Das ist echt witzig. Hatte ich gemacht. Nun denn jetzt nochmal einzeln. :heilig: Code:
Kaspersky Bericht
22.10.2014 01.33.07;Gefährdetes Objekt (Datei) wurde gefunden;c:\program files (x86)\nitro\pro 8\nitropdf.exe;c:\program files (x86)\nitro\pro 8\nitropdf.exe;53473;Schwachstelle;10/22/2014 01:33:07
22.10.2014 00.11.15;Gefundenes Objekt (Datei) ist nicht mehr verfügbar;C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\34WJUHZN\setup_mbot_de[1].exe//data0003;C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\34WJUHZN\setup_mbot_de[1].exe//data0003;not-a-virus:AdWare.Win32.Eorezo.eid;Adware;10/22/2014 00:11:15
22.10.2014 01.33.07;Gefährdetes Objekt (Datei) wurde gefunden;c:\program files\videolan\vlc\vlc.exe;c:\program files\videolan\vlc\vlc.exe;59285;Schwachstelle;10/22/2014 01:33:07
22.10.2014 00.11.14;Gefundenes Objekt (Datei) ist nicht mehr verfügbar;C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\7TB32FUI\dest4[1].html;C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\7TB32FUI\dest4[1].html;HEUR:Trojan-Downloader.Script.Generic;Trojanisches Programm;10/22/2014 00:11:14
22.10.2014 00.11.14;Gefundenes Objekt (Datei) ist nicht mehr verfügbar;C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\34WJUHZN\setup_mbot_de[1].exe//data0001;C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\34WJUHZN\setup_mbot_de[1].exe//data0001;not-a-virus:AdWare.Win32.Eorezo.eid;Adware;10/22/2014 00:11:14
22.10.2014 00.11.14;Gefundenes Objekt (Datei) ist nicht mehr verfügbar;C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\34WJUHZN\setup_mbot_de[1].exe//data0000;C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\34WJUHZN\setup_mbot_de[1].exe//data0000;not-a-virus:AdWare.Win32.Eorezo.eod;Adware;10/22/2014 00:11:14
22.10.2014 00.11.14;Gefundenes Objekt (Datei) ist nicht mehr verfügbar;C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\7TB32FUI\banner[1].htm;C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\7TB32FUI\banner[1].htm;HEUR:Trojan-Downloader.Script.Generic;Trojanisches Programm;10/22/2014 00:11:14
22.10.2014 00.11.15;Gefundenes Objekt (Datei) ist nicht mehr verfügbar;C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\7TB32FUI\pixel[1];C:\Documents and Settings\Beate\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\7TB32FUI\pixel[1];HEUR:Trojan-Downloader.Script.Generic;Trojanisches Programm;10/22/2014 00:11:15
21.10.2014 19.13.10;Gefundenes Objekt (Prozessspeicher) ist nicht aktiv;c:\users\beate\downloads\exe\windows mail\windows%20live%20mail.exe;c:\users\beate\downloads\exe\windows mail\windows%20live%20mail.exe;PDM:Trojan.Win32.Generic;Legales Programm, das von einem Angreifer benutzt werden kann, um den Computer oder die Benutzerdaten zu beschädigen;10/21/2014 19:13:10 GMER Logfile: Code:
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-10-23 12:57:01
Windows 6.2.9200 x64 \Device\Harddisk0\DR0 -> \Device\00000035 ST1000LM014-SSHD-8GB rev.LVD3 931,51GB
Running: Gmer-19357.exe; Driver: C:\Users\Beate\AppData\Local\Temp\axtiypow.sys
---- User code sections - GMER 2.1 ----
.text C:\WINDOWS\system32\nvvsvc.exe[1108] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007ffe362a169a 4 bytes [2A, 36, FE, 7F]
.text C:\WINDOWS\system32\nvvsvc.exe[1108] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007ffe362a16a2 4 bytes [2A, 36, FE, 7F]
.text C:\WINDOWS\system32\nvvsvc.exe[1108] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118 00007ffe362a181a 4 bytes [2A, 36, FE, 7F]
.text C:\WINDOWS\system32\nvvsvc.exe[1108] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142 00007ffe362a1832 4 bytes [2A, 36, FE, 7F]
.text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[5892] C:\WINDOWS\SYSTEM32\WSOCK32.dll!setsockopt + 194 00007ffe1a961f6a 4 bytes [96, 1A, FE, 7F]
.text C:\Program Files (x86)\Bluetooth Suite\BtvStack.exe[5892] C:\WINDOWS\SYSTEM32\WSOCK32.dll!setsockopt + 218 00007ffe1a961f82 4 bytes [96, 1A, FE, 7F]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffe36742bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffe36742d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffe36742ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffe36743757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffe36743878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffe3674425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffe36744a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffe36744a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffe36744cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffe36745030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffe3674511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffe36746693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffe36746964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffe36746b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffe3674740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffe367475c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffe3674a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffe3674a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffe3674a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffe3674ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffe3674b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffe3674b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffe3674b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffe3674b648 8 bytes [10, 6A, DE, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffe3674b88c 8 bytes [F0, 69, DE, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffe3674b98c 8 bytes [E0, 69, DE, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffe3674bc38 8 bytes [B0, 69, DE, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffe3674be94 8 bytes [A0, 69, DE, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffe367c1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffe367c18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffe367c18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffe367c1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffe367c1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffe367c2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffe367c2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffe367c2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 0000000077bb137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077bb1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077bb1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077bb1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077bb1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 0000000077bb17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000077bb17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077bb1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077bb1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077bb1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077bb2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077bb2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\NvTmru.exe[6064] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077bb2c43 8 bytes [7C, 68, DE, 7F, 00, 00, 00, ...]
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[5676] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007ffe362a169a 4 bytes [2A, 36, FE, 7F]
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[5676] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007ffe362a16a2 4 bytes [2A, 36, FE, 7F]
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[5676] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118 00007ffe362a181a 4 bytes [2A, 36, FE, 7F]
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[5676] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142 00007ffe362a1832 4 bytes [2A, 36, FE, 7F]
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[6340] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007ffe362a169a 4 bytes [2A, 36, FE, 7F]
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[6340] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007ffe362a16a2 4 bytes [2A, 36, FE, 7F]
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[6340] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118 00007ffe362a181a 4 bytes [2A, 36, FE, 7F]
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[6340] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142 00007ffe362a1832 4 bytes [2A, 36, FE, 7F]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffe36742bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffe36742d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffe36742ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffe36743757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffe36743878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffe3674425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffe36744a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffe36744a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffe36744cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffe36745030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffe3674511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffe36746693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffe36746964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffe36746b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffe3674740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffe367475c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffe3674a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffe3674a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffe3674a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffe3674ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffe3674b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffe3674b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffe3674b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffe3674b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffe3674b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffe3674b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffe3674bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffe3674be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffe367c1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffe367c18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffe367c18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffe367c1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffe367c1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffe367c2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffe367c2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffe367c2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 0000000077bb137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077bb1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077bb1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077bb1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077bb1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 0000000077bb17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000077bb17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077bb1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077bb1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077bb1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077bb2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077bb2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe[6408] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077bb2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffe36742bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffe36742d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffe36742ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffe36743757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffe36743878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffe3674425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffe36744a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffe36744a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffe36744cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffe36745030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffe3674511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffe36746693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffe36746964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffe36746b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffe3674740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffe367475c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffe3674a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffe3674a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffe3674a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffe3674ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffe3674b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffe3674b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffe3674b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffe3674b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffe3674b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffe3674b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffe3674bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffe3674be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffe367c1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffe367c18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffe367c18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffe367c1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffe367c1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffe367c2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffe367c2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffe367c2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 0000000077bb137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077bb1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077bb1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077bb1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077bb1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 0000000077bb17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000077bb17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077bb1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077bb1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077bb1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077bb2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077bb2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\YouCam\YouCamTray.exe[6476] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077bb2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffe36742bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffe36742d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffe36742ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffe36743757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffe36743878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffe3674425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffe36744a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffe36744a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffe36744cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffe36745030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffe3674511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffe36746693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffe36746964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffe36746b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffe3674740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffe367475c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffe3674a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffe3674a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffe3674a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffe3674ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffe3674b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffe3674b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffe3674b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffe3674b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffe3674b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffe3674b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffe3674bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffe3674be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffe367c1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffe367c18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffe367c18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffe367c1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffe367c1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffe367c2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffe367c2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffe367c2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 0000000077bb137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077bb1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077bb1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077bb1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077bb1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 0000000077bb17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000077bb17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077bb1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077bb1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077bb1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077bb2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077bb2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Lenovo\PowerDVD10\PDVD10Serv.exe[6492] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077bb2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffe36742bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffe36742d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffe36742ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffe36743757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffe36743878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffe3674425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffe36744a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffe36744a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffe36744cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffe36745030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffe3674511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffe36746693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffe36746964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffe36746b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffe3674740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffe367475c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffe3674a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffe3674a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffe3674a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffe3674ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffe3674b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffe3674b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffe3674b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffe3674b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffe3674b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffe3674b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffe3674bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffe3674be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffe367c1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffe367c18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffe367c18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffe367c1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffe367c1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffe367c2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffe367c2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffe367c2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 0000000077bb137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077bb1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077bb1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077bb1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077bb1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 0000000077bb17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000077bb17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077bb1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077bb1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077bb1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077bb2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077bb2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Cyberlink\Shared files\brs.exe[6532] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077bb2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffe36742bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffe36742d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffe36742ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffe36743757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffe36743878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffe3674425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffe36744a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffe36744a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffe36744cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffe36745030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffe3674511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffe36746693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffe36746964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffe36746b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffe3674740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffe367475c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffe3674a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffe3674a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffe3674a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffe3674ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffe3674b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffe3674b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffe3674b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffe3674b648 8 bytes [10, 6A, 1D, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffe3674b88c 8 bytes [F0, 69, 1D, 7F, 00, 00, 00, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffe3674b98c 8 bytes [E0, 69, 1D, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffe3674bc38 8 bytes [B0, 69, 1D, 7F, 00, 00, 00, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffe3674be94 8 bytes [A0, 69, 1D, 7F, 00, 00, 00, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffe367c1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffe367c18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffe367c18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffe367c1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffe367c1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffe367c2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffe367c2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffe367c2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 0000000077bb137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077bb1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077bb1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077bb1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077bb1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 0000000077bb17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000077bb17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077bb1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077bb1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077bb1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077bb2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077bb2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe[6584] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077bb2c43 8 bytes [7C, 68, 1D, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffe36742bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffe36742d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffe36742ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffe36743757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffe36743878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffe3674425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffe36744a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffe36744a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffe36744cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffe36745030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffe3674511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffe36746693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffe36746964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffe36746b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffe3674740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffe367475c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffe3674a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffe3674a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffe3674a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffe3674ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffe3674b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffe3674b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffe3674b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffe3674b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffe3674b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffe3674b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffe3674bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffe3674be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffe367c1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffe367c18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffe367c18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffe367c1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffe367c1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffe367c2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffe367c2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffe367c2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 0000000077bb137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077bb1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077bb1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077bb1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077bb1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 0000000077bb17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000077bb17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077bb1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077bb1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077bb1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077bb2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077bb2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6616] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077bb2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffe36742bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffe36742d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffe36742ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffe36743757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffe36743878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffe3674425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffe36744a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffe36744a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffe36744cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffe36745030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffe3674511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffe36746693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffe36746964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffe36746b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffe3674740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffe367475c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffe3674a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffe3674a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffe3674a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffe3674ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffe3674b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffe3674b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffe3674b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffe3674b648 8 bytes [10, 6A, C2, 7E, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffe3674b88c 8 bytes [F0, 69, C2, 7E, 00, 00, 00, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffe3674b98c 8 bytes [E0, 69, C2, 7E, 00, 00, 00, ...]
.text ... * 2
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffe3674bc38 8 bytes [B0, 69, C2, 7E, 00, 00, 00, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffe3674be94 8 bytes [A0, 69, C2, 7E, 00, 00, 00, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffe367c1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffe367c18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffe367c18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffe367c1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffe367c1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffe367c2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffe367c2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffe367c2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 0000000077bb137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077bb1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077bb1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077bb1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077bb1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 0000000077bb17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000077bb17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077bb1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077bb1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077bb1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077bb2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077bb2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[3016] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077bb2c43 8 bytes [7C, 68, C2, 7E, 00, 00, 00, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 112 00007ffe36742bd4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDecompressBuffer + 432 00007ffe36742d14 8 bytes {JMP 0xffffffffffffffd8}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlPrefixString + 428 00007ffe36742ee8 16 bytes {JMP 0xffffffffffffffb8}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 415 00007ffe36743757 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrGetDllPath + 704 00007ffe36743878 8 bytes {JMP 0xffffffffffffffd3}
.text ... * 2
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll + 280 00007ffe3674425c 8 bytes {JMP 0xffffffffffffffbb}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 91 00007ffe36744a2b 8 bytes {JMP 0xffffffffffffffde}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlReleasePath + 132 00007ffe36744a54 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateTagHeap + 312 00007ffe36744cfc 8 bytes {JMP 0xffffffffffffffb1}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 52 00007ffe36745030 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlTryEnterCriticalSection + 291 00007ffe3674511f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrCaptureMessageBuffer + 75 00007ffe36746693 8 bytes {JMP 0xffffffffffffffde}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwRegisterTraceGuidsA + 48 00007ffe36746964 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007ffe36746b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlQueryResourcePolicy + 199 00007ffe3674740f 8 bytes {JMP 0xffffffffffffffe8}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventRegister + 67 00007ffe367475c7 8 bytes {JMP 0xffffffffffffffe5}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwNotificationRegister + 559 00007ffe3674a8b3 8 bytes {JMP 0xffffffffffffff9e}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 12 00007ffe3674a8c8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDllShutdownInProgress + 264 00007ffe3674a9c4 8 bytes {JMP 0xffffffffffffffe1}
.text ... * 3
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRandomEx + 160 00007ffe3674ad90 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 543 00007ffe3674b157 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRunOnceComplete + 736 00007ffe3674b218 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007ffe3674b57c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 448 00007ffe3674b648 8 bytes [10, 6A, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 448 00007ffe3674b88c 8 bytes [F0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeCriticalSectionEx + 704 00007ffe3674b98c 8 bytes [E0, 69, F8, 7F, 00, 00, 00, ...]
.text ... * 2
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateActivationContextStack + 288 00007ffe3674bc38 8 bytes [B0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlRegisterWait + 596 00007ffe3674be94 8 bytes [A0, 69, F8, 7F, 00, 00, 00, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007ffe367c1740 8 bytes {JMP QWORD [RIP-0x75dba]}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007ffe367c18c0 8 bytes {JMP QWORD [RIP-0x75eda]}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007ffe367c18f0 8 bytes {JMP QWORD [RIP-0x762ae]}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007ffe367c1a10 8 bytes {JMP QWORD [RIP-0x7618a]}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007ffe367c1ac0 8 bytes {JMP QWORD [RIP-0x76403]}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007ffe367c2180 8 bytes {JMP QWORD [RIP-0x762f2]}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007ffe367c2480 8 bytes {JMP QWORD [RIP-0x7684e]}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007ffe367c2d00 8 bytes {JMP QWORD [RIP-0x771f6]}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 0000000077bb137d 16 bytes {JMP 0xffffffffffffffd3}
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077bb1512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077bb1551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077bb1577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077bb1784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 0000000077bb17c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 0000000077bb17e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077bb1834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077bb1841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077bb1a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077bb2ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077bb2c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\Beate\Downloads\exe\Farbar Recovery Scan Tool FRST64\GMER\Gmer-19357.exe[7984] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077bb2c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
---- User IAT/EAT - GMER 2.1 ----
IAT C:\WINDOWS\Explorer.EXE[4748] @ C:\WINDOWS\system32\RPCRT4.dll[ntdll.dll!NtAlpcConnectPortEx] [57a944b0] C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.0\x64\prremote.dll
IAT C:\Program Files\Internet Explorer\IEXPLORE.EXE[3252] @ C:\WINDOWS\system32\RPCRT4.dll[ntdll.dll!NtAlpcConnectPortEx] [57a944b0] C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 15.0.0\x64\prremote.dll
---- Threads - GMER 2.1 ----
Thread C:\WINDOWS\system32\csrss.exe [768:4568] fffff960008b9b90
Thread C:\WINDOWS\Explorer.EXE [4748:5528] 00007ffe2844d73c
Thread C:\Windows\System32\SettingSyncHost.exe [4880:4224] 00007ffe2b344b30
---- Processes - GMER 2.1 ----
Process C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe (*** suspicious ***) @ C:\Users\Beate\AppData\Roaming\InetStat\inetstat.exe [6408](2014-10-21 17:46:55) 0000000000400000
Process C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe (*** suspicious ***) @ C:\Users\Beate\AppData\Local\ConvertAd\ConvertAd.exe [6584](2014-10-21 21:44:52) 0000000000af0000
---- Disk sectors - GMER 2.1 ----
Disk \Device\Harddisk0\DR0 unknown MBR code
---- EOF - GMER 2.1 ---- --- --- --- |