akumasama
05-06-2014, 08:30
Ho disattivato Ipv2 e Netbios, non so se serve per la nostra rete (è una rete basata su dominio), mi informerò.
Qui sotto il log di Gmer. Vedo che tira fuori un sacco di roba dall'account utent "Senio-Local" che però manco viene usato, fu un account creato una tantum manco mi ricordo per quale motivo, ma non è l'account utente normalmente in uso che dovrebbe essere rotondi_s ed è un account di rete (ma ovviamente con una cartella specifica dentro a c:\Utenti)
Io continuo a non capire come mai sia così difficile togliere quei due script rundll dagli scheduled tasks.
Porca miseria ESET Sys Inspector me li mostra, me li fa vedere... perchè non posso toglierli in nessun modo?
Poi le porte 445 e 139 non so come chiuderle, consigli? Non posso farlo tramite Windows Firewall, non c'è modo di farlo via CMD?
GMER 2.1.19357 - http://www.gmer.net
Rootkit scan 2014-06-05 08:24:58
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 ST3500413AS rev.JC45 465,76GB
Running: gmer.exe; Driver: C:\Users\ROTOND~1\AppData\Local\Temp\kgldapoc.sys
---- Kernel code sections - GMER 2.1 ----
INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 544 fffff80002e05000 45 bytes [00, 00, 23, 02, 4E, 53, 49, ...]
INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 591 fffff80002e0502f 16 bytes [00, 58, 40, E3, 06, 80, FA, ...]
---- User code sections - GMER 2.1 ----
.text C:\Windows\system32\csrss.exe[448] C:\Windows\SYSTEM32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\wininit.exe[524] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\csrss.exe[536] C:\Windows\SYSTEM32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\services.exe[572] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\winlogon.exe[612] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\lsass.exe[640] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\lsm.exe[648] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\svchost.exe[768] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\svchost.exe[872] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\atiesrxx.exe[932] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\System32\svchost.exe[996] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\System32\svchost.exe[284] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\svchost.exe[404] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\svchost.exe[444] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\svchost.exe[1040] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\atieclxx.exe[1156] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\svchost.exe[1228] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\System32\spoolsv.exe[1488] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\svchost.exe[1524] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\svchost.exe[1556] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1648] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[1756] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[1756] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe[1756] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe[1860] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Windows\System32\svchost.exe[1900] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\System32\svchost.exe[1940] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\svchost.exe[1968] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\svchost.exe[2040] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[1276] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2132] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\taskhost.exe[2252] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\Dwm.exe[2360] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\Explorer.EXE[2372] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\wbem\wmiprvse.exe[2472] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\taskeng.exe[2656] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Program Files\Microsoft Mouse and Keyboard Center\ipoint.exe[2772] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\svchost.exe[2996] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2416] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2416] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe[2416] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
? C:\Windows\system32\mssprxy.dll [2416] entry point in ".rdata" section 000000006dd871e6
.text C:\Windows\system32\SearchIndexer.exe[2908] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3168] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Program Files\AVAST Software\Avast\avastui.exe[3252] C:\Windows\syswow64\kernel32.dll!SetUnhandledExceptionFilter 00000000752387b1 8 bytes [31, C0, C2, 04, 00, 90, 90, ...]
.text C:\Program Files\AVAST Software\Avast\avastui.exe[3252] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Program Files\AVAST Software\Avast\avastui.exe[3252] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Program Files\AVAST Software\Avast\avastui.exe[3252] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3260] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[3292] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\System32\svchost.exe[3956] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe[3272] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\wbem\unsecapp.exe[4480] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\wbem\wmiprvse.exe[4384] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1772] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Program Files (x86)\OCS Inventory Agent\OcsService.exe[4260] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[3556] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Users\ROTOND~1\AppData\Local\Temp\0572827\1251860.exe[2024] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Windows\system32\taskhost.exe[820] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter4.exe[2872] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Windows\system32\taskeng.exe[5252] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3928] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 00000001000301f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3928] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 00000001000303fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3928] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3928] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3928] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
? C:\Windows\system32\mssprxy.dll [3928] entry point in ".rdata" section 000000006dd871e6
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0x11d628; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0x11d668; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 7 bytes {MOV EDX, 0x11d5a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 7 bytes {MOV EDX, 0x11d528; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0x11d728; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0x11d768; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0x11d6e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0x11d6a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0x11d468; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0x11d4a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0x11d428; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 7 bytes {MOV EDX, 0x11d5e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 7 bytes {MOV EDX, 0x11d568; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0x11d4e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 00000001001d01f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 00000001001d03fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[1656] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0x373e28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0x373e68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 7 bytes {MOV EDX, 0x373da8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 7 bytes {MOV EDX, 0x373d28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0x373f28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0x373f68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0x373ee8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0x373ea8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0x373c68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0x373ca8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0x373c28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 7 bytes {MOV EDX, 0x373de8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 7 bytes {MOV EDX, 0x373d68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0x373ce8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 00000001004501f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 00000001004503fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5728] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0xf92228; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0xf92268; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 7 bytes {MOV EDX, 0xf921a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 7 bytes {MOV EDX, 0xf92128; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0xf92328; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0xf92368; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0xf922e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0xf922a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0xf92068; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0xf920a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0xf92028; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 7 bytes {MOV EDX, 0xf921e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 7 bytes {MOV EDX, 0xf92168; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0xf920e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 00000001010701f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 00000001010703fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[6040] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0x400628; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0x400668; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 7 bytes {MOV EDX, 0x4005a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 7 bytes {MOV EDX, 0x400528; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0x400728; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0x400768; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0x4006e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0x4006a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0x400468; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0x4004a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0x400428; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 7 bytes {MOV EDX, 0x4005e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 7 bytes {MOV EDX, 0x400568; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0x4004e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 00000001004d01f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 00000001004d03fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[4180] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0xf19628; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0xf19668; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 7 bytes {MOV EDX, 0xf195a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 7 bytes {MOV EDX, 0xf19528; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0xf19728; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0xf19768; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0xf196e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0xf196a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0xf19468; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0xf194a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0xf19428; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 7 bytes {MOV EDX, 0xf195e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 7 bytes {MOV EDX, 0xf19568; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0xf194e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 0000000100ff01f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 0000000100ff03fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3804] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0xc1da28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0xc1da68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 7 bytes {MOV EDX, 0xc1d9a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 7 bytes {MOV EDX, 0xc1d928; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0xc1db28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0xc1db68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0xc1dae8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0xc1daa8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0xc1d868; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0xc1d8a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0xc1d828; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 7 bytes {MOV EDX, 0xc1d9e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 7 bytes {MOV EDX, 0xc1d968; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0xc1d8e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 0000000100ce01f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 0000000100ce03fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5404] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0x85da28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0x85da68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 7 bytes {MOV EDX, 0x85d9a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 7 bytes {MOV EDX, 0x85d928; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0x85db28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0x85db68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0x85dae8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0x85daa8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0x85d868; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0x85d8a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0x85d828; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 7 bytes {MOV EDX, 0x85d9e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 7 bytes {MOV EDX, 0x85d968; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0x85d8e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 00000001009201f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 00000001009203fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5188] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0x747e28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0x747e68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 7 bytes {MOV EDX, 0x747da8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 7 bytes {MOV EDX, 0x747d28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0x747f28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0x747f68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0x747ee8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0x747ea8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0x747c68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0x747ca8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0x747c28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 7 bytes {MOV EDX, 0x747de8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 7 bytes {MOV EDX, 0x747d68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0x747ce8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 00000001008501f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 00000001008503fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3600] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0x118e28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0x118e68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 2 bytes [BA, A8]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 8 000000007720fc28 4 bytes {ADC [RAX], EAX; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 2 bytes [BA, 28]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 8 000000007720fc40 4 bytes {ADC [RAX], EAX; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0x118f28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0x118f68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0x118ee8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0x118ea8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0x118c68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0x118ca8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0x118c28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 2 bytes [BA, E8]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 8 00000000772110c8 4 bytes {ADC [RAX], EAX; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 2 bytes [BA, 68]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 8 0000000077211140 4 bytes {ADC [RAX], EAX; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0x118ce8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 00000001002101f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 00000001002103fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5272] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0x609628; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0x609668; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 7 bytes {MOV EDX, 0x6095a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 7 bytes {MOV EDX, 0x609528; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0x609728; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0x609768; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0x6096e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0x6096a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0x609468; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0x6094a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0x609428; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 7 bytes {MOV EDX, 0x6095e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 7 bytes {MOV EDX, 0x609568; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0x6094e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 00000001006d01f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 00000001006d03fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5380] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0xa1ae28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0xa1ae68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 7 bytes {MOV EDX, 0xa1ada8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 7 bytes {MOV EDX, 0xa1ad28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0xa1af28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0xa1af68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0xa1aee8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0xa1aea8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0xa1ac68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0xa1aca8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0xa1ac28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 7 bytes {MOV EDX, 0xa1ade8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 7 bytes {MOV EDX, 0xa1ad68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0xa1ace8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 3 bytes JMP 0000000100ae01f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll + 4 000000007722c4e1 1 byte [89]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 0000000100ae03fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[3964] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 000000007720f9b1 7 bytes {MOV EDX, 0x3aea28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5 000000007720fbf5 7 bytes {MOV EDX, 0x3aea68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5 000000007720fc25 7 bytes {MOV EDX, 0x3ae9a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5 000000007720fc3d 7 bytes {MOV EDX, 0x3ae928; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5 000000007720fc55 7 bytes {MOV EDX, 0x3aeb28; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5 000000007720fc85 7 bytes {MOV EDX, 0x3aeb68; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5 000000007720fd05 7 bytes {MOV EDX, 0x3aeae8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5 000000007720fd1d 7 bytes {MOV EDX, 0x3aeaa8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5 000000007720fd69 7 bytes {MOV EDX, 0x3ae868; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5 000000007720fe61 7 bytes {MOV EDX, 0x3ae8a8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5 00000000772100b9 7 bytes {MOV EDX, 0x3ae828; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5 00000000772110c5 7 bytes {MOV EDX, 0x3ae9e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5 000000007721113d 7 bytes {MOV EDX, 0x3ae968; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile + 5 0000000077211341 7 bytes {MOV EDX, 0x3ae8e8; JMP RDX}
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 000000007722c4dd 5 bytes JMP 00000001004001f8
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077231287 5 bytes JMP 00000001004003fc
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075651465 2 bytes [65, 75]
.text C:\Users\Senio-local\AppData\Local\Google\Chrome\Application\chrome.exe[5248] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000756514bb 2 bytes [65, 75]
.text ... * 2
.text C:\Windows\system32\AUDIODG.EXE[1928] C:\Windows\System32\kernel32.dll!GetBinaryTypeW + 189 000000007698eecd 1 byte [62]
.text C:\Users\ROTOND~1\AppData\Local\Temp\Rar$EXa0.586\gmer.exe[3832] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 000000007525a30a 1 byte [62]
---- Threads - GMER 2.1 ----
Thread C:\Program Files\Microsoft Mouse and Keyboard Center\itype.exe [2792:2988] 000007fef5fc3e0c
Thread C:\Program Files\Microsoft Mouse and Keyboard Center\itype.exe [2792:2332] 000007fef5fc3e0c
Thread C:\Program Files\Microsoft Mouse and Keyboard Center\itype.exe [2792:2652] 000007fef4b7bc60
---- Processes - GMER 2.1 ----
Process C:\Users\ROTOND~1\AppData\Local\Temp\Rar$EXa0.586\gmer.exe (*** suspicious ***) @ C:\Users\ROTOND~1\AppData\Local\Temp\Rar$EXa0.586\gmer.exe [3832](2014-06-05 06:11:20) 0000000000400000
---- EOF - GMER 2.1 ----
Nel frattempo ho finito la scansione avanzata (durata un secolo) con Emsisoft e mi ha trovato DownadupJob.A (B) e Downadup.Gen (B).
Eliminati entrambi.
Ha dovuto riavviare per cancellare alcuni file.)
Bene - adesso esegui un scan dei file , per una sistemattina -certo se tempo lo permette :
sfc /scannow
Ha appena riavviato e nel frattempo ho notato che gli scheduled rundll relativi al file pijsapoq.xrl.qualcosa sono scomparsi.
Imaggino che proprio questo era il trabochetto del virus.Se ritorna ,vuol dire che esiste ancora da qualche parte , criptato e obfuscato, e non vorrei dirti di peggio , ma se non molla , sara da rifare il windows.
Boh? Se entro qualche giorno non mi ricompare direi che l'ho eliminato.
Netbios cmq lo tengo disattivato.
Bene ,per chiudere la 139 vai su scheda di rete -proprieta scheda e cerca "Protocollo internet versione 4 (TCP/IPv4), selezionarlo e cliccare su proprietà
Dalla finestra che si apre -vai su avanzate e troverai spuntata la voce - netBIOS su TCP/IP -togli la spunta e la porta e chiusa .
Lo stesso per la porta 445 che e per condivisione file in rete - semplicemente i stessi passi seguiti per la 139 e togli la spunta .Condivisione file e stampanti per reti Microsoft
A prescindere che sia stato eliminato del tutto o meno, mi rimangono i seguenti dubbi:
1) Come cavolo è possibile che mi sia beccato quest'infezione con firewall su firewall e antivirus attivo? Viene dall'esterno oppure è possibile che sia stato un attacco automatizzato da un PC infetto dentro alla LAN?
2) Come mai tutti questi nomi diversi? Avast lo rilevava come ho scritto nel titolo, altri software rilevavano Conficker, Emsisoft ha rilevato Downadup (che è una versione modificata del Conficker in verità quindi torna come cosa).
Il motto dei hacker in giorno d'oggi e - "non esiste computer che non puo essere virusato,e l'unico computer che magari da dei problemi e solo quello che non ha acesso internet ,ma neanche quello" Quindi , che ci siano dubbi oppure no ,il fatto e che il tuo computer era virussato fin'ora.Si spaccano codici di crittografia delle banche che sono molto ben sviluppati , immagina una rete aziendale o peggio una casalinga.
Mi verrebbe da pensare che Avast faccia cagare al caxxo.
Qui nella rete abbiamo Sophos enterprise, ma su questo PC (che è un PC secondario temporaneo di mia proprietà) c'è Avast. E' il mio vecchio PC desktop in pratica (su quello nuovo che ho a casa invece uso Nod32)
Se una persona o un gruppo ha avuto ideea di inserire un script che si rifa ,senza moltiplicarsi ,immagina che i antivirus sono come dei cagnolini piccolini che hanno d'avanti il lupo. Gia i cani hanno paura del lupi :D
A questo punto ,chiama il tuo tecnico o la ditta che ti offre servizi aziendali e chiedili cortesemente di eseguirti dei pentest per verificare tutte le brecce che la tua rete la puo avere.
vBulletin® v3.6.4, Copyright ©2000-2025, Jelsoft Enterprises Ltd.