ntoskrnl.exe-->KiAttachProcess, Type: Inline - RelativeJump at address 0x804EC7DA hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->KiMoveApcState, Type: Inline - RelativeJump at address 0x804EC869 hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->NtProtectVirtualMemory, Type: Inline - RelativeJump at address 0x80575045 hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->NtOpenSection, Type: Inline - RelativeJump at address 0x8057869B hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->NtWriteFile, Type: Inline - RelativeJump at address 0x805790D5 hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe+0x0001A4C1, Type: Inline - RelativeJump at address 0x804F24C1 hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe+0x0001A550, Type: Inline - RelativeJump at address 0x804F2550 hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->KeAttachProcess, Type: Inline - RelativeJump at address 0x804F2595 hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->KeStackAttachProcess, Type: Inline - RelativeJump at address 0x804F4F95 hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->NtDeviceIoControlFile, Type: Inline - RelativeJump at address 0x805899A6 hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->NtOpenProcess, Type: Inline - RelativeJump at address 0x8058270A hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->NtOpenSection, Type: Inline - RelativeJump at address 0x8057B8B5 hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->NtProtectVirtualMemory, Type: Inline - RelativeJump at address 0x80582891 hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->NtReadVirtualMemory, Type: Inline - RelativeJump at address 0x805894CA hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->NtWriteFile, Type: Inline - RelativeJump at address 0x8058076D hook handler located in [dump_wmimmc.sys]
ntoskrnl.exe-->NtWriteVirtualMemory, Type: Inline - RelativeJump at address 0x805895C2 hook handler located in [dump_wmimmc.sys]