Win7 SP1 // ERR_CONNECTION_CLOSED bei LogIn Teil 3 Teil 3
GMER Code:
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2015-08-26 21:53:22
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 Samsung_ rev.DXM0 238,47GB
Running: Gmer-19357.exe; Driver: C:\Users\Admin\AppData\Local\Temp\pgtdqpow.sys
---- User code sections - GMER 2.1 ----
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077431401 2 bytes JMP 74e7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077431419 2 bytes JMP 74e7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077431431 2 bytes JMP 74ef8f29 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007743144a 2 bytes CALL 74e5489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774314dd 2 bytes JMP 74ef8822 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774314f5 2 bytes JMP 74ef89f8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007743150d 2 bytes JMP 74ef8718 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077431525 2 bytes JMP 74ef8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007743153d 2 bytes JMP 74e6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077431555 2 bytes JMP 74e768ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007743156d 2 bytes JMP 74ef8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077431585 2 bytes JMP 74ef8b42 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007743159d 2 bytes JMP 74ef86dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774315b5 2 bytes JMP 74e6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774315cd 2 bytes JMP 74e7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774316b2 2 bytes JMP 74ef8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcPrfMgrSvc.exe[1732] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774316bd 2 bytes JMP 74ef8671 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExW + 17 0000000077431401 2 bytes JMP 74e7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!EnumProcessModules + 17 0000000077431419 2 bytes JMP 74e7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 17 0000000077431431 2 bytes JMP 74ef8f29 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 42 000000007743144a 2 bytes CALL 74e5489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!EnumDeviceDrivers + 17 00000000774314dd 2 bytes JMP 74ef8822 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameA + 17 00000000774314f5 2 bytes JMP 74ef89f8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!QueryWorkingSetEx + 17 000000007743150d 2 bytes JMP 74ef8718 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameW + 17 0000000077431525 2 bytes JMP 74ef8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameW + 17 000000007743153d 2 bytes JMP 74e6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!EnumProcesses + 17 0000000077431555 2 bytes JMP 74e768ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetProcessMemoryInfo + 17 000000007743156d 2 bytes JMP 74ef8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetPerformanceInfo + 17 0000000077431585 2 bytes JMP 74ef8b42 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!QueryWorkingSet + 17 000000007743159d 2 bytes JMP 74ef86dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameA + 17 00000000774315b5 2 bytes JMP 74e6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExA + 17 00000000774315cd 2 bytes JMP 74e7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 20 00000000774316b2 2 bytes JMP 74ef8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[2752] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 31 00000000774316bd 2 bytes JMP 74ef8671 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077431401 2 bytes JMP 74e7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077431419 2 bytes JMP 74e7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077431431 2 bytes JMP 74ef8f29 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007743144a 2 bytes CALL 74e5489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774314dd 2 bytes JMP 74ef8822 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774314f5 2 bytes JMP 74ef89f8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007743150d 2 bytes JMP 74ef8718 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077431525 2 bytes JMP 74ef8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007743153d 2 bytes JMP 74e6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077431555 2 bytes JMP 74e768ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007743156d 2 bytes JMP 74ef8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077431585 2 bytes JMP 74ef8b42 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007743159d 2 bytes JMP 74ef86dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774315b5 2 bytes JMP 74e6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774315cd 2 bytes JMP 74e7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774316b2 2 bytes JMP 74ef8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\AcSvc.exe[3992] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774316bd 2 bytes JMP 74ef8671 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077431401 2 bytes JMP 74e7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077431419 2 bytes JMP 74e7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077431431 2 bytes JMP 74ef8f29 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007743144a 2 bytes CALL 74e5489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774314dd 2 bytes JMP 74ef8822 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774314f5 2 bytes JMP 74ef89f8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007743150d 2 bytes JMP 74ef8718 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077431525 2 bytes JMP 74ef8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007743153d 2 bytes JMP 74e6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077431555 2 bytes JMP 74e768ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007743156d 2 bytes JMP 74ef8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077431585 2 bytes JMP 74ef8b42 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007743159d 2 bytes JMP 74ef86dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774315b5 2 bytes JMP 74e6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774315cd 2 bytes JMP 74e7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774316b2 2 bytes JMP 74ef8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[4164] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774316bd 2 bytes JMP 74ef8671 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077431401 2 bytes JMP 74e7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077431419 2 bytes JMP 74e7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077431431 2 bytes JMP 74ef8f29 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007743144a 2 bytes CALL 74e5489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774314dd 2 bytes JMP 74ef8822 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774314f5 2 bytes JMP 74ef89f8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007743150d 2 bytes JMP 74ef8718 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077431525 2 bytes JMP 74ef8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007743153d 2 bytes JMP 74e6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077431555 2 bytes JMP 74e768ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007743156d 2 bytes JMP 74ef8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077431585 2 bytes JMP 74ef8b42 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007743159d 2 bytes JMP 74ef86dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774315b5 2 bytes JMP 74e6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774315cd 2 bytes JMP 74e7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774316b2 2 bytes JMP 74ef8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe[5592] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774316bd 2 bytes JMP 74ef8671 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExW + 17 0000000077431401 2 bytes JMP 74e7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!EnumProcessModules + 17 0000000077431419 2 bytes JMP 74e7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 17 0000000077431431 2 bytes JMP 74ef8f29 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 42 000000007743144a 2 bytes CALL 74e5489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!EnumDeviceDrivers + 17 00000000774314dd 2 bytes JMP 74ef8822 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameA + 17 00000000774314f5 2 bytes JMP 74ef89f8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!QueryWorkingSetEx + 17 000000007743150d 2 bytes JMP 74ef8718 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameW + 17 0000000077431525 2 bytes JMP 74ef8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameW + 17 000000007743153d 2 bytes JMP 74e6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!EnumProcesses + 17 0000000077431555 2 bytes JMP 74e768ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetProcessMemoryInfo + 17 000000007743156d 2 bytes JMP 74ef8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetPerformanceInfo + 17 0000000077431585 2 bytes JMP 74ef8b42 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!QueryWorkingSet + 17 000000007743159d 2 bytes JMP 74ef86dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameA + 17 00000000774315b5 2 bytes JMP 74e6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExA + 17 00000000774315cd 2 bytes JMP 74e7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 20 00000000774316b2 2 bytes JMP 74ef8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[5636] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 31 00000000774316bd 2 bytes JMP 74ef8671 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077431401 2 bytes JMP 74e7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077431419 2 bytes JMP 74e7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077431431 2 bytes JMP 74ef8f29 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007743144a 2 bytes CALL 74e5489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774314dd 2 bytes JMP 74ef8822 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774314f5 2 bytes JMP 74ef89f8 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007743150d 2 bytes JMP 74ef8718 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077431525 2 bytes JMP 74ef8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007743153d 2 bytes JMP 74e6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077431555 2 bytes JMP 74e768ef C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007743156d 2 bytes JMP 74ef8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077431585 2 bytes JMP 74ef8b42 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007743159d 2 bytes JMP 74ef86dc C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774315b5 2 bytes JMP 74e6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774315cd 2 bytes JMP 74e7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774316b2 2 bytes JMP 74ef8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Windows\SysWOW64\RunDll32.exe[6544] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774316bd 2 bytes JMP 74ef8671 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077431401 2 bytes JMP 74e7b21b C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077431419 2 bytes JMP 74e7b346 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077431431 2 bytes JMP 74ef8f29 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007743144a 2 bytes CALL 74e5489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774314dd 2 bytes JMP 74ef8822 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774314f5 2 bytes JMP 74ef89f8 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007743150d 2 bytes JMP 74ef8718 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077431525 2 bytes JMP 74ef8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007743153d 2 bytes JMP 74e6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077431555 2 bytes JMP 74e768ef C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007743156d 2 bytes JMP 74ef8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077431585 2 bytes JMP 74ef8b42 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007743159d 2 bytes JMP 74ef86dc C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774315b5 2 bytes JMP 74e6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774315cd 2 bytes JMP 74e7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774316b2 2 bytes JMP 74ef8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\PROGRA~2\ThinkPad\UTILIT~1\SCHTASK.exe[6956] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774316bd 2 bytes JMP 74ef8671 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077431401 2 bytes JMP 74e7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077431419 2 bytes JMP 74e7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077431431 2 bytes JMP 74ef8f29 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007743144a 2 bytes CALL 74e5489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774314dd 2 bytes JMP 74ef8822 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774314f5 2 bytes JMP 74ef89f8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007743150d 2 bytes JMP 74ef8718 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077431525 2 bytes JMP 74ef8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007743153d 2 bytes JMP 74e6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077431555 2 bytes JMP 74e768ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007743156d 2 bytes JMP 74ef8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077431585 2 bytes JMP 74ef8b42 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007743159d 2 bytes JMP 74ef86dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774315b5 2 bytes JMP 74e6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774315cd 2 bytes JMP 74e7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774316b2 2 bytes JMP 74ef8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Lenovo\Access Connections\SvcGuiHlpr.exe[1116] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774316bd 2 bytes JMP 74ef8671 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5192] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00000000772cde30 16 bytes [50, 48, B8, 34, 35, 57, F4, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7732] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000772cdc80 16 bytes [50, 48, B8, 18, F0, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadToken 00000000772cddf0 16 bytes [50, 48, B8, 70, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 00000000772cde10 48 bytes [50, 48, B8, EC, EE, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7732] C:\Windows\SYSTEM32\ntdll.dll!NtUnmapViewOfSection 00000000772cde50 16 bytes [50, 48, B8, 3C, F0, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadTokenEx 00000000772cdea0 32 bytes [50, 48, B8, 94, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 00000000772cdee0 16 bytes [50, 48, B8, 7C, EE, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7732] C:\Windows\SYSTEM32\ntdll.dll!NtQueryAttributesFile 00000000772cdf80 16 bytes [50, 48, B8, C4, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7732] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 00000000772ce100 16 bytes [50, 48, B8, 40, ED, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessToken 00000000772ceb70 16 bytes [50, 48, B8, 10, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 00000000772cebc0 16 bytes [50, 48, B8, 4C, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7732] C:\Windows\SYSTEM32\ntdll.dll!NtQueryFullAttributesFile 00000000772ced10 16 bytes [50, 48, B8, D8, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7800] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000772cdc80 16 bytes [50, 48, B8, 18, F0, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7800] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadToken 00000000772cddf0 16 bytes [50, 48, B8, 70, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7800] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 00000000772cde10 48 bytes [50, 48, B8, EC, EE, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7800] C:\Windows\SYSTEM32\ntdll.dll!NtUnmapViewOfSection 00000000772cde50 16 bytes [50, 48, B8, 3C, F0, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7800] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadTokenEx 00000000772cdea0 32 bytes [50, 48, B8, 94, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7800] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 00000000772cdee0 16 bytes [50, 48, B8, 7C, EE, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7800] C:\Windows\SYSTEM32\ntdll.dll!NtQueryAttributesFile 00000000772cdf80 16 bytes [50, 48, B8, C4, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7800] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 00000000772ce100 16 bytes [50, 48, B8, 40, ED, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7800] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessToken 00000000772ceb70 16 bytes [50, 48, B8, 10, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7800] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 00000000772cebc0 16 bytes [50, 48, B8, 4C, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7800] C:\Windows\SYSTEM32\ntdll.dll!NtQueryFullAttributesFile 00000000772ced10 16 bytes [50, 48, B8, D8, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7900] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000772cdc80 16 bytes [50, 48, B8, 18, F0, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadToken 00000000772cddf0 16 bytes [50, 48, B8, 70, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 00000000772cde10 48 bytes [50, 48, B8, EC, EE, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7900] C:\Windows\SYSTEM32\ntdll.dll!NtUnmapViewOfSection 00000000772cde50 16 bytes [50, 48, B8, 3C, F0, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadTokenEx 00000000772cdea0 32 bytes [50, 48, B8, 94, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 00000000772cdee0 16 bytes [50, 48, B8, 7C, EE, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7900] C:\Windows\SYSTEM32\ntdll.dll!NtQueryAttributesFile 00000000772cdf80 16 bytes [50, 48, B8, C4, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7900] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 00000000772ce100 16 bytes [50, 48, B8, 40, ED, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessToken 00000000772ceb70 16 bytes [50, 48, B8, 10, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 00000000772cebc0 16 bytes [50, 48, B8, 4C, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[7900] C:\Windows\SYSTEM32\ntdll.dll!NtQueryFullAttributesFile 00000000772ced10 16 bytes [50, 48, B8, D8, EF, 52, 3F, ...]
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtClose 000000007747fa2c 5 bytes JMP 000000016b63ea93
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtOpenKey 000000007747fa74 5 bytes JMP 000000016b63f0f8
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtEnumerateValueKey 000000007747fa8c 5 bytes JMP 000000016b63d830
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtQueryKey 000000007747fadc 5 bytes JMP 000000016b63d38c
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtQueryValueKey 000000007747faf4 5 bytes JMP 000000016b63d67d
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtCreateKey 000000007747fb8c 5 bytes JMP 000000016b63f338
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile 000000007747fc84 5 bytes JMP 000000016b64a713
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtEnumerateKey 000000007747fd98 5 bytes JMP 000000016b63d1d4
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile 000000007747fdb0 5 bytes JMP 000000016b649d35
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtQueryDirectoryFile 000000007747fde4 5 bytes JMP 000000016b64a030
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtDuplicateObject 000000007747fe90 5 bytes JMP 000000016b63e668
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile 000000007747fea8 5 bytes JMP 000000016b649e5e
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile 0000000077480100 5 bytes JMP 000000016b649b7a
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtSetValueKey 0000000077480210 5 bytes JMP 000000016b63d9d8
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtCreateKeyTransacted 00000000774807a0 5 bytes JMP 000000016b63f3da
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtDeleteFile 0000000077480a30 5 bytes JMP 000000016b649d72
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtDeleteKey 0000000077480a48 5 bytes JMP 000000016b63cfa8
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtDeleteValueKey 0000000077480a90 5 bytes JMP 000000016b63db8e
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtFlushKey 0000000077480bcc 5 bytes JMP 000000016b63d0be
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtNotifyChangeKey 0000000077480fbc 5 bytes JMP 000000016b63e01b
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtNotifyChangeMultipleKeys 0000000077480fd4 5 bytes JMP 000000016b63e1b7
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtOpenKeyEx 0000000077481064 5 bytes JMP 000000016b63f185
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtOpenKeyTransacted 000000007748107c 5 bytes JMP 000000016b63f2a8
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtOpenKeyTransactedEx 0000000077481094 5 bytes JMP 000000016b63f215
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile 0000000077481388 5 bytes JMP 000000016b649f47
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtQueryMultipleValueKey 00000000774814c8 5 bytes JMP 000000016b63de8e
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtQuerySecurityObject 0000000077481574 5 bytes JMP 000000016b63e37b
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtRenameKey 0000000077481764 5 bytes JMP 000000016b63dd06
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationKey 0000000077481aa4 5 bytes JMP 000000016b63d535
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\SysWOW64\ntdll.dll!NtSetSecurityObject 0000000077481be8 5 bytes JMP 000000016b63e4fd
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\kernel32.dll!CreateProcessW 0000000074e5103d 5 bytes JMP 000000016b623904
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\kernel32.dll!CreateProcessA 0000000074e51072 5 bytes JMP 000000016b623d68
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\kernel32.dll!SetUnhandledExceptionFilter 0000000074e58781 5 bytes JMP 0000000163dda519
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\kernel32.dll!CreateProcessAsUserW 0000000074e7c9b5 5 bytes JMP 000000016b623a1e
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\kernel32.dll!WinExec 0000000074ed3051 5 bytes JMP 000000016b623c62
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ADVAPI32.dll!CreateProcessAsUserA 00000000768c280a 5 bytes JMP 000000016b623f75
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\USER32.dll!RegisterClipboardFormatW 0000000076539ebd 3 bytes JMP 0000000163df7d37
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\USER32.dll!RegisterClipboardFormatW + 4 0000000076539ec1 1 byte [ED]
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\USER32.dll!RegisterClipboardFormatA 0000000076540afa 3 bytes JMP 0000000163dfbd24
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\USER32.dll!RegisterClipboardFormatA + 4 0000000076540afe 1 byte [ED]
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\USER32.dll!BeginPaint 0000000076541361 5 bytes JMP 0000000163e0b407
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\USER32.dll!ValidateRect 0000000076547849 5 bytes JMP 0000000163ff7d4f
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\SHELL32.dll!SHParseDisplayName 0000000075787edb 5 bytes JMP 0000000163ee72ec
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!OleLoadFromStream 0000000076c06143 5 bytes JMP 00000001645852e2
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!CoResumeClassObjects + 7 0000000076c0ea09 7 bytes JMP 000000016b65e370
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!OleRun 0000000076c107de 5 bytes JMP 000000016b65de9e
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!CoRegisterClassObject 0000000076c121e1 5 bytes JMP 000000016b661745
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!OleUninitialize 0000000076c1eba1 6 bytes JMP 000000016b65de15
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!OleInitialize 0000000076c1efd7 5 bytes JMP 000000016b65ddcd
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!CoGetClassObject 0000000076c354ad 5 bytes JMP 000000016b65fdbb
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!CoInitializeEx 0000000076c409ad 5 bytes JMP 000000016b65dd6d
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!CoUninitialize 0000000076c486d3 5 bytes JMP 000000016b6607cf
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!CoCreateInstance 0000000076c49d0b 5 bytes JMP 000000016b6614ec
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!CoCreateInstanceEx 0000000076c49d4e 5 bytes JMP 000000016b65f3c7
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!CoSuspendClassObjects + 7 0000000076c6baf9 7 bytes JMP 000000016b65dee6
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!CoRevokeClassObject 0000000076c8eabf 5 bytes JMP 000000016b65fa7c
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!CoGetInstanceFromFile 0000000076cc352c 5 bytes JMP 000000016b6608cf
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\ole32.dll!OleRegEnumFormatEtc 0000000076d0d0f1 5 bytes JMP 000000016b65de56
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\oleaut32.dll!SysFreeString 0000000074f63e59 5 bytes JMP 0000000163e2a2e7
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\oleaut32.dll!VariantClear 0000000074f63eae 5 bytes JMP 0000000163e4c3d3
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\oleaut32.dll!SysAllocStringByteLen 0000000074f64731 5 bytes JMP 0000000163ed6e75
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\oleaut32.dll!VariantChangeType 0000000074f65dee 5 bytes JMP 0000000163ee0845
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\oleaut32.dll!RegisterActiveObject 0000000074f927a6 5 bytes JMP 000000016b6603db
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\oleaut32.dll!RevokeActiveObject 0000000074f9329c 5 bytes JMP 000000016b65dd25
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\oleaut32.dll!GetActiveObject 0000000074fa8f68 5 bytes JMP 000000016b66056f
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077431401 2 bytes JMP 74e7b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077431419 2 bytes JMP 74e7b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077431431 2 bytes JMP 74ef8f29 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007743144a 2 bytes CALL 74e5489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774314dd 2 bytes JMP 74ef8822 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774314f5 2 bytes JMP 74ef89f8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007743150d 2 bytes JMP 74ef8718 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077431525 2 bytes JMP 74ef8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007743153d 2 bytes JMP 74e6fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077431555 2 bytes JMP 74e768ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007743156d 2 bytes JMP 74ef8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077431585 2 bytes JMP 74ef8b42 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007743159d 2 bytes JMP 74ef86dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774315b5 2 bytes JMP 74e6fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774315cd 2 bytes JMP 74e7b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774316b2 2 bytes JMP 74ef8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774316bd 2 bytes JMP 74ef8671 C:\Windows\syswow64\kernel32.dll
? C:\Windows\system32\mssprxy.dll [7880] entry point in ".rdata" section 000000006e3e71e6
.text C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE[7880] C:\Program Files\Microsoft Office 15\Root\Office15\outlrpc.dll!MAPIRevokeMoniker@4 + 657 000000006d17287c 4 bytes [40, 3A, 3C, 2E]
? C:\Windows\System32\NLSData0000.dll [7880] entry point in ".rdata" section 0000000057c6c541
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3876] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000772cdc80 16 bytes [50, 48, B8, 18, F0, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadToken 00000000772cddf0 16 bytes [50, 48, B8, 70, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 00000000772cde10 48 bytes [50, 48, B8, EC, EE, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3876] C:\Windows\SYSTEM32\ntdll.dll!NtUnmapViewOfSection 00000000772cde50 16 bytes [50, 48, B8, 3C, F0, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadTokenEx 00000000772cdea0 32 bytes [50, 48, B8, 94, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 00000000772cdee0 16 bytes [50, 48, B8, 7C, EE, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3876] C:\Windows\SYSTEM32\ntdll.dll!NtQueryAttributesFile 00000000772cdf80 16 bytes [50, 48, B8, C4, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3876] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile 00000000772ce100 16 bytes [50, 48, B8, 40, ED, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessToken 00000000772ceb70 16 bytes [50, 48, B8, 10, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 00000000772cebc0 16 bytes [50, 48, B8, 4C, EF, 52, 3F, ...]
.text C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3876] C:\Windows\SYSTEM32\ntdll.dll!NtQueryFullAttributesFile 00000000772ced10 16 bytes [50, 48, B8, D8, EF, 52, 3F, ...]
---- Threads - GMER 2.1 ----
Thread C:\Windows\system32\svchost.exe [1468:6748] 000007feed470360
Thread C:\Windows\system32\svchost.exe [1468:6944] 000007feed46fba4
Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [6692:7036] 000007fefc002bf8
Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [6692:7044] 000007feee4d5648
Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [6692:7052] 000007feee4d5648
Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [6692:6280] 000007fef7f15124
Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [6692:4644] 000007feee436590
Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [6692:1628] 000007feee4d5648
---- Processes - GMER 2.1 ----
Library C:\Program Files (x86)\Common Files\Microsoft Shared\Office15\mso.dll (*** suspicious ***) @ C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE [7880] 0000000063dd0000
Library C:\Program Files (x86)\Common Files\Microsoft Shared\Office15\riched20.dll (*** suspicious ***) @ C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE [7880] 000000006b300000
Library C:\Program Files (x86)\Common Files\Microsoft Shared\Office15\MSPTLS.DLL (*** suspicious ***) @ C:\Program Files\Microsoft Office 15\root\office15\OUTLOOK.EXE [7880] 0000000067bb0000
---- Registry - GMER 2.1 ----
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\402cf4e33633
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\402cf4e33633 (not active ControlSet)
---- EOF - GMER 2.1 ---- |