>Hooks
ntfs.sys-->ntkrnlpa.exe-->IoCreateDevice, Type: IAT modification at address 0xF2670C8C hook handler located in [unknown_code_page]
ntkrnlpa.exe+0x00020174, Type: Inline - RelativeJump at address 0x804F8174 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe+0x00020438, Type: Inline - RelativeJump at address 0x804F8438 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->FsRtlCheckLockForReadAccess, Type: Inline - RelativeJump at address 0x804EAE14 hook handler located in [klif.sys]
ntkrnlpa.exe-->IoCreateDevice, Type: EAT modification at address 0x80663770 hook handler located in [unknown_code_page]
ntkrnlpa.exe-->IoIsOperationSynchronous, Type: Inline - RelativeJump at address 0x804EF54E hook handler located in [klif.sys]
ntkrnlpa.exe-->KeAttachProcess, Type: Inline - RelativeJump at address 0x804F853C hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->KeStackAttachProcess, Type: Inline - RelativeJump at address 0x804F8638 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtDeviceIoControlFile, Type: Inline - RelativeJump at address 0x8056E2FC hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtOpenProcess, Type: Inline - RelativeJump at address 0x805C0B56 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtOpenSection, Type: Inline - RelativeJump at address 0x8059F258 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtProtectVirtualMemory, Type: Inline - RelativeJump at address 0x805AD4C6 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtReadVirtualMemory, Type: Inline - RelativeJump at address 0x805A91D0 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtWriteFile, Type: Inline - RelativeJump at address 0x805720A0 hook handler located in [dump_wmimmc.sys]
ntkrnlpa.exe-->NtWriteVirtualMemory, Type: Inline - RelativeJump at address 0x805A92DA hook handler located in [dump_wmimmc.sys]