp_ExUnregisterExtension" __imp_ExUnregisterExtension
0x1C00125D0: "Invalid Credential Format: 0x%x " ??_C@_0FH@BBPJCNGF@Invalid?5Credential?5Format?3?50x?$CFx?5@
0x1C0016190: "struct _SECPKG_KERNEL_FUNCTION_TABLE NegFunctionTable" ?NegFunctionTable@@3U_SECPKG_KERNEL_FUNCTION_TABLE@@A
0x1C0016350: "struct _KSEC_RPC_CONNECTION * __ptr64 __ptr64 KsecRpcConnections" ?KsecRpcConnections@@3PEAU_KSEC_RPC_CONNECTION@@EA
0x1C001D400: NegCompleteToken
0x1C00193E0: "__cdecl _imp_ExAllocatePoolWithTag" __imp_ExAllocatePoolWithTag
0x1C0003CC0: SspipProcessSecurityContext
0x1C0012750: "KsecIoctlAllocPool: Failed pool " ??_C@_0EA@BCGBMANM@KsecIoctlAllocPool?3?5Failed?5pool?5@
0x1C0001D10: BCryptDuplicateKey
0x1C000FCE0: "struct _NDR64_POINTER_FORMAT const __midl_frag31" ?__midl_frag31@@3U_NDR64_POINTER_FORMAT@@B
0x1C0011580: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag74" ?__midl_frag74@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C0007BA4: CredpUnmarshalChar
0x1C00191D0: "__cdecl _imp_MmUserProbeAddress" __imp_MmUserProbeAddress
0x1C0019258: "__cdecl _imp_ZwQueryVirtualMemory" __imp_ZwQueryVirtualMemory
0x1C00218B4: DeleteSecurityContextInternal
0x1C000E4F0: TBValidateBindingType
0x1C000BA10: SecLookupWellKnownSid
0x1C000CCF4: "long __cdecl KsecIoctlAllocPool(void * __ptr64,unsigned long,void * __ptr64,unsigned long,unsigned long * __ptr64)" ?KsecIoctlAllocPool@@YAJPEAXK0KPEAK@Z
0x1C0011BB0: "EnumLogonSession " ??_C@_0BC@DBHJPHDM@EnumLogonSession?6?$AA@
0x1C000FED0: "struct __midl_frag90_t const __midl_frag90" ?__midl_frag90@@3U__midl_frag90_t@@B
0x1C0010280: "struct _NDR64_POINTER_FORMAT const __midl_frag195" ?__midl_frag195@@3U_NDR64_POINTER_FORMAT@@B
0x1C0019360: "__cdecl _imp_EtwWriteTransfer" __imp_EtwWriteTransfer
0x1C0008700: "int __cdecl SspiHelperEqualPackedCredentials(void * __ptr64,void * __ptr64)" ?SspiHelperEqualPackedCredentials@@YAHPEAX0@Z
0x1C0012318: "Failed to load CNG extension: 0x" ??_C@_0CE@BFLJMAAB@Failed?5to?5load?5CNG?5extension?3?50x@
0x1C00190A0: "__cdecl _imp_PsIsCurrentThreadInServerSilo" __imp_PsIsCurrentThreadInServerSilo
0x1C00191A8: "__cdecl _imp_ZwOpenThreadTokenEx" __imp_ZwOpenThreadTokenEx
0x1C0012EF0: "KsecIoctlAllocVm: KsecInsertVali" ??_C@_0EB@HJLNMFHM@KsecIoctlAllocVm?3?5KsecInsertVali@
0x1C0010700: "SspipProcessSecurityContext: Ext" ??_C@_0EI@CPKFDOPP@SspipProcessSecurityContext?3?5Ext@
0x1C0016344: "unsigned long KsecRpcConnectionsCount" ?KsecRpcConnectionsCount@@3KA
0x1C0011BE8: "GetLogonSessionData " ??_C@_0BF@LDPKJNA@GetLogonSessionData?6?$AA@
0x1C0005674: "__cdecl _GSHandlerCheck_SEH" __GSHandlerCheck_SEH
0x1C0003B80: "void __cdecl RecordSyncPerfCounters(enum CallType,__int64)" ?RecordSyncPerfCounters@@YAXW4CallType@@_J@Z
0x1C00193C0: "__cdecl _imp___C_specific_handler" __imp___C_specific_handler
0x1C0012EA0: "KsecIoctlAllocVm: ZwAllocateVirt" ??_C@_0EC@LPNFCNLN@KsecIoctlAllocVm?3?5ZwAllocateVirt@
0x1C0021A60: SetCredentialsAttributesW
0x1C00127F8: "KsecIoctlFreePool: Bad params: 0" ??_C@_0CK@PIHKPFDG@KsecIoctlFreePool?3?5Bad?5params?3?50@
0x1C001EBE4: SecpGetRpcBinding
0x1C0005128: "long __cdecl LoadCngExtension(void)" ?LoadCngExtension@@YAJXZ
0x1C00190C0: "__cdecl _imp_KeLeaveCriticalRegion" __imp_KeLeaveCriticalRegion
0x1C0012FF0: "KsecIoctlFreeVm: ZwFreeVirtualMe" ??_C@_0EA@IFOBGFFI@KsecIoctlFreeVm?3?5ZwFreeVirtualMe@
0x1C000C9D0: KsecLocatePackageEx
0x1C00114E0: "unsigned char const __midl_frag39" ?__midl_frag39@@3EB
0x1C0011B00: "AddCredentials API Ret = %x " ??_C@_0BN@OAOJABHC@AddCredentials?5API?5Ret?5?$DN?5?$CFx?6?$AA@
0x1C00114B1: "unsigned char const __midl_frag29" ?__midl_frag29@@3EB
0x1C001E930: LsaDeregisterLogonProcess
0x1C00055E8: "__cdecl _GSHandlerCheck" __GSHandlerCheck
0x1C00030AC: KsecRemoveValidVm
0x1C0004DB8: CreateClient
0x1C0016358: KsecSystemProcess
0x1C0016478: KsecddGlobalExtenderPackage
0x1C0019320: "__cdecl _imp_NtFreeVirtualMemory" __imp_NtFreeVirtualMemory
0x1C0016458: "unsigned long KsecValidAddressesSize" ?KsecValidAddressesSize@@3KA
0x1C000D630: BCryptDeriveKeyCapi
0x1C0012BC0: "Range deleted : 0x%p <-> 0x%p;" ??_C@_0DE@KDMCANGO@Range?5deleted?5?5?5?3?50x?$CFp?5?$DM?9?$DO?50x?$CFp?$DL@
0x1C0011DC8: "@@D " ??_C@_1BC@DHBDIJEN@?$AA?$EA?$AA?$EA?$AAD?$AA?$AH?$AA?$AI?$AA?$AM?$AA?6?$AA?$AN?$AA?$AA@
0x1C0019048: "__cdecl _imp_RpcBindingCreateW" __imp_RpcBindingCreateW
0x1C0001CD0: BCryptDestroyKey
0x1C0019298: "__cdecl _imp_ExpInterlockedPopEntrySList" __imp_ExpInterlockedPopEntrySList
0x1C0013310: "Failed to initialize the rpc-via" ??_C@_0EA@BBKPNOGA@Failed?5to?5initialize?5the?5rpc?9via@
0x1C00191F0: "__cdecl _imp_SeExports" __imp_SeExports
0x1C0011BC8: "EnumLogonSession scRet = %x " ??_C@_0BN@NEDCGHMJ@EnumLogonSession?5scRet?5?$DN?5?$CFx?6?$AA@
0x1C0002E60: "long __cdecl KsecIoctlAllocVm(void * __ptr64,unsigned long,void * __ptr64,unsigned long,unsigned long * __ptr64)" ?KsecIoctlAllocVm@@YAJPEAXK0KPEAK@Z
0x1C0012C80: "Range validated : 0x%p <-> 0x%p;" ??_C@_0EA@GCKODHCI@Range?5validated?5?3?50x?$CFp?5?$DM?9?$DO?50x?$CFp?$DL@
0x1C0019060: msrpc_NULL_THUNK_DATA
0x1C00166B8: "struct _KSEC_DEVICE_CONTROL_EX_FUNCTIONS * __ptr64 __ptr64 gKsecpDeviceControlExtension" ?gKsecpDeviceControlExtension@@3PEAU_KSEC_DEVICE_CONTROL_EX_FUNCTIONS@@EA
0x1C0010560: "struct _PCW_COUNTER_DESCRIPTOR const * const `KsecRegisterKsecAsyncPerfCounterSet'::`2'::Descriptors" ?Descriptors@?1??KsecRegisterKsecAsyncPerfCounterSet@@9@4QBU_PCW_COUNTER_DESCRIPTOR@@B
0x1C000DCF0: SslGetServerIdentity
0x1C00114E8: "struct __midl_frag38_t const __midl_frag38" ?__midl_frag38@@3U__midl_frag38_t@@B
0x1C0012B00: "KsecRemoveValidAddressCommon: Re" ??_C@_0EA@FFMIMPIO@KsecRemoveValidAddressCommon?3?5Re@
0x1C00240C0: QueryContextAttributesW
0x1C000C6EC: "long __cdecl KsecAdd2Mult(unsigned long,unsigned long,unsigned long,unsigned long * __ptr64)" ?KsecAdd2Mult@@YAJKKKPEAK@Z
0x1C00133F0: "ECCPUBLICBLOB" ??_C@_1BM@HFKJNGID@?$AAE?$AAC?$AAC?$AAP?$AAU?$AAB?$AAL?$AAI?$AAC?$AAB?$AAL?$AAO?$AAB?$AA?$AA@
0x1C0001B30: BCryptGenRandom
0x1C00190D0: "__cdecl _imp_ExReleasePushLockSharedEx" __imp_ExReleasePushLockSharedEx
0x1C00192F8: "__cdecl _imp_IoCsqInitializeEx" __imp_IoCsqInitializeEx
0x1C001D410: NegDeleteKernelContext
0x1C001C69C: CallRpcSPM
0x1C0016720: "unsigned long DebugDpfltrId" ?DebugDpfltrId@@3KA
0x1C001E470: SspiGetAsyncCallStatus
0x1C00132D0: "PsAllocateMonitorContextServerSi" ??_C@_0DB@HFLEBJDF@PsAllocateMonitorContextServerSi@
0x1C0010658: "%s - %s " ??_C@_08HNLFNLDB@?$CFs?5?9?5?$CFs?6?$AA@
0x1C00190E0: "__cdecl _imp_PsGetProcessSecurityPort" __imp_PsGetProcessSecurityPort
0x1C000DD40: SslImportKey
0x1C001C7C4: InitUserModeContext
0x1C0010640: "\Device\CNG" ??_C@_1BI@HICLDAFN@?$AA?2?$AAD?$AAe?$AAv?$AAi?$AAc?$AAe?$AA?2?$AAC?$AAN?$AAG?$AA?$AA@
0x1C0016730: "long KsecPageModeCounter" ?KsecPageModeCounter@@3JA
0x1C00192E8: "__cdecl _imp_ExDeleteLookasideListEx" __imp_ExDeleteLookasideListEx
0x1C00245A4: LsapDebugOut
0x1C0007C10: "void __cdecl DisconnectRpcConnectionCallback(struct _RPC_ASYNC_STATE * __ptr64,void * __ptr64,enum _RPC_ASYNC_EVENT)" ?DisconnectRpcConnectionCallback@@YAXPEAU_RPC_ASYNC_STATE@@PEAXW4_RPC_ASYNC_EVENT@@@Z
0x1C0023008: "__cdecl VerifyTokenBinding" _VerifyTokenBinding
0x1C0020FCC: CredpMarshalSize
0x1C0012420: "Failed to initialize the rpc-via" ??_C@_0DH@IFNHPGEF@Failed?5to?5initialize?5the?5rpc?9via@
0x1C0011C00: "GetLogonSessionData scRet = %x " ??_C@_0CA@OHEFNFGK@GetLogonSessionData?5scRet?5?$DN?5?$CFx?6?$AA@
0x1C001C480: AcquireCredentialsHandleW
0x1C0019398: "__cdecl _imp_PsReferenceSiloContext" __imp_PsReferenceSiloContext
0x1C001157C: "unsigned char const __midl_frag78" ?__midl_frag78@@3EB
0x1C0001BC0: BCryptGenerateSymmetricKey
0x1C0011587: "unsigned char const __midl_frag88" ?__midl_frag88@@3EB
0x1C0020AD0: CredMarshalTargetInfo
0x1C000FEA0: "struct _NDR64_POINTER_FORMAT const __midl_frag93" ?__midl_frag93@@3U_NDR64_POINTER_FORMAT@@B
0x1C001C010: InitializeSecurityContextW
0x1C00193E8: "__cdecl _imp_strncpy_s" __imp_strncpy_s
0x1C0019028: "__cdecl _imp_RpcBindingFree" __imp_RpcBindingFree
0x1C00192D8: "__cdecl _imp_KeGetCurrentProcessorNumberEx" __imp_KeGetCurrentProcessorNumberEx
0x1C0022740: AcquireCredentialsHandleUnMarshalResponse
0x1C000C760: KSecRegisterSecurityProvider
0x1C0020E40: CredpMarshalBytes
0x1C0012480: "Failed to initialize ksec teleme" ??_C@_0CL@CHFCPKDJ@Failed?5to?5initialize?5ksec?5teleme@
0x1C0011E20: "SspipProcessSecurityContext: Nul" ??_C@_0DI@INECCDMN@SspipProcessSecurityContext?3?5Nul@
0x1C0008038: "unsigned long __cdecl LocalCredUnmarshalCredentialW(unsigned short const * __ptr64,enum _CRED_MARSHAL_TYPE * __ptr64,void * __ptr64 * __ptr64)" ?LocalCredUnmarshalCredentialW@@YAKPEBGPEAW4_CRED_MARSHAL_TYPE@@PEAPEAX@Z
0x1C0019198: "__cdecl _imp_IoIs32bitProcess" __imp_IoIs32bitProcess
0x1C0021A20: QueryCredentialsAttributesW
0x1C0012CC0: "KsecIoctlClientCallback: Bad par" ??_C@_0DF@OCAOILAO@KsecIoctlClientCallback?3?5Bad?5par@
0x1C0019090: "__cdecl _imp_RtlEqualUnicodeString" __imp_RtlEqualUnicodeString
0x1C0003A50: "bool __cdecl ShouldFlushKsecSspiTelemetry(void)" ?ShouldFlushKsecSspiTelemetry@@YA_NXZ
0x1C00107C0: "[%d] Mem free : 0x%p " ??_C@_0BJ@KMMACEPB@?$FL?$CFd?$FN?5Mem?5?5free?5?5?5?3?50x?$CFp?6?$AA@
0x1C000479C: SspipNegQueryContextAttributes
0x1C001163C: "struct _NDR64_CONFORMANT_STRING_FORMAT const __midl_frag161" ?__midl_frag161@@3U_NDR64_CONFORMANT_STRING_FORMAT@@B
0x1C0009260: SspiCopyAuthIdentity
0x1C00228EC: KsecPerfCountersCleanupSilo
0x1C00191A0: "__cdecl _imp_ZwFreeVirtualMemory" __imp_ZwFreeVirtualMemory
0x1C0001C70: BCryptKeyDerivation
0x1C0019248: "__cdecl _imp_MmHighestUserAddress" __imp_MmHighestUserAddress
0x1C0001DC0: BCryptOpenAlgorithmProvider
0x1C00192B8: "__cdecl _imp_PcwAddInstance" __imp_PcwAddInstance
0x1C00243E0: KSecCreateContextList
0x1C0019240: "__cdecl _imp_RtlIntegerToUnicodeString" __imp_RtlIntegerToUnicodeString
0x1C0011638: "struct _NDR64_CONFORMANT_STRING_FORMAT const __midl_frag162" ?__midl_frag162@@3U_NDR64_CONFORMANT_STRING_FORMAT@@B
0x1C0016470: KsecddGlobalExtenderPackageId
0x1C00017D0: BCryptCreateHash
0x1C0012B88: "Not removing readonly address at" ??_C@_0DE@OLFPCNOK@Not?5removing?5readonly?5address?5at@
0x1C0013410: WPP_05dca95730d23d1198ac06f53c1168a2_Traceguids
0x1C00223C0: SspiAcquireCredentialsHandleAsyncW
0x1C0010538: "lsasspirpc" ??_C@_1BG@DNMLNOKC@?$AAl?$AAs?$AAa?$AAs?$AAs?$AAp?$AAi?$AAr?$AAp?$AAc?$AA?$AA@
0x1C0027010: GsDriverEntry
0x1C0019428: "__cdecl _guard_check_icall_fptr" __guard_check_icall_fptr
0x1C0011FA8: "SspipProcessSecurityContext: Rep" ??_C@_0DM@NDJEDGCB@SspipProcessSecurityContext?3?5Rep@
0x1C001DBB0: ProcessSecurityContextUnMarshalResponse
0x1C00114B8: "unsigned char const __midl_frag27" ?__midl_frag27@@3EB
0x1C0011586: "unsigned char const __midl_frag115" ?__midl_frag115@@3EB
0x1C0011588: "unsigned char const __midl_frag87" ?__midl_frag87@@3EB
0x1C0004660: KsecGetCurrentAsyncPerfCounterSet
0x1C0024520: VerifySignature
0x1C0023628: TBPopulateTokenBindingHash
0x1C0016648: KsecPageModeMutex
0x1C00114AC: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag19" ?__midl_frag19@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C000F910: "struct __midl_frag73_t const __midl_frag73" ?__midl_frag73@@3U__midl_frag73_t@@B
0x1C000D8B0: BCryptFinalizeKeyPair
0x1C0011691: "unsigned char const __midl_frag214" ?__midl_frag214@@3EB
0x1C0019260: "__cdecl _imp_ObReferenceObjectByHandle" __imp_ObReferenceObjectByHandle
0x1C00021C4: SspirCallRpc
0x1C0012190: "LoadCngExtension: IoCallDriver(I" ??_C@_0EK@DDEDFJLA@LoadCngExtension?3?5IoCallDriver?$CII@
0x1C000B394: SspipLookupAccountSid
0x1C0019380: "__cdecl _imp_PsGetHostSilo" __imp_PsGetHostSilo
0x1C00235F8: TBFreeBuffer
0x1C0011CA8: "FindPackage scRet = %x " ??_C@_0BI@GBHJBJBF@FindPackage?5scRet?5?$DN?5?$CFx?6?$AA@
0x1C0019128: "__cdecl _imp_ExRegisterExtension" __imp_ExRegisterExtension
0x1C000CE8C: "long __cdecl KsecIoctlClientCallback(void * __ptr64,unsigned long,void * __ptr64,unsigned long,unsigned long * __ptr64)" ?KsecIoctlClientCallback@@YAJPEAXK0KPEAK@Z
0x1C000FE20: "struct __midl_frag62_t const __midl_frag62" ?__midl_frag62@@3U__midl_frag62_t@@B
0x1C0011690: "unsigned char const __midl_frag217" ?__midl_frag217@@3EB
0x1C001EA00: LsaRegisterLogonProcess
0x1C0013130: "KsecIoctlInsertProtectedProcessA" ??_C@_0DP@FPCOLMME@KsecIoctlInsertProtectedProcessA@
0x1C00192B0: "__cdecl _imp_PcwRegister" __imp_PcwRegister
0x1C001D420: NegInitKernelContext
0x1C0012340: "The driver failed the register f" ??_C@_0DN@BAILIIHB@The?5driver?5failed?5the?5register?5f@
0x1C000E448: TBCopyKeyTypes
0x1C0019368: "__cdecl _imp_PsCreateSiloContext" __imp_PsCreateSiloContext
0x1C0016328: "unsigned long KsecValidAddressesCountPeak" ?KsecValidAddressesCountPeak@@3KA
0x1C0022BF0: KsecdTerminateSiloNotification
0x1C000FFF8: "struct _NDR64_POINTER_FORMAT const __midl_frag145" ?__midl_frag145@@3U_NDR64_POINTER_FORMAT@@B
0x1C000FD10: "struct __midl_frag40_t const __midl_frag40" ?__midl_frag40@@3U__midl_frag40_t@@B
0x1C0001790: BCryptHashData
0x1C0011AE0: " PackageName = %wZ " ??_C@_0BJ@IIKNLDPO@?5?5?5?5PackageName?5?$DN?5?$CFwZ?5?5?6?$AA@
0x1C0010490: "Founding pending calls, respondi" ??_C@_0DL@FGBPJOL@Founding?5pending?5calls?0?5respondi@
0x1C000AEBC: SspipApplyControlToken
0x1C000FD20: "struct __midl_frag37_t const __midl_frag37" ?__midl_frag37@@3U__midl_frag37_t@@B
0x1C000FBA0: "struct __midl_frag2_t const __midl_frag2" ?__midl_frag2@@3U__midl_frag2_t@@B
0x1C0011693: "unsigned char const __midl_frag210" ?__midl_frag210@@3EB
0x1C00116E4: "unsigned char const __midl_frag208" ?__midl_frag208@@3EB
0x1C0010008: "struct _NDR64_POINTER_FORMAT const __midl_frag143" ?__midl_frag143@@3U_NDR64_POINTER_FORMAT@@B
0x1C00114C0: "struct __midl_frag26_t const __midl_frag26" ?__midl_frag26@@3U__midl_frag26_t@@B
0x1C000F060: "struct _MIDL_STUBLESS_PROXY_INFO const sspirpc_ProxyInfo" ?sspirpc_ProxyInfo@@3U_MIDL_STUBLESS_PROXY_INFO@@B
0x1C0016454: "unsigned long KsecTotalRetriedValidAddressRemovals" ?KsecTotalRetriedValidAddressRemovals@@3KA
0x1C001F154: SecpFindPackage
0x1C0019268: PsProcessType
0x1C00190D8: "__cdecl _imp_ExTryConvertPushLockSharedToExclusiveEx" __imp_ExTryConvertPushLockSharedToExclusiveEx
0x1C0016228: WPP_GLOBAL_Control
0x1C00120E0: "LoadCngExtension: IoCallDriver(I" ??_C@_0EN@BJIPGPAA@LoadCngExtension?3?5IoCallDriver?$CII@
0x1C0011F10: "SspipProcessSecurityContext: Out" ??_C@_0EJ@OLIIIEMH@SspipProcessSecurityContext?3?5Out@
0x1C000DD90: SslLookupCipherSuiteInfo
0x1C0011DDC: "" ??_C@_11LOCGONAA@?$AA?$AA@
0x1C001C440: "__cdecl TlgEnableCallback" _TlgEnableCallback
0x1C0010118: "struct _NDR64_POINTER_FORMAT const __midl_frag158" ?__midl_frag158@@3U_NDR64_POINTER_FORMAT@@B
0x1C0021604: SecpQueryPackageInfo
0x1C0011692: "unsigned char const __midl_frag212" ?__midl_frag212@@3EB
0x1C00166E0: SecpLsaInprocDispatch
0x1C00191C0: "__cdecl _imp_ZwDuplicateToken" __imp_ZwDuplicateToken
0x1C00222E8: RecordAsyncCallPerfCounts
0x1C000E39C: WPP_SF_D
0x1C000E39C: WPP_SF_d
0x1C0010550: "KSEC" ??_C@_04GCEDJCBL@KSEC?$AA@
0x1C00032D0: KsecFastIoDeviceControl
0x1C0019038: "__cdecl _imp_I_RpcExceptionFilter" __imp_I_RpcExceptionFilter
0x1C00114A0: "unsigned char const __midl_frag16" ?__midl_frag16@@3EB
0x1C000B990: SecLookupAccountName
0x1C00191D0: MmUserProbeAddress
0x1C0010128: "struct _NDR64_POINTER_FORMAT const __midl_frag156" ?__midl_frag156@@3U_NDR64_POINTER_FORMAT@@B
0x1C0011694: "unsigned char const __midl_frag204" ?__midl_frag204@@3EB
0x1C0005580: "__cdecl _security_check_cookie" __security_check_cookie
0x1C0011B90: "QueryPackageInfo scRet = %x " ??_C@_0BN@EABPHIFP@QueryPackageInfo?5scRet?5?$DN?5?$CFx?6?$AA@
0x1C000D4D8: KsecRemoveValidAddress
0x1C000CCE0: GetSecurityUserInfo
0x1C00036F0: SspipDeleteSecurityContext
0x1C001E3B0: DeleteSecurityContextMarshalParams
0x1C001C3FC: KSecInsertListEntryPaged
0x1C0016448: "struct _KSEC_VALID_VM * __ptr64 __ptr64 KsecValidVm" ?KsecValidVm@@3PEAU_KSEC_VALID_VM@@EA
0x1C0011520: "struct __midl_frag50_t const __midl_frag50" ?__midl_frag50@@3U__midl_frag50_t@@B
0x1C00243A0: RevertSecurityContext
0x1C00210EC: SecpEnumeratePackages
0x1C0019338: "__cdecl _imp_ExInterlockedInsertTailList" __imp_ExInterlockedInsertTailList
0x1C0001840: BCryptFinishHash
0x1C0019438: "__cdecl _IMPORT_DESCRIPTOR_ntoskrnl" __IMPORT_DESCRIPTOR_ntoskrnl
0x1C0004D64: SspirConnectRpc
0x1C00214BC: SecpLookupWellKnownSid
0x1C00224E0: SspiReinitAsyncContext
0x1C0011A97: "__cdecl TraceLoggingMetadataEnd" _TraceLoggingMetadataEnd
0x1C0011585: "unsigned char const __midl_frag118" ?__midl_frag118@@3EB
0x1C0011C98: "FindPackage " ??_C@_0N@ICJIIABC@FindPackage?6?$AA@
0x1C000FC30: "struct __midl_frag36_t const __midl_frag36" ?__midl_frag36@@3U__midl_frag36_t@@B
0x1C0019460: "__cdecl _IMPORT_DESCRIPTOR_msrpc" __IMPORT_DESCRIPTOR_msrpc
0x1C001C250: LsaGetLogonSessionData
0x1C00116D4: "unsigned char const __midl_frag202" ?__midl_frag202@@3EB
0x1C00087AC: "unsigned char __cdecl SspiHelperEqualStrings(unsigned short const * __ptr64,unsigned short const * __ptr64,unsigned char)" ?SspiHelperEqualStrings@@YAEPEBG0E@Z
0x1C0001920: KSecInsertListEntry
0x1C0019098: "__cdecl _imp_KeDelayExecutionThread" __imp_KeDelayExecutionThread
0x1C0012C38: "KsecValidateAddress: Range not w" ??_C@_0DN@MBGAIJC@KsecValidateAddress?3?5Range?5not?5w@
0x1C00164E0: "struct _EX_PUSH_LOCK KsecRpcLock" ?KsecRpcLock@@3U_EX_PUSH_LOCK@@A
0x1C0011508: "unsigned char const __midl_frag65" ?__midl_frag65@@3EB
0x1C0022D40: TokenBindingVerifyMessage
0x1C001149C: "struct _NDR64_CONFORMANT_STRING_FORMAT const __midl_frag4" ?__midl_frag4@@3U_NDR64_CONFORMANT_STRING_FORMAT@@B
0x1C0019280: "__cdecl _imp__vsnprintf_s" __imp__vsnprintf_s
0x1C001ED24: TraceLoggingRegisterEx
0x1C000D368: "int __cdecl KsecValidateAddress(void * __ptr64,unsigned long,int)" ?KsecValidateAddress@@YAHPEAXKH@Z
0x1C0019400: "__cdecl _imp_ZwOpenEvent" __imp_ZwOpenEvent
0x1C0016040: "struct _SECURITY_FUNCTION_TABLE_W SecTable" ?SecTable@@3U_SECURITY_FUNCTION_TABLE_W@@A
0x1C000B870: SecFreeCommon
0x1C000C950: KSecValidateBuffer
0x1C0011AC8: " Principal = %wZ " ??_C@_0BG@DFDMDBML@?5?5?5?5Principal?5?$DN?5?$CFwZ?5?6?$AA@
0x1C000F980: "struct __midl_frag42_t const __midl_frag42" ?__midl_frag42@@3U__midl_frag42_t@@B
0x1C0004808: SspirDisconnectRpc
0x1C001D440: SspiDeleteSecurityContextAsync
0x1C0019130: "__cdecl _imp_PsSetCreateProcessNotifyRoutineEx2" __imp_PsSetCreateProcessNotifyRoutineEx2
0x1C0012A88: "KsecInsertValidAddress: Queried " ??_C@_0DK@DCOICOJD@KsecInsertValidAddress?3?5Queried?5@
0x1C0022290: SecMakeSPNEx
0x1C0024490: MakeSignature
0x1C0012980: "KsecIoctlDupLsaHandle: Output bu" ??_C@_0DF@DLLGMNEI@KsecIoctlDupLsaHandle?3?5Output?5bu@
0x1C001E8F4: DisconnectRpcConnection
0x1C0019140: "__cdecl _imp_PsGetSiloMonitorContextSlot" __imp_PsGetSiloMonitorContextSlot
0x1C0001150: SecFree
0x1C0022CE0: TokenBindingGetKeyTypesServer
0x1C001C090: SecMakeSPNEx2
0x1C0011570: "struct __midl_frag60_t const __midl_frag60" ?__midl_frag60@@3U__midl_frag60_t@@B
0x1C0020750: LsaLogonUser
0x1C0028000: "__cdecl _guard_fids_table" __guard_fids_table
0x1C0011728: "\Device\KsecDD" ??_C@_1BO@BAEMGIAB@?$AA?2?$AAD?$AAe?$AAv?$AAi?$AAc?$AAe?$AA?2?$AAK?$AAs?$AAe?$AAc?$AAD?$AAD?$AA?$AA@
0x1C0022240: SecMakeSPN
0x1C0011700: "unsigned char const __midl_frag229" ?__midl_frag229@@3EB
0x1C00015E0: KsecInsertValidAddress
0x1C000F0C0: "__cdecl load_config_used" _load_config_used
0x1C0001550: SecAllocate
0x1C001F3B8: KsecPerfCountersInitGlobal
0x1C000FB20: "struct __midl_frag17_t const __midl_frag17" ?__midl_frag17@@3U__midl_frag17_t@@B
0x1C00193D0: "__cdecl _imp_RtlCopySid" __imp_RtlCopySid
0x1C0011701: "unsigned char const __midl_frag228" ?__midl_frag228@@3EB
0x1C00191B0: "__cdecl _imp_ZwOpenProcessTokenEx" __imp_ZwOpenProcessTokenEx
0x1C0012B40: "KsecRemoveValidAddressCommon: No" ??_C@_0EC@JPGJOPNK@KsecRemoveValidAddressCommon?3?5No@
0x1C0004EB0: KsecCreateRpcConnection
0x1C0002374: IsOkayToExecRpc
0x1C0024210: EncryptMessage
0x1C00023E4: IsOkayToExec
0x1C00193F0: "__cdecl _imp_ZwClose" __imp_ZwClose
0x1C0016360: "struct _FAST_IO_DISPATCH KsecFastIoDispatch" ?KsecFastIoDispatch@@3U_FAST_IO_DISPATCH@@A
0x1C000DC50: SslExportKey
0x1C000D810: BCryptEnumProviders
0x1C00190B8: "__cdecl _imp_ExReleasePushLockExclusiveEx" __imp_ExReleasePushLockExclusiveEx
0x1C0003A90: IoctlIpcPrintNoop
0x1C00115E5: "unsigned char const __midl_frag132" ?__midl_frag132@@3EB
0x1C00115E8: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag129" ?__midl_frag129@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C00193B8: "__cdecl _imp_PsGetProcessId" __imp_PsGetProcessId
0x1C0019050: "__cdecl _imp_Ndr64AsyncClientCall" __imp_Ndr64AsyncClientCall
0x1C00114CC: "unsigned char const __midl_frag34" ?__midl_frag34@@3EB
0x1C000DE24: "public: long __cdecl AsyncSspiMarshaler<struct KernelAllocator>::CopyBuffer<unsigned short>(unsigned short * __ptr64 * __ptr64,unsigned short * __ptr64,unsigned long) __ptr64" ??$CopyBuffer@G@?$AsyncSspiMarshaler@UKernelAllocator@@@@QEAAJPEAPEAGPEAGK@Z
0x1C0016140: KspKernelFunctions
0x1C0011509: "unsigned char const __midl_frag64" ?__midl_frag64@@3EB
0x1C001150B: "unsigned char const __midl_frag54" ?__midl_frag54@@3EB
0x1C0011499: "unsigned char const __midl_frag7" ?__midl_frag7@@3EB
0x1C001149A: "unsigned char const __midl_frag5" ?__midl_frag5@@3EB
0x1C0008894: "long __cdecl SspiUnmarshalAuthIdentityInternal(unsigned long,char * __ptr64,void * __ptr64 * __ptr64,unsigned long * __ptr64)" ?SspiUnmarshalAuthIdentityInternal@@YAJKPEADPEAPEAXPEAK@Z
0x1C0012558: "Assigning package %ws index %d " ??_C@_0CA@PLDIOOBE@Assigning?5package?5?$CFws?5index?5?$CFd?6?$AA@
0x1C0007E9C: "unsigned long __cdecl LocalCredMarshalCredentialW(enum _CRED_MARSHAL_TYPE,void * __ptr64,unsigned short * __ptr64 * __ptr64)" ?LocalCredMarshalCredentialW@@YAKW4_CRED_MARSHAL_TYPE@@PEAXPEAPEAG@Z
0x1C0019150: "__cdecl _imp_PsUnregisterSiloMonitor" __imp_PsUnregisterSiloMonitor
0x1C0011498: "unsigned char const __midl_frag9" ?__midl_frag9@@3EB
0x1C0011D10: "DisconnectRpcConnectionCallback:" ??_C@_0EK@JHKHFCHE@DisconnectRpcConnectionCallback?3@
0x1C0011DE0: "SspipProcessSecurityContext: Too" ??_C@_0DK@DODMNMNM@SspipProcessSecurityContext?3?5Too@
0x1C001C860: DeleteSecurityContext
0x1C00132A0: "IRP %p canceled. Marking request" ??_C@_0CP@FCBHBALN@IRP?5?$CFp?5canceled?4?5Marking?5request@
0x1C001D430: DeleteSecurityContextUnMarshalResponse
0x1C000FDF8: "struct __midl_frag52_t const __midl_frag52" ?__midl_frag52@@3U__midl_frag52_t@@B
0x1C000DE24: "public: long __cdecl AsyncSspiMarshaler<struct KernelAllocator>::CopyBuffer<unsigned char>(unsigned char * __ptr64 * __ptr64,unsigned char * __ptr64,unsigned long) __ptr64" ??$CopyBuffer@E@?$AsyncSspiMarshaler@UKernelAllocator@@@@QEAAJPEAPEAEPEAEK@Z
0x1C00115DC: "unsigned char const __midl_frag127" ?__midl_frag127@@3EB
0x1C00190F0: "__cdecl _imp_KeInitializeEvent" __imp_KeInitializeEvent
0x1C000E508: TBValidateKeyType
0x1C0019118: "__cdecl _imp_ObOpenObjectByPointer" __imp_ObOpenObjectByPointer
0x1C001F2A4: SspiInitAsyncInterface
0x1C0004F00: "long __cdecl KsecpAddRpcConnection(void * __ptr64)" ?KsecpAddRpcConnection@@YAJPEAX@Z
0x1C0010750: "SspipProcessSecurityContext: Inp" ??_C@_0EE@KFOOGICA@SspipProcessSecurityContext?3?5Inp@
0x1C0013170: "KsecIoctlRemoveProtectedProcessA" ??_C@_0DP@DGCDAPEE@KsecIoctlRemoveProtectedProcessA@
0x1C00123C0: "Failed to enable IRP_MJ_SHUTDOWN" ??_C@_0CI@OAPBJMBE@Failed?5to?5enable?5IRP_MJ_SHUTDOWN@
0x1C0002A7C: CollectAsyncPerfCounters
0x1C0020650: LsaCallAuthenticationPackage
0x1C00021A0: SspiLocalFree
0x1C000F270: "struct _MIDL_STUB_DESC const sspirpc_StubDesc" ?sspirpc_StubDesc@@3U_MIDL_STUB_DESC@@B
0x1C0011704: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag222" ?__midl_frag222@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C0011584: "unsigned char const __midl_frag121" ?__midl_frag121@@3EB
0x1C0019078: "__cdecl _imp_RtlAnsiStringToUnicodeString" __imp_RtlAnsiStringToUnicodeString
0x1C0010FB0: "struct _ksspirpc_MIDL_TYPE_FORMAT_STRING const ksspirpc__MIDL_TypeFormatString" ?ksspirpc__MIDL_TypeFormatString@@3U_ksspirpc_MIDL_TYPE_FORMAT_STRING@@B
0x1C0019310: "__cdecl _imp_KeReleaseGuardedMutex" __imp_KeReleaseGuardedMutex
0x1C001E440: SspiSetAsyncNotifyCallback
0x1C00115E0: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag123" ?__midl_frag123@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C0012080: "LoadCngExtension: IoBuildDeviceI" ??_C@_0FJ@JNGBDIFP@LoadCngExtension?3?5IoBuildDeviceI@
0x1C0011680: "unsigned char const __midl_frag220" ?__midl_frag220@@3EB
0x1C0012910: "[%d] Failed mem copy(%lu): 0x%lx" ??_C@_0DD@JIJNJEF@?$FL?$CFd?$FN?5Failed?5mem?5copy?$CI?$CFlu?$CJ?3?50x?$CFlx@
0x1C001D410: NegMapKernelHandle
0x1C001CA00: KsecDispatch
0x1C001F6E4: IoctlIpcInitSilo
0x1C0012AC8: "Range added : 0x%p <-> 0x%p;" ??_C@_0DE@DJCNACKA@Range?5added?5?5?5?5?5?3?50x?$CFp?5?$DM?9?$DO?50x?$CFp?$DL@
0x1C0016444: "long KsecConnectionIndicator" ?KsecConnectionIndicator@@3JA
0x1C0002218: SspipFreeCredentialsHandle
0x1C000DCB0: SslFreeObject
0x1C000240C: LocateClient
0x1C0001944: KsecRemoveVmAllocations
0x1C000FCC0: "struct __midl_frag25_t const __midl_frag25" ?__midl_frag25@@3U__midl_frag25_t@@B
0x1C0012CF8: "KsecIoctlClientCallback: Output " ??_C@_0DH@GNJHOACD@KsecIoctlClientCallback?3?5Output?5@
0x1C0001B70: MIDL_user_allocate
0x1C00055D0: "__cdecl guard_check_icall_nop" _guard_check_icall_nop
0x1C0005710: memcmp
0x1C000AC50: SspiUnmarshalAuthIdentity
0x1C000D920: BCryptGenerateKeyPair
0x1C0001080: SspiZeroAuthIdentity
0x1C0019178: "__cdecl _imp_MmMapLockedPagesSpecifyCache" __imp_MmMapLockedPagesSpecifyCache
0x1C0008290: "long __cdecl SspiHelperCompareUserNames(unsigned short const * __ptr64,unsigned short const * __ptr64,unsigned short const * __ptr64,unsigned char * __ptr64)" ?SspiHelperCompareUserNames@@YAJPEBG00PEAE@Z
0x1C00193A8: "__cdecl _imp_PsGetSiloIdentifier" __imp_PsGetSiloIdentifier
0x1C00114B2: "unsigned char const __midl_frag23" ?__midl_frag23@@3EB
0x1C001150A: "unsigned char const __midl_frag63" ?__midl_frag63@@3EB
0x1C00191E8: "__cdecl _imp_PsGetCurrentProcess" __imp_PsGetCurrentProcess
0x1C0011589: "unsigned char const __midl_frag83" ?__midl_frag83@@3EB
0x1C00010E0: KSecReferenceListEntry
0x1C00191D8: "__cdecl _imp_ZwAllocateVirtualMemory" __imp_ZwAllocateVirtualMemory
0x1C0008644: "long __cdecl SspiHelperConvertAnsiStringToUnicodeString(unsigned char * __ptr64,unsigned long,unsigned short const * __ptr64 * __ptr64)" ?SspiHelperConvertAnsiStringToUnicodeString@@YAJPEAEKPEAPEBG@Z
0x1C0021C90: KSecSerializeWinntAuthData
0x1C00114D0: "struct __midl_frag33_t const __midl_frag33" ?__midl_frag33@@3U__midl_frag33_t@@B
0x1C0024170: NegUnsealMessage
0x1C0019138: "__cdecl _imp_PsRegisterSiloMonitor" __imp_PsRegisterSiloMonitor
0x1C0012628: "Unknown Credential Format: 0x%x " ??_C@_0CB@EBBINBBL@Unknown?5Credential?5Format?3?50x?$CFx?6@
0x1C001C7B0: FreeCredentialsHandle
0x1C000FC20: "struct _NDR64_POINTER_FORMAT const __midl_frag3" ?__midl_frag3@@3U_NDR64_POINTER_FORMAT@@B
0x1C00217A0: AddCredentialsW
0x1C001F040: SecpGetBinding
0x1C001D3AC: AcquireCredentialsHandlePostProcess
0x1C000DEA4: "public: long __cdecl AsyncSspiMarshaler<struct KernelAllocator>::CopyString(struct _UNICODE_STRING * __ptr64,struct _UNICODE_STRING * __ptr64) __ptr64" ?CopyString@?$AsyncSspiMarshaler@UKernelAllocator@@@@QEAAJPEAU_UNICODE_STRING@@0@Z
0x1C0011B78: "QueryPackageInfo " ??_C@_0BC@GBPBOGBC@QueryPackageInfo?6?$AA@
0x1C0012A48: "KsecInsertValidAddress: Failed t" ??_C@_0DL@OJENMENI@KsecInsertValidAddress?3?5Failed?5t@
0x1C000FE90: "struct _NDR64_POINTER_FORMAT const __midl_frag104" ?__midl_frag104@@3U_NDR64_POINTER_FORMAT@@B
0x1C0011CC0: "DisconnectRpcConnectionCallback:" ??_C@_0EF@JKLMMMMK@DisconnectRpcConnectionCallback?3@
0x1C0019020: "__cdecl _imp_RpcBindingBind" __imp_RpcBindingBind
0x1C0001C20: BCryptDuplicateHash
0x1C001CD60: KsecProcessSecurityContext
0x1C0010270: "struct _NDR64_POINTER_FORMAT const __midl_frag205" ?__midl_frag205@@3U_NDR64_POINTER_FORMAT@@B
0x1C001C3A0: KSecDereferenceListEntryPaged
0x1C0011708: "struct __midl_frag98_t const __midl_frag98" ?__midl_frag98@@3U__midl_frag98_t@@B
0x1C0003688: "unsigned long __cdecl KsecFindValidVm(struct _EPROCESS * __ptr64,unsigned char * __ptr64,unsigned long,unsigned long)" ?KsecFindValidVm@@YAKPEAU_EPROCESS@@PEAEKK@Z
0x1C0012948: "KsecIoctlDupLsaHandle: Bad param" ??_C@_0DE@LDOBDGFB@KsecIoctlDupLsaHandle?3?5Bad?5param@
0x1C0019388: "__cdecl _imp_KeBugCheckEx" __imp_KeBugCheckEx
0x1C0024420: CompleteAuthToken
0x1C000E3E4: WPP_SF_ddd
0x1C00125A0: "Could not find deferred package " ??_C@_0CF@EANMJEKI@Could?5not?5find?5deferred?5package?5@
0x1C0019268: "__cdecl _imp_PsProcessType" __imp_PsProcessType
0x1C0021BD0: ImportSecurityContextW
0x1C001E320: SspiAcceptSecurityContextAsync
0x1C00105F0: "Ksecdd Async Performance Diagnos" ??_C@_1EK@PCPIJOON@?$AAK?$AAs?$AAe?$AAc?$AAd?$AAd?$AA?5?$AAA?$AAs?$AAy?$AAn?$AAc?$AA?5?$AAP?$AAe?$AAr?$AAf?$AAo?$AAr?$AAm?$AAa?$AAn?$AAc?$AAe?$AA?5?$AAD?$AAi?$AAa?$AAg?$AAn?$AAo?$AAs@
0x1C0019390: "__cdecl _imp_PsInsertPermanentSiloContext" __imp_PsInsertPermanentSiloContext
0x1C001F438: KsecSetDeviceSecurity
0x1C000D960: BCryptGetFipsAlgorithmMode
0x1C0019328: "__cdecl _imp_KeAcquireSpinLockRaiseToDpc" __imp_KeAcquireSpinLockRaiseToDpc
0x1C0019000: "__cdecl _imp_KeQueryPerformanceCounter" __imp_KeQueryPerformanceCounter
0x1C0022ACC: IoctlIpcCleanupGlobal
0x1C0002450: KsecpGetRpcConnection
0x1C00164D0: KsecKsecAsyncPerfCounterSet
0x1C00128E8: "[%d] Mem copy(%lu): 0x%p, 0x%p, " ??_C@_0CF@OHELCFDO@?$FL?$CFd?$FN?5Mem?5copy?$CI?$CFlu?$CJ?3?50x?$CFp?0?50x?$CFp?0?5@
0x1C0011619: "unsigned char const __midl_frag152" ?__midl_frag152@@3EB
0x1C001161C: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag149" ?__midl_frag149@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C0016230: "__cdecl _security_cookie" __security_cookie
0x1C0019250: "__cdecl _imp_MmCopyVirtualMemory" __imp_MmCopyVirtualMemory
0x1C0012380: "The driver failed the create inf" ??_C@_0DO@JGPAIEFC@The?5driver?5failed?5the?5create?5inf@
0x1C00034B0: "long __cdecl KsecIoctlCopyVm(void * __ptr64,unsigned long)" ?KsecIoctlCopyVm@@YAJPEAXK@Z
0x1C0019270: "__cdecl _imp_strcpy_s" __imp_strcpy_s
0x1C0011490: "unsigned char const __midl_frag12" ?__midl_frag12@@3EB
0x1C0016324: "unsigned long KsecTotalValidAddressRemovals" ?KsecTotalValidAddressRemovals@@3KA
0x1C00114F4: "unsigned char const __midl_frag72" ?__midl_frag72@@3EB
0x1C0016218: "struct _UNICODE_STRING NegotiateName" ?NegotiateName@@3U_UNICODE_STRING@@A
0x1C0011590: "unsigned char const __midl_frag92" ?__midl_frag92@@3EB
0x1C0019340: "__cdecl _imp_ExInterlockedInsertHeadList" __imp_ExInterlockedInsertHeadList
0x1C000D9D0: BCryptResolveProviders
0x1C000A940: SspiMarshalAuthIdentity
0x1C000FEB0: "struct _NDR64_POINTER_FORMAT const __midl_frag89" ?__midl_frag89@@3U_NDR64_POINTER_FORMAT@@B
0x1C000D500: "int __cdecl SystemPrng(unsigned char * __ptr64,unsigned __int64)" ?SystemPrng@@YAHPEAE_K@Z
0x1C0011B30: "GetUserInfo scRet = %x " ??_C@_0BI@BPNOLBEC@GetUserInfo?5scRet?5?$DN?5?$CFx?6?$AA@
0x1C000E27C: "__cdecl TlgDefineProvider_annotation__Tlgg_hOSGKsecSspiTraceLoggingProviderProv" _TlgDefineProvider_annotation__Tlgg_hOSGKsecSspiTraceLoggingProviderProv
0x1C00053C8: KsecInitAddressValidation
0x1C000FCF0: "struct __midl_frag32_t const __midl_frag32" ?__midl_frag32@@3U__midl_frag32_t@@B
0x1C0022C80: TokenBindingGetHighestSupportedVersion
0x1C00115E4: "unsigned char const __midl_frag147" ?__midl_frag147@@3EB
0x1C000D1F8: "long __cdecl KsecIoctlFreeVm(void * __ptr64,unsigned long)" ?KsecIoctlFreeVm@@YAJPEAXK@Z
0x1C0022440: SspiFreeCredentialsHandleAsync
0x1C0010460: "struct __midl_frag99_t const __midl_frag99" ?__midl_frag99@@3U__midl_frag99_t@@B
0x1C0019348: "__cdecl _imp_ExInterlockedRemoveHeadList" __imp_ExInterlockedRemoveHeadList
0x1C0019278: "__cdecl _imp_DbgPrintEx" __imp_DbgPrintEx
0x1C000DA80: BCryptSignHash
0x1C0012790: "KsecIoctlAllocPool: KsecInsertVa" ??_C@_0DK@GFCCOJOL@KsecIoctlAllocPool?3?5KsecInsertVa@
0x1C0012048: "LoadCngExtension: Failed to open" ??_C@_0DD@NFFELNCL@LoadCngExtension?3?5Failed?5to?5open@
0x1C0011600: "unsigned char const __midl_frag141" ?__midl_frag141@@3EB
0x1C0011500: "struct __midl_frag67_t const __midl_frag67" ?__midl_frag67@@3U__midl_frag67_t@@B
0x1C00126E8: "KsecIoctlAllocPool: Bad params: " ??_C@_0DA@NBLIHBOL@KsecIoctlAllocPool?3?5Bad?5params?3?5@
0x1C0008F20: SspiCompareAuthIdentities
0x1C0013390: "PsInsertPermanentSiloContext fai" ??_C@_0CL@PCPAKCF@PsInsertPermanentSiloContext?5fai@
0x1C001C3C4: ReleaseSiloKsecddLsaState
0x1C0001EC0: SspipAcquireCredentialsHandle
0x1C0019288: "__cdecl _imp_DbgPrint" __imp_DbgPrint
0x1C001C410: KsecCreateProcessNotifyRoutine
0x1C001F4C0: KsecInstallBuiltinPackages
0x1C000B9E0: SecLookupAccountSid
0x1C0003AB0: MapKernelContextHandle
0x1C0013208: "HandlePendingIrps" ??_C@_0BC@LDLNHJOL@HandlePendingIrps?$AA@
0x1C0016348: "unsigned long KsecRpcConnectionsSize" ?KsecRpcConnectionsSize@@3KA
0x1C000FE80: "struct _NDR64_POINTER_FORMAT const __midl_frag110" ?__midl_frag110@@3U_NDR64_POINTER_FORMAT@@B
0x1C0011510: "struct __midl_frag45_t const __midl_frag45" ?__midl_frag45@@3U__midl_frag45_t@@B
0x1C0011B60: "Enumerate scRet = %x " ??_C@_0BG@FFDMKDIC@Enumerate?5scRet?5?$DN?5?$CFx?6?$AA@
0x1C001C990: AcceptSecurityContext
0x1C0027044: "__cdecl _security_init_cookie" __security_init_cookie
0x1C00104E0: "\SECURITY\LSA_AUTHENTICATION_INI" ??_C@_1FC@PDNDEKHJ@?$AA?2?$AAS?$AAE?$AAC?$AAU?$AAR?$AAI?$AAT?$AAY?$AA?2?$AAL?$AAS?$AAA?$AA_?$AAA?$AAU?$AAT?$AAH?$AAE?$AAN?$AAT?$AAI?$AAC?$AAA?$AAT?$AAI?$AAO?$AAN?$AA_?$AAI?$AAN?$AAI@
0x1C0019290: "__cdecl _imp_ExInitializeLookasideListEx" __imp_ExInitializeLookasideListEx
0x1C000FF60: "struct _NDR64_POINTER_FORMAT const __midl_frag111" ?__midl_frag111@@3U_NDR64_POINTER_FORMAT@@B
0x1C00133D0: "RSAPUBLICBLOB" ??_C@_1BM@BJJGGDHH@?$AAR?$AAS?$AAA?$AAP?$AAU?$AAB?$AAL?$AAI?$AAC?$AAB?$AAL?$AAO?$AAB?$AA?$AA@
0x1C0011C38: "LookupWellKnownSid " ??_C@_0BE@GOFBIJ@LookupWellKnownSid?6?$AA@
0x1C0019350: "__cdecl _imp_EtwRegister" __imp_EtwRegister
0x1C0011568: "unsigned char const __midl_frag61" ?__midl_frag61@@3EB
0x1C00114B0: "unsigned char const __midl_frag41" ?__midl_frag41@@3EB
0x1C0011C50: "LookupWellKnownSid scRet = %x " ??_C@_0BP@NPGOLDMF@LookupWellKnownSid?5scRet?5?$DN?5?$CFx?6?$AA@
0x1C001C4E4: KsecAcquireCredentialsHandle
0x1C0013258: "IoctlIpcHandleFunctionReturn" ??_C@_0BN@JKGPBMNH@IoctlIpcHandleFunctionReturn?$AA@
0x1C0002158: KsecCallRpcSPM
0x1C0019208: "__cdecl _imp_KeSetEvent" __imp_KeSetEvent
0x1C000D5D0: BCryptDeriveKey
0x1C000FB60: "struct __midl_frag13_t const __midl_frag13" ?__midl_frag13@@3U__midl_frag13_t@@B
0x1C00191C8: "__cdecl _imp_ZwDuplicateObject" __imp_ZwDuplicateObject
0x1C00121E0: "LoadCngExtension: IoBuildDeviceI" ??_C@_0GA@EHHEGNNC@LoadCngExtension?3?5IoBuildDeviceI@
0x1C00057E6: wcscmp
0x1C0011C70: "GetBinding(%x) " ??_C@_0BA@KKLNLPK@GetBinding?$CI?$CFx?$CJ?6?$AA@
0x1C0022B10: CleanKsecddLsaState
0x1C0005550: InitSecurityInterfaceW
0x1C001632C: "unsigned long KsecValidAddressesCount" ?KsecValidAddressesCount@@3KA
0x1C000D8F0: BCryptFreeBuffer
0x1C001167C: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag175" ?__midl_frag175@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C0013058: "KsecIoctlCopyVm: ObReferenceObje" ??_C@_0DP@NLIGECCJ@KsecIoctlCopyVm?3?5ObReferenceObje@
0x1C000E288: "long __cdecl _CopyTokenBinding(unsigned char * __ptr64,unsigned long * __ptr64,unsigned long,struct TOKENBINDING_IDENTIFIER * __ptr64,unsigned long * __ptr64,enum TOKENBINDING_TYPE * __ptr64,unsigned char * __ptr64)" ?_CopyTokenBinding@@YAJPEAEPEAKKPEAUTOKENBINDING_IDENTIFIER@@1PEAW4TOKENBINDING_TYPE@@0@Z
0x1C0016680: KsecPackageLock
0x1C00190B0: "__cdecl _imp_ExAcquirePushLockExclusiveEx" __imp_ExAcquirePushLockExclusiveEx
0x1C0021000: SecpEnumLogonSession
0x1C00107E0: "Possibly invalid handle passed t" ??_C@_0EL@MJEENHLN@Possibly?5invalid?5handle?5passed?5t@
0x1C00193D8: "__cdecl _imp_RtlLengthSid" __imp_RtlLengthSid
0x1C0011DB8: "@@@@" ??_C@_19DPBOAAJF@?$AA?$EA?$AA?$EA?$AA?$EA?$AA?$EA?$AA?$AA@
0x1C001F65C: KsecPerfCountersInitSilo
0x1C0012A08: "KsecInsertValidAddress: Cannot g" ??_C@_0DK@BJHAOMOD@KsecInsertValidAddress?3?5Cannot?5g@
0x1C0021B40: ExportSecurityContext
0x1C0025000: KsecddSiloMonitor
0x1C00055B0: "__cdecl _report_gsfailure" __report_gsfailure
0x1C0016240: g_HardCodedSd
0x1C00124B0: "Security device driver loaded " ??_C@_0BP@IHGGHOAC@Security?5device?5driver?5loaded?6?$AA@
0x1C0010B50: "struct _ksspirpc_MIDL_PROC_FORMAT_STRING const ksspirpc__MIDL_ProcFormatString" ?ksspirpc__MIDL_ProcFormatString@@3U_ksspirpc_MIDL_PROC_FORMAT_STRING@@B
0x1C0011640: "unsigned char const __midl_frag173" ?__midl_frag173@@3EB
0x1C0019010: "__cdecl _imp_RpcAsyncInitializeHandle" __imp_RpcAsyncInitializeHandle
0x1C00039F0: GetCurrentSiloKsecddLsaState
0x1C000E170: "void __cdecl LogKsecTokenBindingVerifyMessage(unsigned char,unsigned char,unsigned char,unsigned long,union _LARGE_INTEGER,union _LARGE_INTEGER,long)" ?LogKsecTokenBindingVerifyMessage@@YAXEEEKT_LARGE_INTEGER@@0J@Z
0x1C0008840: "void * __ptr64 __cdecl SspiLocalAlloc(unsigned long)" ?SspiLocalAlloc@@YAPEAXK@Z
0x1C0019228: "__cdecl _imp_SeTokenImpersonationLevel" __imp_SeTokenImpersonationLevel
0x1C00131B0: "Error printing message: Bad Comp" ??_C@_0CL@IJPNDHEL@Error?5printing?5message?3?5Bad?5Comp@
0x1C00192A8: "__cdecl _imp_ExQueryDepthSList" __imp_ExQueryDepthSList
0x1C0010018: "struct _NDR64_POINTER_FORMAT const __midl_frag139" ?__midl_frag139@@3U_NDR64_POINTER_FORMAT@@B
0x1C00114A8: "unsigned char const __midl_frag20" ?__midl_frag20@@3EB
0x1C0011644: "struct _NDR64_CONTEXT_HANDLE_FORMAT const __midl_frag166" ?__midl_frag166@@3U_NDR64_CONTEXT_HANDLE_FORMAT@@B
0x1C0012828: "KsecIoctlFreePool: Bad address p" ??_C@_0DK@HAKCFDPH@KsecIoctlFreePool?3?5Bad?5address?5p@
0x1C00242A0: ImpersonateSecurityContext
0x1C00123E8: "Failed to initialize ksecdd perf" ??_C@_0DB@MHBHPJI@Failed?5to?5initialize?5ksecdd?5perf@
0x1C0010028: "struct _NDR64_POINTER_FORMAT const __midl_frag136" ?__midl_frag136@@3U_NDR64_POINTER_FORMAT@@B
0x1C000DB00: BCryptUnregisterConfigChangeNotify
0x1C0011618: "unsigned char const __midl_frag164" ?__midl_frag164@@3EB
0x1C0012E60: "KsecIoctlAllocVm: ObOpenObjectBy" ??_C@_0EA@OLFLFEML@KsecIoctlAllocVm?3?5ObOpenObjectBy@
0x1C000841C: "long __cdecl SspiHelperConstructAuthdataExWMarshalledW(unsigned short const * __ptr64,unsigned short const * __ptr64,unsigned short const * __ptr64,unsigned short const * __ptr64,struct _SEC_WINNT_AUTH_IDENTITY_EXW * __ptr64 * __ptr64,unsigned long * __ptr64)" ?SspiHelperConstructAuthdataExWMarshalledW@@YAJPEBG000PEAPEAU_SEC_WINNT_AUTH_IDENTITY_EXW@@PEAK@Z
0x1C00133C0: "SHA256" ??_C@_1O@HECGKAIN@?$AAS?$AAH?$AAA?$AA2?$AA5?$AA6?$AA?$AA@
0x1C0019300: "__cdecl _imp_KeAcquireGuardedMutex" __imp_KeAcquireGuardedMutex
0x1C0019420: ntoskrnl_NULL_THUNK_DATA
0x1C0019068: "__cdecl _imp_ExFreePoolWithTag" __imp_ExFreePoolWithTag
0x1C00128A0: "KsecIoctlCopyPool: Bad address p" ??_C@_0EG@JBHEKONE@KsecIoctlCopyPool?3?5Bad?5address?5p@
0x1C00190A8: "__cdecl _imp_KeEnterCriticalRegion" __imp_KeEnterCriticalRegion
0x1C0012D98: "KsecIoctlAllocVm: Output buffer " ??_C@_0DA@PCMFHIDB@KsecIoctlAllocVm?3?5Output?5buffer?5@
0x1C000FA90: "struct __midl_frag21_t const __midl_frag21" ?__midl_frag21@@3U__midl_frag21_t@@B
0x1C0019058: "__cdecl _imp_NdrClientCall3" __imp_NdrClientCall3
0x1C00212EC: SecpLookupAccountName
0x1C0016440: KsecSystemProcessId
0x1C0013030: "KsecIoctlCopyVm: Bad params: 0x%" ??_C@_0CI@JDCADOD@KsecIoctlCopyVm?3?5Bad?5params?3?50x?$CF@
0x1C0012578: "Could not find builtin package %" ??_C@_0CE@MNNDDPAJ@Could?5not?5find?5builtin?5package?5?$CF@
0x1C0019230: "__cdecl _imp_NtDuplicateObject" __imp_NtDuplicateObject
0x1C0019220: "__cdecl _imp_PsImpersonateClient" __imp_PsImpersonateClient
0x1C0027078: DriverEntry
0x1C000D740: BCryptEncrypt
0x1C0011678: "unsigned char const __midl_frag179" ?__midl_frag179@@3EB
0x1C0009790: SspiEncodeAuthIdentityAsStrings
0x1C000535C: KsecInitRpc
0x1C000FDA0: "struct __midl_frag47_t const __midl_frag47" ?__midl_frag47@@3U__midl_frag47_t@@B
0x1C001F570: KsecdCreateSiloNotification
0x1C0011560: "struct __midl_frag56_t const __midl_frag56" ?__midl_frag56@@3U__midl_frag56_t@@B
0x1C001EDC0: InitializePackages
0x1C0016738: pfnWppTraceMessage
0x1C0013220: "%hs: Error allocating memory for" ??_C@_0DB@GBPNIAHF@?$CFhs?3?5Error?5allocating?5memory?5for@
0x1C0011AA0: SEC_WINNT_AUTH_DATA_TYPE_PASSWORD
0x1C0012020: "CallSPM: KsecCallRpcSPM failed: " ??_C@_0CH@FMFCJLMO@CallSPM?3?5KsecCallRpcSPM?5failed?3?5@
0x1C0019008: HAL_NULL_THUNK_DATA
0x1C0016450: "unsigned long KsecValidVmSize" ?KsecValidVmSize@@3KA
0x1C0011AB0: "Entered AddCredential " ??_C@_0BH@DMJIBHBN@Entered?5AddCredential?6?$AA@
0x1C0005B80: memset
0x1C0019474: "__cdecl _NULL_IMPORT_DESCRIPTOR" __NULL_IMPORT_DESCRIPTOR
0x1C0012D30: "KSecHandleCallback: No extension" ??_C@_0DF@CJGBIOHB@KSecHandleCallback?3?5No?5extension@
0x1C0001880: BCryptDestroyHash
0x1C001F30C: IoctlIpcInitGlobal
0x1C0012650: "KSec: Failed to open event, %x " ??_C@_0CB@CHEBNFOJ@KSec?3?5?5Failed?5to?5open?5event?0?5?$CFx?6@

[JEB Decompiler by PNF Software]