killi199 | 06.06.2015 12:26 | Code:
0000000076ae15cd 2 bytes JMP 75a6b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\ASUS\AI Suite II\Wi-Fi GO!\AsDLNAServerReal.exe[10928] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ae16b2 2 bytes JMP 75ae8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\ASUS\AI Suite II\Wi-Fi GO!\AsDLNAServerReal.exe[10928] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ae16bd 2 bytes JMP 75ae8671 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ae1401 2 bytes JMP 75a6b21b C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ae1419 2 bytes JMP 75a6b346 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ae1431 2 bytes JMP 75ae8f29 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ae144a 2 bytes CALL 75a4489d C:\Windows\syswow64\KERNEL32.dll
.text ... * 9
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ae14dd 2 bytes JMP 75ae8822 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ae14f5 2 bytes JMP 75ae89f8 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ae150d 2 bytes JMP 75ae8718 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ae1525 2 bytes JMP 75ae8ae2 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ae153d 2 bytes JMP 75a5fca8 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ae1555 2 bytes JMP 75a668ef C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ae156d 2 bytes JMP 75ae8fe3 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ae1585 2 bytes JMP 75ae8b42 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ae159d 2 bytes JMP 75ae86dc C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ae15b5 2 bytes JMP 75a5fd41 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ae15cd 2 bytes JMP 75a6b2dc C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ae16b2 2 bytes JMP 75ae8ea4 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-UpdaterService.exe[11148] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ae16bd 2 bytes JMP 75ae8671 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExW + 17 0000000076ae1401 2 bytes JMP 75a6b21b C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!EnumProcessModules + 17 0000000076ae1419 2 bytes JMP 75a6b346 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 17 0000000076ae1431 2 bytes JMP 75ae8f29 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 42 0000000076ae144a 2 bytes CALL 75a4489d C:\Windows\syswow64\KERNEL32.dll
.text ... * 9
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!EnumDeviceDrivers + 17 0000000076ae14dd 2 bytes JMP 75ae8822 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameA + 17 0000000076ae14f5 2 bytes JMP 75ae89f8 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!QueryWorkingSetEx + 17 0000000076ae150d 2 bytes JMP 75ae8718 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameW + 17 0000000076ae1525 2 bytes JMP 75ae8ae2 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameW + 17 0000000076ae153d 2 bytes JMP 75a5fca8 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!EnumProcesses + 17 0000000076ae1555 2 bytes JMP 75a668ef C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetProcessMemoryInfo + 17 0000000076ae156d 2 bytes JMP 75ae8fe3 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetPerformanceInfo + 17 0000000076ae1585 2 bytes JMP 75ae8b42 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!QueryWorkingSet + 17 0000000076ae159d 2 bytes JMP 75ae86dc C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameA + 17 0000000076ae15b5 2 bytes JMP 75a5fd41 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExA + 17 0000000076ae15cd 2 bytes JMP 75a6b2dc C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 20 0000000076ae16b2 2 bytes JMP 75ae8ea4 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\BlueStacks\HD-Service.exe[10796] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 31 0000000076ae16bd 2 bytes JMP 75ae8671 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ae1401 2 bytes JMP 75a6b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ae1419 2 bytes JMP 75a6b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ae1431 2 bytes JMP 75ae8f29 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ae144a 2 bytes CALL 75a4489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ae14dd 2 bytes JMP 75ae8822 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ae14f5 2 bytes JMP 75ae89f8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ae150d 2 bytes JMP 75ae8718 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ae1525 2 bytes JMP 75ae8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ae153d 2 bytes JMP 75a5fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ae1555 2 bytes JMP 75a668ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ae156d 2 bytes JMP 75ae8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ae1585 2 bytes JMP 75ae8b42 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ae159d 2 bytes JMP 75ae86dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ae15b5 2 bytes JMP 75a5fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ae15cd 2 bytes JMP 75a6b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ae16b2 2 bytes JMP 75ae8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Steam\bin\steamwebhelper.exe[9996] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ae16bd 2 bytes JMP 75ae8671 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExW + 17 0000000076ae1401 2 bytes JMP 75a6b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!EnumProcessModules + 17 0000000076ae1419 2 bytes JMP 75a6b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 17 0000000076ae1431 2 bytes JMP 75ae8f29 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 42 0000000076ae144a 2 bytes CALL 75a4489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!EnumDeviceDrivers + 17 0000000076ae14dd 2 bytes JMP 75ae8822 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameA + 17 0000000076ae14f5 2 bytes JMP 75ae89f8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!QueryWorkingSetEx + 17 0000000076ae150d 2 bytes JMP 75ae8718 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameW + 17 0000000076ae1525 2 bytes JMP 75ae8ae2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameW + 17 0000000076ae153d 2 bytes JMP 75a5fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!EnumProcesses + 17 0000000076ae1555 2 bytes JMP 75a668ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetProcessMemoryInfo + 17 0000000076ae156d 2 bytes JMP 75ae8fe3 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetPerformanceInfo + 17 0000000076ae1585 2 bytes JMP 75ae8b42 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!QueryWorkingSet + 17 0000000076ae159d 2 bytes JMP 75ae86dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameA + 17 0000000076ae15b5 2 bytes JMP 75a5fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExA + 17 0000000076ae15cd 2 bytes JMP 75a6b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 20 0000000076ae16b2 2 bytes JMP 75ae8ea4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Common Files\Steam\SteamService.exe[4608] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 31 0000000076ae16bd 2 bytes JMP 75ae8671 C:\Windows\syswow64\kernel32.dll
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000774a13ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 00000000774a1544 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000774a18ce 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 00000000774a1ba8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 00000000774a1d25 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 00000000774a1e8f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 00000000774a1f75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 00000000774a2238 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 531 00000000774a2683 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000774a26a0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000774a26c2 8 bytes {JMP 0x10}
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 00000000774a271f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 184 00000000774a2788 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 4
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 00000000774a2b4b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 375 00000000774a2b97 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 00000000774a306b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 920 00000000774a31f8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 00000000774a388e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 00000000774a38e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 00000000774a39b5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 00000000774a3f50 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 161 00000000774a4001 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 277 00000000774a4075 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 214 00000000774a41b6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 276 00000000774a41f4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 609 00000000774a4461 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 284 00000000774a464c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 483 00000000774a4713 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 231 00000000774a4807 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 518 00000000774a4926 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlDeactivateActivationContext + 256 00000000774a4a50 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContext + 67 00000000774a4aa3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContextEx + 501 00000000774a4ca5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateUserThread + 256 00000000774a4ea0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringExW + 247 00000000774a4fa7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringW + 483 00000000774a5193 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseAlpcCompletion + 438 00000000774a5f46 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!EtwEventProviderEnabled + 198 00000000774a6016 8 bytes [70, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!atol + 194 00000000774a610e 8 bytes [60, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!qsort + 76 00000000774a62fc 8 bytes [50, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlLookupElementGenericTableFullAvl + 45 00000000774a633d 8 bytes [40, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 4 00000000774a6354 8 bytes [30, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 92 00000000774a63ac 8 bytes [20, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!RtlSubtreePredecessor + 790 00000000774a6b76 8 bytes [10, 6C, F8, FF, 00, 00, 00, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000774edc80 8 bytes {JMP QWORD [RIP-0x47949]}
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00000000774ede00 8 bytes {JMP QWORD [RIP-0x47ab2]}
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00000000774ede30 8 bytes {JMP QWORD [RIP-0x47e20]}
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00000000774edf50 8 bytes {JMP QWORD [RIP-0x47c5a]}
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00000000774ee000 8 bytes {JMP QWORD [RIP-0x47ef8]}
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00000000774ee630 8 bytes {JMP QWORD [RIP-0x47102]}
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00000000774ee880 8 bytes {JMP QWORD [RIP-0x47d10]}
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000774ef0e0 8 bytes JMP 3f3f3f3f
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074f313cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074f3146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074f316d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074f319db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074f319fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\AppData\Local\Google\Chrome\Application\chrome.exe[24512] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074f31a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000774a13ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 00000000774a1544 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000774a18ce 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 00000000774a1ba8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 00000000774a1d25 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 00000000774a1e8f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 00000000774a1f75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 00000000774a2238 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 531 00000000774a2683 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000774a26a0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000774a26c2 8 bytes {JMP 0x10}
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 00000000774a271f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 184 00000000774a2788 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 4
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 00000000774a2b4b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 375 00000000774a2b97 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 00000000774a306b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 920 00000000774a31f8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 00000000774a388e 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 00000000774a38e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 00000000774a39b5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 00000000774a3f50 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 161 00000000774a4001 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetNameFromLangInfoNode + 277 00000000774a4075 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 214 00000000774a41b6 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlpIsQualifiedLanguage + 276 00000000774a41f4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlpNtOpenKey + 609 00000000774a4461 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 284 00000000774a464c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberOfSetBitsUlongPtr + 483 00000000774a4713 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 231 00000000774a4807 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!TpWaitForWait + 518 00000000774a4926 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlDeactivateActivationContext + 256 00000000774a4a50 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContext + 67 00000000774a4aa3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlActivateActivationContextEx + 501 00000000774a4ca5 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateUserThread + 256 00000000774a4ea0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringExW + 247 00000000774a4fa7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlIpv6AddressToStringW + 483 00000000774a5193 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!TpReleaseAlpcCompletion + 438 00000000774a5f46 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!EtwEventProviderEnabled + 198 00000000774a6016 8 bytes [70, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!atol + 194 00000000774a610e 8 bytes [60, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!qsort + 76 00000000774a62fc 8 bytes [50, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlLookupElementGenericTableFullAvl + 45 00000000774a633d 8 bytes [40, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 4 00000000774a6354 8 bytes [30, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlNumberGenericTableElementsAvl + 92 00000000774a63ac 8 bytes [20, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!RtlSubtreePredecessor + 790 00000000774a6b76 8 bytes [10, 6C, F8, 7E, 00, 00, 00, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000774edc80 8 bytes {JMP QWORD [RIP-0x47949]}
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00000000774ede00 8 bytes {JMP QWORD [RIP-0x47ab2]}
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00000000774ede30 8 bytes {JMP QWORD [RIP-0x47e20]}
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00000000774edf50 8 bytes {JMP QWORD [RIP-0x47c5a]}
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00000000774ee000 8 bytes {JMP QWORD [RIP-0x47ef8]}
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00000000774ee630 8 bytes {JMP QWORD [RIP-0x47102]}
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00000000774ee880 8 bytes {JMP QWORD [RIP-0x47d10]}
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000774ef0e0 8 bytes {JMP QWORD [RIP-0x48d3a]}
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000074f313cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000074f3146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000074f316d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000074f319db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000074f319fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\killi199\Downloads\ylgv54n1.exe[25744] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000074f31a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
---- Threads - GMER 2.1 ----
Thread C:\Windows\SysWOW64\ntdll.dll [4136:4140] 0000000000a41716
Thread C:\Windows\SysWOW64\ntdll.dll [4136:4452] 0000000070737c20
Thread C:\Windows\SysWOW64\ntdll.dll [4136:11956] 000000005bd2aec5
Thread C:\Windows\SysWOW64\ntdll.dll [4136:12052] 000000006a3c784b
---- Processes - GMER 2.1 ----
Library c:\users\killi199\appdata\local\temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmph8rjjs.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256](2015-06-06 08:10:34) 00000000039c0000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\Qt5Core.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-03-04 21:45:24) 0000000051890000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\icuin52.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (ICU I18N DLL/The ICU Project)(2015-03-04 21:45:30) 000000004a900000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\icuuc52.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (ICU Common DLL/The ICU Project)(2015-03-04 21:45:30) 0000000005cd0000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\icudt52.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (ICU Data DLL/The ICU Project)(2015-03-04 21:45:30) 000000004ad00000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\Qt5Widgets.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-03-04 21:45:28) 0000000050700000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\Qt5Gui.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-03-04 21:45:26) 0000000050410000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\libGLESv2.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256](2015-03-04 21:45:30) 0000000050350000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\Qt5Network.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-03-04 21:45:26) 0000000050070000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\Qt5WebKit.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-03-04 21:45:26) 0000000006990000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\Qt5Quick.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-03-04 21:45:26) 0000000005f90000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\Qt5Qml.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-03-04 21:45:26) 0000000065070000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\Qt5Sql.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-03-04 21:45:26) 0000000077840000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\libEGL.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256](2015-03-04 21:45:30) 000000005a8f0000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\Qt5WebKitWidgets.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-03-04 21:45:28) 0000000077810000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\Qt5OpenGL.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-03-04 21:45:26) 0000000062110000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\Qt5PrintSupport.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-03-04 21:45:26) 000000000fb60000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\plugins\platforms\qwindows.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256](2015-03-04 21:45:30) 000000000f5f0000
Library C:\Users\killi199\AppData\Roaming\Dropbox\bin\plugins\imageformats\qjpeg.dll (*** suspicious ***) @ C:\Users\killi199\AppData\Roaming\Dropbox\bin\Dropbox.exe [4256](2015-03-04 21:45:30) 000000000f300000
---- Registry - GMER 2.1 ----
Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{0EA1D5B8-4B77-41AB-94F4-8911B0268218}@LeaseObtainedTime 1433581181
Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{0EA1D5B8-4B77-41AB-94F4-8911B0268218}@T1 1433581308
Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{0EA1D5B8-4B77-41AB-94F4-8911B0268218}@T2 1433581404
Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{0EA1D5B8-4B77-41AB-94F4-8911B0268218}@LeaseTerminatesTime 1433581436
---- EOF - GMER 2.1 ---- Danke im voraus für eure Hilfe :) |