Welcome to MalwareRemoval.com,
What if we told you that you could get malware removal help from experts, and that it was 100% free? MalwareRemoval.com provides free support for people with infected computers. Our help, and the tools we use are always 100% free. No hidden catch. We simply enjoy helping others. You enjoy a clean, safe computer.

Malware Removal Instructions

Help Needed In the removal of Win32.Trojan-gen,Win32 etc

MalwareRemoval.com provides free support for people with infected computers. Using plain language that anyone can understand, our community of volunteer experts will walk you through each step.

Help Needed In the removal of Win32.Trojan-gen,Win32 etc

Unread postby Pronitron » September 9th, 2008, 12:02 pm

Hey.When I run my antivirus product, Avast Antivirus I find 3 infections win32.Trojan-Gen, win32.Rootkit-Gen and win32.agent and when I try and quarantine these infections or delete them (tried in Safe Mode and Avast Boot scan) it says error 42111 "the operation is not supported for this type of archive" and doesn't let me do anything with these trojans.I would very much like someones help please in the removal of these infections Here is my Hijackthis log and I have also uploaded my avast log after so you can see which folders are infected, because I cannot find these folders anywhere on my computer.Thank you very much for your time and any help would be greatly appreciated as I'm told these are backdoor hacker infections.

Here is my Hijackthis log

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 16:08:11, on 09/09/2008
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal

Running processes:
C:\Windows\System32\smss.exe
C:\Windows\system32\csrss.exe
C:\Windows\system32\wininit.exe
C:\Windows\system32\services.exe
C:\Windows\system32\lsass.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
C:\Program Files\PC Tools Firewall Plus\FWService.exe
C:\Program Files\Spyware Doctor\pctsAuxs.exe
C:\Program Files\Spyware Doctor\pctsSvc.exe
C:\Windows\system32\svchost.exe
C:\Program Files\ThreatFire\TFService.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
C:\Windows\system32\WUDFHost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\iPod\bin\iPodService.exe
c:\windows\system32\inetsrv\w3wp.exe
C:\Windows\system32\csrss.exe
C:\Windows\system32\winlogon.exe
C:\Windows\system32\rundll32.exe
C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe
C:\Program Files\Logitech\QuickCam\Quickcam.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Program Files\Alwil Software\Avast4\ashDisp.exe
C:\Program Files\ThreatFire\TFTray.exe
C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Skype\Phone\Skype.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe
C:\Program Files\Skype\Plugin Manager\skypePM.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Microsoft Office\Office12\MSPUB.EXE
C:\Windows\system32\wbem\wmiprvse.exe
C:\Users\Ifan\Downloads\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Skype add-on (mastermind) - {22BF413B-C6D2-4d91-82A9-A0F997BA588C} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.1.1119.1736\swg.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [amd_dc_opt] C:\Program Files\AMD\Dual-Core Optimizer\amd_dc_opt.exe
O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"
O4 - HKLM\..\Run: [ISTray] "C:\Program Files\Spyware Doctor\pctsTray.exe"
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [LogitechCommunicationsManager] "C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe"
O4 - HKLM\..\Run: [LogitechQuickCamRibbon] "C:\Program Files\Logitech\QuickCam\Quickcam.exe" /hide
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [P17Helper] Rundll32 P17.dll,P17Helper
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [ThreatFire] C:\Program Files\ThreatFire\TFTray.exe
O4 - HKLM\..\Run: [00PCTFW] "C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe" -s
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [P17RunE] RunDll32 P17RunE.dll,RunDLLEntry
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-21-4087570461-1196769236-1156445644-1002\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun (User 'Donna')
O4 - Startup: OneNote 2007 Screen Clipper and Launcher.lnk = C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~4.0_0\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~4.0_0\bin\ssv.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Skype - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O13 - Gopher Prefix:
O16 - DPF: {138E6DC9-722B-4F4B-B09D-95D191869696} (Bebo Uploader Control) - http://www.bebo.com/files/BeboUploader.5.1.4.cab
O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://download.divx.com/player/DivXBrowserPlugin.cab
O16 - DPF: {AF2E62B6-F9E1-4D4F-A10A-9DC8E6DCBCC0} (VideoEgg ActiveX Loader) - http://update.videoegg.com/Install/Wind ... lisher.exe
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LVCOMSer - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
O23 - Service: LVSrvLauncher - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\SrvLnch\SrvLnch.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe
O23 - Service: PC Tools Firewall Plus (PCToolsFirewallPlus) - PC Tools - C:\Program Files\PC Tools Firewall Plus\FWService.exe
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files\Common Files\Steam\SteamService.exe
O23 - Service: ThreatFire - PC Tools - C:\Program Files\ThreatFire\TFService.exe

Here is my Avast Antivirus 4.8 log

24/08/2008 15:24:28 SYSTEM 1628 Function setifaceUpdatePackages() has failed. Return code is 0x2000000B, dwRes is 2000000B.
24/08/2008 15:24:28 SYSTEM 1628 An error has occured while attempting to update. Please check the logs.
24/08/2008 15:36:56 Ifan 4448 Function setifaceUpdatePackages() has failed. Return code is 0x2000000B, dwRes is 2000000B.
24/08/2008 15:39:50 Ifan 6932 Function setifaceUpdatePackages() has failed. Return code is 0x2000000B, dwRes is 2000000B.
24/08/2008 16:11:54 SYSTEM 1636 Function setifaceUpdatePackages() has failed. Return code is 0x2000000B, dwRes is 2000000B.
24/08/2008 16:11:55 SYSTEM 1636 An error has occured while attempting to update. Please check the logs.
24/08/2008 18:53:10 SYSTEM 1692 Function setifaceUpdatePackages() has failed. Return code is 0x2000000B, dwRes is 2000000B.
24/08/2008 18:53:10 SYSTEM 1692 An error has occured while attempting to update. Please check the logs.
24/08/2008 19:58:21 SYSTEM 1772 Function setifaceUpdatePackages() has failed. Return code is 0x2000000B, dwRes is 2000000B.
24/08/2008 19:58:23 SYSTEM 1772 An error has occured while attempting to update. Please check the logs.
24/08/2008 20:09:24 Ifan 7952 Function setifaceUpdatePackages() has failed. Return code is 0x2000000B, dwRes is 2000000B.
24/08/2008 23:14:55 SYSTEM 1560 Function setifaceUpdatePackages() has failed. Return code is 0x2000000B, dwRes is 2000000B.
24/08/2008 23:14:56 SYSTEM 1560 An error has occured while attempting to update. Please check the logs.
24/08/2008 23:20:30 Ifan 4780 Function setifaceUpdatePackages() has failed. Return code is 0x2000000B, dwRes is 2000000B.
25/08/2008 09:01:41 SYSTEM 1596 AAVM: VPS load failed, trying to get a fresh copy...
25/08/2008 09:02:21 SYSTEM 1596 Function setifaceUpdatePackages() has failed. Return code is 0x20000004, dwRes is 20000004.
25/08/2008 09:02:21 SYSTEM 1596 aswServ::AavmStart ERROR...
25/08/2008 09:08:39 SYSTEM 1596 Function setifaceUpdatePackages() has failed. Return code is 0x2000000B, dwRes is 2000000B.
25/08/2008 09:08:39 SYSTEM 1596 An error has occured while attempting to update. Please check the logs.
25/08/2008 09:17:50 SYSTEM 1620 AAVM: VPS load failed, trying to get a fresh copy...
25/08/2008 09:25:04 SYSTEM 1596 AAVM: VPS load failed, trying to get a fresh copy...
25/08/2008 09:25:41 SYSTEM 1596 Function setifaceUpdatePackages() has failed. Return code is 0x2000000B, dwRes is 2000000B.
25/08/2008 09:25:42 SYSTEM 1596 aswServ::AavmStart ERROR...
25/08/2008 10:22:05 SYSTEM 1588 AAVM: VPS load failed, trying to get a fresh copy...
25/08/2008 10:22:22 SYSTEM 1588 Function setifaceUpdateFiles() has failed. Return code is 0x20000011, dwRes is 20000011.
25/08/2008 10:22:22 SYSTEM 1588 aswServ::AavmStart ERROR...
27/08/2008 17:26:12 SYSTEM 1600 AAVM: VPS load failed, trying to get a fresh copy...
27/08/2008 17:35:44 SYSTEM 1504 AAVM: VPS load failed, trying to get a fresh copy...
27/08/2008 17:36:12 SYSTEM 1504 aswServ::AavmStart ERROR...
02/09/2008 15:11:16 SYSTEM 1580 Sign of "Win32:Rootkit-gen [Rtk]" has been found in "C:\Program Files\PCHealthCenter\7.exe" file.
02/09/2008 15:11:24 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\xrdwbfgn.dll" file.
02/09/2008 15:11:32 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\dgksvbpn.dll" file.
02/09/2008 15:11:35 SYSTEM 1580 Sign of "BV:Vapsup-A" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\install.bat" file.
02/09/2008 15:11:40 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\sxmaokgf.exe" file.
02/09/2008 15:11:48 SYSTEM 1580 Sign of "Win32:Vapsup-EB [Adw]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\vanwxemggxa.dll" file.
02/09/2008 15:11:48 SYSTEM 1580 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Program Files\PCHealthCenter.exe" file.
02/09/2008 15:11:53 SYSTEM 1580 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Program Files\PCHealthCenter\2.exe" file.
02/09/2008 15:11:55 SYSTEM 1580 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Program Files\PCHealthCenter\4.exe" file.
02/09/2008 15:11:57 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\nsb33BE.tmp" file.
02/09/2008 15:12:10 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\xrdwbfgn.dll" file.
02/09/2008 15:12:13 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\dgksvbpn.dll" file.
02/09/2008 15:12:20 SYSTEM 1580 Sign of "BV:Vapsup-A" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\install.bat" file.
02/09/2008 15:12:22 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\sxmaokgf.exe" file.
02/09/2008 15:12:23 SYSTEM 1580 Sign of "Win32:Vapsup-EB [Adw]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\vanwxemggxa.dll" file.
02/09/2008 15:12:23 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\nsbE782.tmp" file.
02/09/2008 15:13:01 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\xrdwbfgn.dll" file.
02/09/2008 15:13:06 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\dgksvbpn.dll" file.
02/09/2008 15:13:07 SYSTEM 1580 Sign of "BV:Vapsup-A" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\install.bat" file.
02/09/2008 15:13:08 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\sxmaokgf.exe" file.
02/09/2008 15:13:09 SYSTEM 1580 Sign of "Win32:Vapsup-EB [Adw]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\vanwxemggxa.dll" file.
02/09/2008 15:13:10 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\nsrAED6.tmp" file.
02/09/2008 15:13:49 SYSTEM 1580 Sign of "Win32:Zlob-APQ [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\xrdwbfgn.dll" file.
02/09/2008 15:13:56 SYSTEM 1580 Sign of "BV:Vapsup-A" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\install.bat" file.
02/09/2008 15:13:59 SYSTEM 1580 Sign of "Win32:Vapsup-EB [Adw]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\vanwxemgbdp.dll" file.
02/09/2008 15:14:02 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\esvq.exe" file.
02/09/2008 15:14:03 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\sxmaokgf.exe" file.
02/09/2008 15:14:04 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\dgksvbpn.dll" file.
02/09/2008 15:14:04 SYSTEM 1580 Sign of "Win32:Zlob-APQ [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\nsh6D06.tmp" file.
02/09/2008 15:14:38 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\xrdwbfgn.dll" file.
02/09/2008 15:14:42 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\dgksvbpn.dll" file.
02/09/2008 15:14:42 SYSTEM 1580 Sign of "BV:Vapsup-A" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\install.bat" file.
02/09/2008 15:14:43 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\sxmaokgf.exe" file.
02/09/2008 15:14:43 SYSTEM 1580 Sign of "Win32:Vapsup-EB [Adw]" has been found in "C:\Users\Ifan\AppData\Local\Temp\ac8zt2\vanwxemggxa.dll" file.
02/09/2008 15:14:44 SYSTEM 1580 Sign of "Win32:Vapsup-IM [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\nsc2D29.tmp" file.
02/09/2008 15:15:50 SYSTEM 1580 Sign of "Win32:Rootkit-gen [Rtk]" has been found in "globalroot\systemroot\system32\tdssadw.dll" file.
02/09/2008 16:16:09 Ifan 13248 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Windows\Downloaded Program Files\VideoEggPublisher.exe\$PROGRAMFILES\VideoEgg\updater.exe" file.
03/09/2008 19:49:57 SYSTEM 1680 Sign of "Win32:Bravix [Drp]" has been found in "C:\Windows\System32\tdssserf.dll" file.
03/09/2008 19:50:27 SYSTEM 1680 Sign of "Win32:Bravix [Drp]" has been found in "C:\Windows\System32\tdssserf.dll" file.
03/09/2008 19:50:32 SYSTEM 1680 Sign of "Win32:Bravix [Drp]" has been found in "C:\Windows\System32\tdsslog.dll" file.
03/09/2008 19:50:33 SYSTEM 1680 Sign of "Win32:Bravix [Drp]" has been found in "C:\Windows\System32\tdsslog.dll" file.
03/09/2008 20:05:02 Donna 5916 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Program Files\PCHealthCenter\1.exe" file.
03/09/2008 20:06:44 Donna 5916 Sign of "Win32:Spyware-gen [Trj]" has been found in "C:\Program Files\PCHealthCenter\3.exe" file.
03/09/2008 21:07:35 Ifan 1012 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\$WINDOWS.~Q\DATA\Users\Ifan\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Ifan\AppData\Local\Temp\IDC1.tmp\[1]VideoEggPublisher[1].exe\$PROGRAMFILES\VideoEgg\updater.exe" file.
03/09/2008 21:28:19 Ifan 1012 Sign of "Win32:Rootkit-gen [Rtk]" has been found in "C:\$WINDOWS.~Q\DATA\Users\Ifan\AppData\Local\Temp\STOPzilla!\SZPro5.msi\Instal01.cab\SZKGSys" file.
03/09/2008 21:46:22 Ifan 1012 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Program Files\PCHealthCenter\1.exe" file.
03/09/2008 22:06:54 Ifan 1012 Sign of "Win32:Spyware-gen [Trj]" has been found in "C:\Program Files\PCHealthCenter\3.exe" file.
03/09/2008 22:06:54 Ifan 1012 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Program Files\PCHealthCenter\5.exe\MSA.cpl" file.
03/09/2008 22:06:54 Ifan 1012 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Program Files\PCHealthCenter\5.exe\MSA.exe" file.
03/09/2008 22:20:40 Ifan 1012 Sign of "Win32:Rootkit-gen [Rtk]" has been found in "C:\Users\Ifan\AppData\Local\Temp\lwpwer.exe\7.exe" file.
03/09/2008 22:20:40 Ifan 1012 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Users\Ifan\AppData\Local\Temp\lwpwer.exe.exe" file.
03/09/2008 22:20:40 Ifan 1012 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Users\Ifan\AppData\Local\Temp\lwpwer.exe\1.exe" file.
03/09/2008 22:20:40 Ifan 1012 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Users\Ifan\AppData\Local\Temp\lwpwer.exe\2.exe" file.
03/09/2008 22:20:40 Ifan 1012 Sign of "Win32:Spyware-gen [Trj]" has been found in "C:\Users\Ifan\AppData\Local\Temp\lwpwer.exe\3.exe" file.
03/09/2008 22:20:40 Ifan 1012 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Users\Ifan\AppData\Local\Temp\lwpwer.exe\4.exe" file.
03/09/2008 22:20:40 Ifan 1012 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Users\Ifan\AppData\Local\Temp\lwpwer.exe\5.exe\MSA.cpl" file.
03/09/2008 22:20:40 Ifan 1012 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\Users\Ifan\AppData\Local\Temp\lwpwer.exe\5.exe\MSA.exe" file.
04/09/2008 09:28:05 SYSTEM 1612 Sign of "Win32:Adware-gen [Adw]" has been found in "http://thedownloadvid.com/get/6xxx3913555/Keygen.Driver.Scanner.2009.2.0.0.20.exe" file.
04/09/2008 09:28:13 SYSTEM 1612 Sign of "Win32:Adware-gen [Adw]" has been found in "C:\Users\Ifan\AppData\Local\Mozilla\Firefox\Profiles\10orxfdx.default\Cache\D4F29F17d01" file.
04/09/2008 09:28:22 SYSTEM 1612 Sign of "Win32:Adware-gen [Adw]" has been found in "C:\Users\Ifan\AppData\Local\Temp\1uiJDJga.exe.part" file.
06/09/2008 14:33:51 Ifan 3028 Sign of "Win32:Trojan-gen {Other}" has been found in "C:\$WINDOWS.~Q\DATA\Users\Ifan\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Ifan\AppData\Local\Temp\IDC1.tmp\[1]VideoEggPublisher[1].exe\$PROGRAMFILES\VideoEgg\updater.exe" file.
06/09/2008 15:46:19 Ifan 3028 Sign of "Win32:Rootkit-gen [Rtk]" has been found in "C:\$WINDOWS.~Q\DATA\Users\Ifan\AppData\Local\Temp\STOPzilla!\SZPro5.msi\Instal01.cab\SZKGSys" file.
07/09/2008 12:26:41 Ifan 4768 Sign of "Win32:Rootkit-gen [Rtk]" has been found in "C:\$WINDOWS.~Q\DATA\Users\Ifan\AppData\Local\Temp\STOPzilla!\SZPro5.msi\Instal01.cab\SZKGSys" file.
Pronitron
Active Member
 
Posts: 4
Joined: September 9th, 2008, 11:45 am
Advertisement
Register to Remove

Re: Help Needed In the removal of Win32.Trojan-gen,Win32 etc

Unread postby Shaba » September 11th, 2008, 5:49 am

Hi Pronitron

* Download GMER from
here:
Unzip it and start GMER.exe
Click the rootkit-tab and click scan.

Once done, click the Copy button.
This will copy the results to clipboard.
Paste the results in your next reply.
User avatar
Shaba
Admin/Teacher Emeritus
 
Posts: 26974
Joined: March 24th, 2006, 4:42 am
Location: Finland

Re: Help Needed In the removal of Win32.Trojan-gen,Win32 etc

Unread postby Pronitron » September 12th, 2008, 11:13 am

GMER 1.0.14.14536 - http://www.gmer.net
Rootkit scan 2008-09-11 17:31:55
Windows 6.0.6001 Service Pack 1


---- System - GMER 1.0.14 ----

SSDT 9DAA4000 ZwAlpcConnectPort
SSDT 9DAA4005 ZwAssignProcessToJobObject
SSDT 9DAA400A ZwConnectPort
SSDT 9DAA400F ZwCreateFile
SSDT 9DAA4019 ZwCreateProcess
SSDT 9DAA401E ZwCreateProcessEx
SSDT 9DAA4023 ZwCreateThread
SSDT 9DAA402D ZwDebugActiveProcess
SSDT 9DAA4032 ZwDuplicateObject
SSDT 9DAA4037 ZwLoadDriver
SSDT 9DAA403C ZwOpenKey
SSDT 9DAA4041 ZwOpenSection
SSDT 9DAA4046 ZwOpenThread
SSDT 9DAA4050 ZwProtectVirtualMemory
SSDT 9DAA404B ZwResumeThread
SSDT 9DAA4055 ZwSecureConnectPort
SSDT 9DAA405A ZwSetValueKey
SSDT 9DAA405F ZwSuspendProcess
SSDT 9DAA4064 ZwTerminateProcess
SSDT 9DAA4069 ZwWriteVirtualMemory
SSDT 9DAA4028 ZwCreateThreadEx
SSDT 9DAA4014 ZwCreateUserProcess

---- Kernel code sections - GMER 1.0.14 ----

.text ntkrnlpa.exe!KeSetTimerEx + 370 81CFF9C4 4 Bytes [ 00, 40, AA, 9D ]
.text ntkrnlpa.exe!KeSetTimerEx + 3C4 81CFFA18 4 Bytes [ 05, 40, AA, 9D ]
.text ntkrnlpa.exe!KeSetTimerEx + 3F4 81CFFA48 4 Bytes [ 0A, 40, AA, 9D ]
.text ntkrnlpa.exe!KeSetTimerEx + 40C 81CFFA60 4 Bytes [ 0F, 40, AA, 9D ]
.text ntkrnlpa.exe!KeSetTimerEx + 43C 81CFFA90 8 Bytes [ 19, 40, AA, 9D, 1E, 40, AA, ... ]
.text ...
PAGE spsys.sys!?SPVersion@@3PADA + 1A67 9B89503F 240 Bytes [ 8B, FF, 55, 8B, EC, 8B, 45, ... ]
PAGE spsys.sys!?SPVersion@@3PADA + 1B58 9B895130 6 Bytes [ 0E, 83, 78, 14, 01, 75 ]
PAGE spsys.sys!?SPVersion@@3PADA + 1B5F 9B895137 2214 Bytes [ 83, 78, 18, 37, 75, 02, B3, ... ]
PAGE spsys.sys!?SPVersion@@3PADA + 2406 9B8959DE 47 Bytes [ 04, BB, A8, 01, 00, 00, 8D, ... ]
PAGE spsys.sys!?SPVersion@@3PADA + 2436 9B895A0E 44 Bytes [ 05, 00, 00, 39, 54, 8D, D0, ... ]
PAGE ...
? C:\Windows\system32\Drivers\mchInjDrv.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.14 ----

.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\taskeng.exe[264] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\taskeng.exe[264] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\taskeng.exe[264] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\taskeng.exe[264] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\taskeng.exe[264] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\taskeng.exe[264] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[460] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[460] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[460] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[460] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[460] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[460] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\csrss.exe[472] KERNEL32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\wininit.exe[524] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\wininit.exe[524] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\csrss.exe[536] KERNEL32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\services.exe[568] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\services.exe[568] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\services.exe[568] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\services.exe[568] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\lsass.exe[588] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\lsass.exe[588] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\lsm.exe[596] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\lsm.exe[596] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\winlogon.exe[676] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\Dwm.exe[708] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\Dwm.exe[708] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[776] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[776] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\nvvsvc.exe[824] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\nvvsvc.exe[824] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\nvvsvc.exe[824] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\nvvsvc.exe[824] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\nvvsvc.exe[824] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\nvvsvc.exe[824] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[852] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[852] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[888] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[888] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[888] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[888] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[888] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\svchost.exe[888] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5F0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F650F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F620F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spyware Doctor\pctsSvc.exe[964] kernel32.dll!CreateThread + 1A 776346E2 4 Bytes [ D6, 57, E1, 88 ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[1012] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[1012] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[1012] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[1012] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[1012] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[1012] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5F0F5A
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[1052] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[1052] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[1052] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[1052] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[1052] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\svchost.exe[1052] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1068] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1068] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1068] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1068] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1068] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1068] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1232] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1232] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1232] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1232] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1232] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1232] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1360] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1360] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1360] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1360] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1360] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1360] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\rundll32.exe[1396] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\rundll32.exe[1396] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\rundll32.exe[1396] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\rundll32.exe[1396] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\rundll32.exe[1396] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\rundll32.exe[1396] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F650F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F620F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\spoolsv.exe[1884] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\spoolsv.exe[1884] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\spoolsv.exe[1884] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\spoolsv.exe[1884] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\spoolsv.exe[1884] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F5F0F5A
.text C:\Windows\System32\spoolsv.exe[1884] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1908] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1908] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1908] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1908] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1908] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1908] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[2140] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[2140] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[2140] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[2140] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[2140] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[2140] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F650F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F620F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[2280] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[2280] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[2280] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[2280] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[2280] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[2280] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\rundll32.exe[2752] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\rundll32.exe[2752] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\rundll32.exe[2752] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\rundll32.exe[2752] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\rundll32.exe[2752] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\rundll32.exe[2752] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\taskeng.exe[2772] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\taskeng.exe[2772] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\taskeng.exe[2772] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\taskeng.exe[2772] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\taskeng.exe[2772] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\taskeng.exe[2772] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\ehome\ehtray.exe[2848] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\ehome\ehtray.exe[2848] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\ehome\ehtray.exe[2848] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\ehome\ehtray.exe[2848] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\ehome\ehtray.exe[2848] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\ehome\ehtray.exe[2848] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\Explorer.EXE[3032] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\Explorer.EXE[3032] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\Explorer.EXE[3032] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\Explorer.EXE[3032] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\Explorer.EXE[3032] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\Explorer.EXE[3032] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\WUDFHost.exe[3100] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\WUDFHost.exe[3100] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\WUDFHost.exe[3100] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\rundll32.exe[3176] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\rundll32.exe[3176] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\rundll32.exe[3176] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\rundll32.exe[3176] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\rundll32.exe[3176] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\rundll32.exe[3176] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 4D, 5F ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 3B, 5F ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F0D0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F250F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F220F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F100F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F190F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F3D0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F160F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!CreateThread + 1A 776346E2 4 Bytes [ FA, 55, E1, 88 ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F130F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F400F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F340F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F1F0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F460F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F520F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F430F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F1C0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F490F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F370F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F0A0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F4F0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F2B0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F310F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F2E0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F280F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F650F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F620F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\rundll32.exe[3840] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\rundll32.exe[3840] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\rundll32.exe[3840] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\rundll32.exe[3840] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\rundll32.exe[3840] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\rundll32.exe[3840] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F650F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[4776] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[4776] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\taskeng.exe[5052] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\taskeng.exe[5052] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\taskeng.exe[5052] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\taskeng.exe[5052] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\taskeng.exe[5052] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\taskeng.exe[5052] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!OutputDebugStringW 775FE81A 5 Bytes JMP 28001E50 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!SetUnhandledExceptionFilter 77616E2D 5 Bytes JMP 0056DBBD C:\Program Files\Windows Live\Messenger\msnmsgr.exe (Windows Live Messenger/Microsoft Corporation)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!FindResourceExA 776208DD 7 Bytes JMP 28001C20 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!FindResourceA 776209A5 5 Bytes JMP 28001B90 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!CreateEventA 77634AD8 5 Bytes JMP 28001840 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!LockResource 77637F1F 5 Bytes JMP 28001DF0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!FindResourceExW 7763813B 7 Bytes JMP 28001B00 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!LoadResource 77638213 7 Bytes JMP 28001CC0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!FindResourceW 776397C7 5 Bytes JMP 28001A80 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!SizeofResource 776397E5 7 Bytes JMP 28001D80 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ADVAPI32.dll!CryptDeriveKey 762DE6F6 7 Bytes JMP 28001000 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ADVAPI32.dll!CryptDecrypt 762DE8D9 7 Bytes JMP 28001060 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!SetWindowPlacement 761B79BB 5 Bytes JMP 28005840 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!SetWindowRgn 761B95E2 7 Bytes JMP 28005980 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!LoadImageW 761BD61D 5 Bytes JMP 280060C0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!LoadIconW 761BEC94 5 Bytes JMP 280062B0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!CreateWindowExW 761C3D67 5 Bytes JMP 28003820 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!PeekMessageW 761CFD9F 5 Bytes JMP 28004090 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!TrackPopupMenuEx 761E0F4D 5 Bytes JMP 28004970 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!CreateDialogParamW 761E1C58 5 Bytes JMP 28005AC0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!MessageBoxIndirectW 7620D56B 5 Bytes JMP 28005CB0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WS2_32.dll!closesocket 7753330C 5 Bytes JMP 2800A5A0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WS2_32.dll!recv 7753343A 5 Bytes JMP 28009DC0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WS2_32.dll!WSASend 77534496 5 Bytes JMP 2800A360 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WS2_32.dll!send 7753659B 5 Bytes JMP 2800A180 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WS2_32.dll!WSARecv 77538400 5 Bytes JMP 28009F60 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] SHELL32.dll!Shell_NotifyIconW 76A7C808 5 Bytes JMP 28002FE0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ole32.dll!CoRegisterClassObject 765345AC 5 Bytes JMP 28002200 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ole32.dll!CoInitializeEx 7656B89A 5 Bytes JMP 28002100 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WININET.dll!HttpOpenRequestA 764306D6 5 Bytes JMP 28008BE0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WININET.dll!InternetCloseHandle 7643607B 5 Bytes JMP 28008F20 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WININET.dll!InternetReadFile 7643A067 5 Bytes JMP 28008D70 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WININET.dll!HttpSendRequestA 764408C5 5 Bytes JMP 28008E50 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\wuauclt.exe[5860] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\wuauclt.exe[5860] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\wuauclt.exe[5860] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5F0F5A
.text C:\Windows\system32\wuauclt.exe[5860] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\wuauclt.exe[5860] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\wuauclt.exe[5860] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 4D, 5F ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 3B, 5F ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F0D0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F250F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F220F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F100F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F190F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F3D0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F160F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!CreateThread + 1A 776346E2 4 Bytes [ 0E, 62, E1, 88 ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F130F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F400F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F340F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F1F0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F460F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F520F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F430F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F1C0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F490F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F370F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F0A0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F4F0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F2B0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F310F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F2E0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F280F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A

---- User IAT/EAT - GMER 1.0.14 ----

IAT C:\Windows\system32\services.exe[568] @ C:\Windows\system32\services.exe [ADVAPI32.dll!CreateProcessAsUserW] 00170002
IAT C:\Windows\system32\services.exe[568] @ C:\Windows\system32\services.exe [KERNEL32.dll!CreateProcessW] 00170000
IAT C:\Program Files\Spyware Doctor\pctsSvc.exe[964] @ C:\Windows\system32\shell32.dll [KERNEL32.dll!QueueUserWorkItem] [0044A014] C:\Program Files\Spyware Doctor\pctsSvc.exe (PC Tools Security Service/PC Tools)
IAT C:\Program Files\Spyware Doctor\pctsSvc.exe[964] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!QueueUserWorkItem] [0044A014] C:\Program Files\Spyware Doctor\pctsSvc.exe (PC Tools Security Service/PC Tools)
IAT C:\Program Files\Spyware Doctor\pctsTray.exe[3204] @ C:\Windows\system32\shell32.dll [KERNEL32.dll!QueueUserWorkItem] [00449E38] C:\Program Files\Spyware Doctor\pctsTray.exe (PC Tools Tray Application/PC Tools)
IAT C:\Program Files\Spyware Doctor\pctsTray.exe[3204] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!QueueUserWorkItem] [00449E38] C:\Program Files\Spyware Doctor\pctsTray.exe (PC Tools Tray Application/PC Tools)
IAT C:\Program Files\Spyware Doctor\pctsGui.exe[5872] @ C:\Windows\system32\shell32.dll [KERNEL32.dll!QueueUserWorkItem] [0044AA4C] C:\Program Files\Spyware Doctor\pctsGui.exe (PC Tools GUI Application/PC Tools)
IAT C:\Program Files\Spyware Doctor\pctsGui.exe[5872] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!QueueUserWorkItem] [0044AA4C] C:\Program Files\Spyware Doctor\pctsGui.exe (PC Tools GUI Application/PC Tools)

---- Devices - GMER 1.0.14 ----

AttachedDevice \FileSystem\Ntfs \Ntfs TfFsMon.sys (ThreatFire Filesystem Monitor/PC Tools)
AttachedDevice \Driver\tdx \Device\Tcp pctfw2.sys
AttachedDevice \Driver\tdx \Device\Udp pctfw2.sys
AttachedDevice \Driver\tdx \Device\RawIp pctfw2.sys

---- Services - GMER 1.0.14 ----

Service system32\drivers\TDSSserv.sys (*** hidden *** ) [SYSTEM] TDSSserv <-- ROOTKIT !!!

---- Registry - GMER 1.0.14 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\TDSSserv@start 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\TDSSserv@type 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\TDSSserv@imagepath \systemroot\system32\drivers\TDSSserv.sys
Reg HKLM\SYSTEM\ControlSet002\Services\TDSSserv@start 1
Reg HKLM\SYSTEM\ControlSet002\Services\TDSSserv@type 1
Reg HKLM\SYSTEM\ControlSet002\Services\TDSSserv@imagepath \systemroot\system32\drivers\TDSSserv.sys

---- EOF - GMER 1.0.14 ----
Pronitron
Active Member
 
Posts: 4
Joined: September 9th, 2008, 11:45 am

Re: Help Needed In the removal of Win32.Trojan-gen,Win32 etc

Unread postby Shaba » September 12th, 2008, 11:48 am

Yes, we have tdssserv rootkit there.

Run gmer.exe
Click the tab called Processes and click the Safe... button. The computer will reboot and the Gmer screen will open.
Click Files... and browse to the following file:
C:\windows\system32\drivers\TDSSserv.sys
Now click Delete

Now click the Services tab. Click the entries in red one by one with your right mouse button and click Delete... Answer Yes to all the warning windows.
When you've removed all the Service entries in red, reboot your computer.

Re-run gmer.

Post a fresh gmer log, please.
User avatar
Shaba
Admin/Teacher Emeritus
 
Posts: 26974
Joined: March 24th, 2006, 4:42 am
Location: Finland

Re: Help Needed In the removal of Win32.Trojan-gen,Win32 etc

Unread postby Pronitron » September 12th, 2008, 6:26 pm

GMER 1.0.14.14536 - http://www.gmer.net
Rootkit scan 2008-09-12 23:26:03
Windows 6.0.6001 Service Pack 1


---- System - GMER 1.0.14 ----

SSDT 8EFDB000 ZwAlpcConnectPort
SSDT 8EFDB005 ZwAssignProcessToJobObject
SSDT 8EFDB00A ZwConnectPort
SSDT 8EFDB00F ZwCreateFile
SSDT 8EFDB019 ZwCreateProcess
SSDT 8EFDB01E ZwCreateProcessEx
SSDT 8EFDB023 ZwCreateThread
SSDT 8EFDB02D ZwDebugActiveProcess
SSDT 8EFDB032 ZwDuplicateObject
SSDT 8EFDB037 ZwLoadDriver
SSDT 8EFDB03C ZwOpenKey
SSDT 8EFDB041 ZwOpenSection
SSDT 8EFDB046 ZwOpenThread
SSDT 8EFDB050 ZwProtectVirtualMemory
SSDT 8EFDB04B ZwResumeThread
SSDT 8EFDB055 ZwSecureConnectPort
SSDT 8EFDB05A ZwSetValueKey
SSDT 8EFDB05F ZwSuspendProcess
SSDT 8EFDB064 ZwTerminateProcess
SSDT 8EFDB069 ZwWriteVirtualMemory
SSDT 8EFDB028 ZwCreateThreadEx
SSDT 8EFDB014 ZwCreateUserProcess

---- Kernel code sections - GMER 1.0.14 ----

.text ntkrnlpa.exe!KeSetTimerEx + 370 81CBE9C4 4 Bytes [ 00, B0, FD, 8E ]
.text ntkrnlpa.exe!KeSetTimerEx + 3C4 81CBEA18 4 Bytes [ 05, B0, FD, 8E ]
.text ntkrnlpa.exe!KeSetTimerEx + 3F4 81CBEA48 4 Bytes [ 0A, B0, FD, 8E ]
.text ntkrnlpa.exe!KeSetTimerEx + 40C 81CBEA60 4 Bytes [ 0F, B0, FD, 8E ]
.text ntkrnlpa.exe!KeSetTimerEx + 43C 81CBEA90 8 Bytes [ 19, B0, FD, 8E, 1E, B0, FD, ... ]
.text ...
PAGE spsys.sys!?SPVersion@@3PADA + 1A67 9BE4C03F 240 Bytes [ 8B, FF, 55, 8B, EC, 8B, 45, ... ]
PAGE spsys.sys!?SPVersion@@3PADA + 1B58 9BE4C130 6 Bytes [ 0E, 83, 78, 14, 01, 75 ]
PAGE spsys.sys!?SPVersion@@3PADA + 1B5F 9BE4C137 2214 Bytes [ 83, 78, 18, 37, 75, 02, B3, ... ]
PAGE spsys.sys!?SPVersion@@3PADA + 2406 9BE4C9DE 47 Bytes [ 04, BB, A8, 01, 00, 00, 8D, ... ]
PAGE spsys.sys!?SPVersion@@3PADA + 2436 9BE4CA0E 44 Bytes [ 05, 00, 00, 39, 54, 8D, D0, ... ]
PAGE ...
? C:\Windows\system32\Drivers\mchInjDrv.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.14 ----

.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[552] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\csrss.exe[552] KERNEL32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[604] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\wininit.exe[604] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\wininit.exe[604] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\wininit.exe[604] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\wininit.exe[604] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\wininit.exe[604] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\wininit.exe[604] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\wininit.exe[604] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\wininit.exe[604] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\wininit.exe[604] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\wininit.exe[604] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[616] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\csrss.exe[616] KERNEL32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[648] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\services.exe[648] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\services.exe[648] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\services.exe[648] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\services.exe[648] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\services.exe[648] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\services.exe[648] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\services.exe[648] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\services.exe[648] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\services.exe[648] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[648] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\services.exe[648] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\services.exe[648] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\services.exe[648] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\services.exe[648] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\services.exe[648] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\services.exe[648] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\services.exe[648] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\services.exe[648] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\services.exe[648] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\services.exe[648] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\services.exe[648] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\services.exe[648] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[664] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\lsass.exe[664] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\lsass.exe[664] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\lsass.exe[664] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\lsass.exe[664] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\lsass.exe[664] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\lsass.exe[664] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\lsass.exe[664] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\lsass.exe[664] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\lsass.exe[664] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\lsass.exe[664] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[672] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\lsm.exe[672] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\lsm.exe[672] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\lsm.exe[672] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\lsm.exe[672] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\lsm.exe[672] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\lsm.exe[672] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\lsm.exe[672] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\lsm.exe[672] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\lsm.exe[672] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\lsm.exe[672] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[716] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\Explorer.EXE[716] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\Explorer.EXE[716] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\Explorer.EXE[716] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\Explorer.EXE[716] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\Explorer.EXE[716] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\Explorer.EXE[716] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\Explorer.EXE[716] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\Explorer.EXE[716] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\Explorer.EXE[716] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[716] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\Explorer.EXE[716] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\Explorer.EXE[716] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\Explorer.EXE[716] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\Explorer.EXE[716] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\Explorer.EXE[716] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\Explorer.EXE[716] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\Explorer.EXE[716] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\Explorer.EXE[716] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\Explorer.EXE[716] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\Explorer.EXE[716] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\Explorer.EXE[716] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\Explorer.EXE[716] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\Explorer.EXE[716] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\Explorer.EXE[716] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\Explorer.EXE[716] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\Explorer.EXE[716] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[820] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[820] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[820] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[820] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[820] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[820] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\svchost.exe[820] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[820] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[820] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[820] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[820] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[852] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\winlogon.exe[852] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\GMEr.exe[892] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\GMEr.exe[892] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\GMEr.exe[892] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\GMEr.exe[892] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\GMEr.exe[892] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\GMEr.exe[892] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\GMEr.exe[892] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\GMEr.exe[892] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\GMEr.exe[892] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\GMEr.exe[892] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\GMEr.exe[892] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\GMEr.exe[892] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\GMEr.exe[892] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\GMEr.exe[892] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\GMEr.exe[892] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\GMEr.exe[892] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\GMEr.exe[892] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\GMEr.exe[892] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\GMEr.exe[892] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\GMEr.exe[892] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\GMEr.exe[892] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\GMEr.exe[892] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\GMEr.exe[892] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[908] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\nvvsvc.exe[908] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\nvvsvc.exe[908] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\nvvsvc.exe[908] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\nvvsvc.exe[908] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\nvvsvc.exe[908] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\nvvsvc.exe[908] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\nvvsvc.exe[908] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\nvvsvc.exe[908] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\nvvsvc.exe[908] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\nvvsvc.exe[908] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\nvvsvc.exe[908] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\nvvsvc.exe[908] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\nvvsvc.exe[908] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\nvvsvc.exe[908] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[936] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[936] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[936] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[936] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[936] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\svchost.exe[936] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[936] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[936] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[936] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[936] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[988] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\svchost.exe[988] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[988] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[988] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[988] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[988] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[988] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[988] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[988] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[988] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[988] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[988] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[988] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[988] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\svchost.exe[988] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[1096] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\SearchIndexer.exe[1096] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1112] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\svchost.exe[1112] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[1112] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[1112] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[1112] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[1112] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[1112] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[1112] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[1112] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[1112] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[1112] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[1112] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[1112] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[1112] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\svchost.exe[1112] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1156] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\svchost.exe[1156] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[1156] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[1156] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[1156] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[1156] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[1156] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[1156] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[1156] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[1156] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[1156] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[1156] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[1156] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[1156] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\svchost.exe[1156] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1172] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1172] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1172] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1172] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1172] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1172] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1328] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1328] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1328] shell32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1328] shell32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1328] shell32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1328] shell32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1380] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[1380] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[1380] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[1380] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[1380] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[1380] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\System32\svchost.exe[1380] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[1380] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[1380] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[1380] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[1380] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[1380] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[1380] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[1380] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[1380] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F5F0F5A
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[1428] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\taskeng.exe[1428] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\taskeng.exe[1428] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\taskeng.exe[1428] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\taskeng.exe[1428] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\taskeng.exe[1428] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\taskeng.exe[1428] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\taskeng.exe[1428] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\taskeng.exe[1428] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\taskeng.exe[1428] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\taskeng.exe[1428] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\taskeng.exe[1428] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\taskeng.exe[1428] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\taskeng.exe[1428] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\taskeng.exe[1428] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1436] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1436] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1436] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1436] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1436] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1436] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1436] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1436] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1436] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1436] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1436] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1436] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1436] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1436] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1436] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1472] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\rundll32.exe[1472] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\rundll32.exe[1472] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\rundll32.exe[1472] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\rundll32.exe[1472] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\rundll32.exe[1472] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\rundll32.exe[1472] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\rundll32.exe[1472] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\rundll32.exe[1472] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\rundll32.exe[1472] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\rundll32.exe[1472] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\rundll32.exe[1472] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\rundll32.exe[1472] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\rundll32.exe[1472] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\rundll32.exe[1472] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[1572] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\Dwm.exe[1572] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\Dwm.exe[1572] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\Dwm.exe[1572] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\Dwm.exe[1572] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\Dwm.exe[1572] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\Dwm.exe[1572] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\Dwm.exe[1572] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\Dwm.exe[1572] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\Dwm.exe[1572] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\Dwm.exe[1572] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\Dwm.exe[1572] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F640F5A
.text C:\Windows\system32\Dwm.exe[1572] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\Dwm.exe[1572] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F680F5A
.text C:\Windows\system32\Dwm.exe[1572] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F600F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1632] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1944] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\spoolsv.exe[1944] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\spoolsv.exe[1944] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\spoolsv.exe[1944] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\spoolsv.exe[1944] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\spoolsv.exe[1944] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\spoolsv.exe[1944] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\spoolsv.exe[1944] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\spoolsv.exe[1944] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\spoolsv.exe[1944] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\spoolsv.exe[1944] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\spoolsv.exe[1944] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\spoolsv.exe[1944] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\spoolsv.exe[1944] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\spoolsv.exe[1944] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] shell32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] shell32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] shell32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[1960] shell32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1968] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1968] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1968] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1968] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1968] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1968] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1968] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1968] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1968] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1968] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1968] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1968] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1968] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1968] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1968] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[2072] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2112] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\taskeng.exe[2112] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\taskeng.exe[2112] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\taskeng.exe[2112] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\taskeng.exe[2112] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\taskeng.exe[2112] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\taskeng.exe[2112] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\taskeng.exe[2112] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\taskeng.exe[2112] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\taskeng.exe[2112] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\taskeng.exe[2112] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\taskeng.exe[2112] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\taskeng.exe[2112] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\taskeng.exe[2112] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\taskeng.exe[2112] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2148] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[2148] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[2148] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[2148] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[2148] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[2148] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[2148] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[2148] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[2148] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[2148] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[2148] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[2148] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[2148] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[2148] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[2148] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Spyware Doctor\pctsSvc.exe[2168] kernel32.dll!CreateThread + 1A 77C046E2 4 Bytes [ D6, 57, 84, 88 ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] shell32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] shell32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] shell32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[2192] shell32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2220] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[2220] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[2220] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[2220] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[2220] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[2220] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\svchost.exe[2220] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[2220] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[2220] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[2220] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[2220] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2292] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2352] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 4D, 5F ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 3B, 5F ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F0D0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F250F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F220F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F100F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F190F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F3D0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F160F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!CreateThread + 1A 77C046E2 4 Bytes [ FA, 55, 84, 88 ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F130F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F400F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F340F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F1F0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F460F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F520F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F430F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F1C0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F490F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F370F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F0A0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F4F0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] shell32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F2B0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] shell32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F310F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] shell32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F2E0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[2388] shell32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F280F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2396] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[2412] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[2432] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2468] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\rundll32.exe[2468] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\rundll32.exe[2468] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\rundll32.exe[2468] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\rundll32.exe[2468] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\rundll32.exe[2468] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\rundll32.exe[2468] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\rundll32.exe[2468] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\rundll32.exe[2468] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\rundll32.exe[2468] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\rundll32.exe[2468] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\rundll32.exe[2468] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\rundll32.exe[2468] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\rundll32.exe[2468] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[2488] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2528] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[2548] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2576] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\rundll32.exe[2576] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\rundll32.exe[2576] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\rundll32.exe[2576] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\rundll32.exe[2576] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\rundll32.exe[2576] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\rundll32.exe[2576] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\rundll32.exe[2576] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\rundll32.exe[2576] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\rundll32.exe[2576] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\rundll32.exe[2576] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\rundll32.exe[2576] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\rundll32.exe[2576] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\rundll32.exe[2576] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\rundll32.exe[2576] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2584] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\rundll32.exe[2584] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\rundll32.exe[2584] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\rundll32.exe[2584] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\rundll32.exe[2584] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\rundll32.exe[2584] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\rundll32.exe[2584] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\rundll32.exe[2584] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\rundll32.exe[2584] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\rundll32.exe[2584] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\rundll32.exe[2584] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\rundll32.exe[2584] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\rundll32.exe[2584] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\rundll32.exe[2584] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\rundll32.exe[2584] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2592] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2600] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2616] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\ehome\ehtray.exe[2616] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\ehome\ehtray.exe[2616] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\ehome\ehtray.exe[2616] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\ehome\ehtray.exe[2616] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\ehome\ehtray.exe[2616] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\ehome\ehtray.exe[2616] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\ehome\ehtray.exe[2616] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\ehome\ehtray.exe[2616] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\ehome\ehtray.exe[2616] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\ehome\ehtray.exe[2616] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\ehome\ehtray.exe[2616] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\ehome\ehtray.exe[2616] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\ehome\ehtray.exe[2616] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\ehome\ehtray.exe[2616] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] user32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] user32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] user32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] user32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] user32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] user32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] user32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] shell32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] shell32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] shell32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Skype\Phone\Skype.exe[2660] shell32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] shell32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] shell32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] shell32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[2704] shell32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2748] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[2796] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\ehome\ehmsas.exe[2796] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\ehome\ehmsas.exe[2796] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\ehome\ehmsas.exe[2796] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\ehome\ehmsas.exe[2796] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\ehome\ehmsas.exe[2796] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\ehome\ehmsas.exe[2796] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\ehome\ehmsas.exe[2796] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\ehome\ehmsas.exe[2796] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\ehome\ehmsas.exe[2796] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\ehome\ehmsas.exe[2796] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[2828] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[3016] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3040] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\WUDFHost.exe[3040] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\WUDFHost.exe[3040] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\WUDFHost.exe[3040] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\WUDFHost.exe[3040] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\WUDFHost.exe[3040] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\WUDFHost.exe[3040] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\WUDFHost.exe[3040] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\WUDFHost.exe[3040] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\WUDFHost.exe[3040] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\WUDFHost.exe[3040] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\WUDFHost.exe[3040] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\WUDFHost.exe[3040] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\WUDFHost.exe[3040] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\WUDFHost.exe[3040] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[3308] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[3308] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[3308] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[3308] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[3308] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[3308] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\System32\svchost.exe[3308] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[3308] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[3308] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[3308] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[3308] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] user32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] user32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] user32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] user32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] user32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] user32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] user32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] shell32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] shell32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] shell32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Skype\Plugin Manager\skypePM.exe[3472] shell32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[3812] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[3812] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[3812] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[3812] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[3812] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[3812] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[3812] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[3812] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[3812] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[3812] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[3812] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[3812] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[3812] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[3812] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[3812] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[3824] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[3836] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[3884] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] SHELL32.dll!ShellExecuteExW 769FFFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] SHELL32.dll!ShellExecuteEx 76BA8AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[4092] SHELL32.dll!ShellExecuteA 76BA8B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtCreateProcess 77AE80C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtCreateProcess + 4 77AE80CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtCreateProcessEx 77AE80D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtCreateProcessEx + 4 77AE80DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtCreateSection 77AE80F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtCreateSection + 4 77AE80FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtLoadDriver 77AE8698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtLoadDriver + 4 77AE869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtSuspendProcess 77AE90E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtSuspendProcess + 4 77AE90EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtTerminateProcess 77AE9128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtTerminateProcess + 4 77AE912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtWriteVirtualMemory 77AE92A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtWriteVirtualMemory + 4 77AE92AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtCreateUserProcess 77AE9438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ntdll.dll!NtCreateUserProcess + 4 77AE943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!TerminateProcess 77BC18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!CreateProcessW 77BC1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!CreateProcessA 77BC1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!WriteProcessMemory 77BC1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!LoadLibraryExW 77BE30C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!LoadLibraryW 77BE361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!TerminateThread 77BE3B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!LoadLibraryA 77BE9491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!CreateRemoteThread 77C046EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!CreateRemoteThread + 4 77C046F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!GetProcAddress 77C0B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!DebugActiveProcess 77C49178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] kernel32.dll!WinExec 77C553E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ADVAPI32.dll!LsaRemoveAccountRights 7670B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] ADVAPI32.dll!CreateServiceA 76726C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] USER32.dll!SetWindowsHookExW 774A7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] USER32.dll!GetAsyncKeyState 774A8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] USER32.dll!SetWinEventHook 774A915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] USER32.dll!GetKeyState 774B87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] USER32.dll!SetWindowsHookExA 774CBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] USER32.dll!DdeConnect 774E997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] USER32.dll!EndTask 774EACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Media Player\wmplayer.exe[4564] SHELL32.dll!ShellExecuteW 769AA2C5 6 Bytes JMP 5F3E0