GMER 1.0.14.14536 -
http://www.gmer.netRootkit scan 2008-09-11 17:31:55
Windows 6.0.6001 Service Pack 1
---- System - GMER 1.0.14 ----
SSDT 9DAA4000 ZwAlpcConnectPort
SSDT 9DAA4005 ZwAssignProcessToJobObject
SSDT 9DAA400A ZwConnectPort
SSDT 9DAA400F ZwCreateFile
SSDT 9DAA4019 ZwCreateProcess
SSDT 9DAA401E ZwCreateProcessEx
SSDT 9DAA4023 ZwCreateThread
SSDT 9DAA402D ZwDebugActiveProcess
SSDT 9DAA4032 ZwDuplicateObject
SSDT 9DAA4037 ZwLoadDriver
SSDT 9DAA403C ZwOpenKey
SSDT 9DAA4041 ZwOpenSection
SSDT 9DAA4046 ZwOpenThread
SSDT 9DAA4050 ZwProtectVirtualMemory
SSDT 9DAA404B ZwResumeThread
SSDT 9DAA4055 ZwSecureConnectPort
SSDT 9DAA405A ZwSetValueKey
SSDT 9DAA405F ZwSuspendProcess
SSDT 9DAA4064 ZwTerminateProcess
SSDT 9DAA4069 ZwWriteVirtualMemory
SSDT 9DAA4028 ZwCreateThreadEx
SSDT 9DAA4014 ZwCreateUserProcess
---- Kernel code sections - GMER 1.0.14 ----
.text ntkrnlpa.exe!KeSetTimerEx + 370 81CFF9C4 4 Bytes [ 00, 40, AA, 9D ]
.text ntkrnlpa.exe!KeSetTimerEx + 3C4 81CFFA18 4 Bytes [ 05, 40, AA, 9D ]
.text ntkrnlpa.exe!KeSetTimerEx + 3F4 81CFFA48 4 Bytes [ 0A, 40, AA, 9D ]
.text ntkrnlpa.exe!KeSetTimerEx + 40C 81CFFA60 4 Bytes [ 0F, 40, AA, 9D ]
.text ntkrnlpa.exe!KeSetTimerEx + 43C 81CFFA90 8 Bytes [ 19, 40, AA, 9D, 1E, 40, AA, ... ]
.text ...
PAGE spsys.sys!?SPVersion@@3PADA + 1A67 9B89503F 240 Bytes [ 8B, FF, 55, 8B, EC, 8B, 45, ... ]
PAGE spsys.sys!?SPVersion@@3PADA + 1B58 9B895130 6 Bytes [ 0E, 83, 78, 14, 01, 75 ]
PAGE spsys.sys!?SPVersion@@3PADA + 1B5F 9B895137 2214 Bytes [ 83, 78, 18, 37, 75, 02, B3, ... ]
PAGE spsys.sys!?SPVersion@@3PADA + 2406 9B8959DE 47 Bytes [ 04, BB, A8, 01, 00, 00, 8D, ... ]
PAGE spsys.sys!?SPVersion@@3PADA + 2436 9B895A0E 44 Bytes [ 05, 00, 00, 39, 54, 8D, D0, ... ]
PAGE ...
? C:\Windows\system32\Drivers\mchInjDrv.sys The system cannot find the file specified. !
---- User code sections - GMER 1.0.14 ----
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\PC Tools Firewall Plus\FWService.exe[232] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\taskeng.exe[264] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\taskeng.exe[264] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\taskeng.exe[264] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\taskeng.exe[264] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\taskeng.exe[264] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\taskeng.exe[264] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\taskeng.exe[264] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\taskeng.exe[264] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[396] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe[412] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[460] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[460] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[460] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[460] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[460] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[460] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[460] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[460] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[472] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\csrss.exe[472] KERNEL32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\wininit.exe[524] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\wininit.exe[524] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\wininit.exe[524] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\wininit.exe[524] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\csrss.exe[536] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\csrss.exe[536] KERNEL32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\services.exe[568] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\services.exe[568] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\services.exe[568] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\services.exe[568] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\services.exe[568] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\services.exe[568] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\services.exe[568] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\lsass.exe[588] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\lsass.exe[588] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\lsass.exe[588] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\lsass.exe[588] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Bonjour\mDNSResponder.exe[592] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\lsm.exe[596] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\lsm.exe[596] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\lsm.exe[596] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\lsm.exe[596] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\winlogon.exe[676] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\winlogon.exe[676] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\Dwm.exe[708] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\Dwm.exe[708] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\Dwm.exe[708] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\Dwm.exe[708] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[776] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[776] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[776] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[776] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\nvvsvc.exe[824] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\nvvsvc.exe[824] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\nvvsvc.exe[824] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\nvvsvc.exe[824] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\nvvsvc.exe[824] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\nvvsvc.exe[824] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\nvvsvc.exe[824] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\nvvsvc.exe[824] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[852] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[852] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[852] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[852] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\svchost.exe[888] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[888] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[888] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[888] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[888] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[888] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[888] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\svchost.exe[888] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5F0F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F650F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F620F5A
.text C:\Windows\servicing\TrustedInstaller.exe[924] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spyware Doctor\pctsSvc.exe[964] kernel32.dll!CreateThread + 1A 776346E2 4 Bytes [ D6, 57, E1, 88 ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Spyware Doctor\pctsAuxs.exe[992] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[1012] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[1012] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[1012] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[1012] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[1012] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[1012] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[1012] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[1012] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5F0F5A
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\svchost.exe[1052] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[1052] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[1052] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[1052] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[1052] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[1052] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[1052] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\svchost.exe[1052] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1068] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1068] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1068] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1068] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1068] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1068] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1068] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1068] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[1208] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1232] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1232] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1232] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1232] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1232] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1232] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1232] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1232] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Last.fm\LastFM.exe[1324] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1360] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1360] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1360] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1360] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1360] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1360] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1360] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1360] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\rundll32.exe[1396] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\rundll32.exe[1396] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\rundll32.exe[1396] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\rundll32.exe[1396] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\rundll32.exe[1396] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\rundll32.exe[1396] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\rundll32.exe[1396] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\rundll32.exe[1396] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[1404] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe[1564] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F650F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F620F5A
.text C:\Program Files\PC Tools Firewall Plus\FirewallGUI.exe[1648] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\spoolsv.exe[1884] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\spoolsv.exe[1884] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\spoolsv.exe[1884] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\spoolsv.exe[1884] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\spoolsv.exe[1884] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\spoolsv.exe[1884] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\spoolsv.exe[1884] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F5F0F5A
.text C:\Windows\System32\spoolsv.exe[1884] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[1908] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[1908] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[1908] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[1908] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[1908] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[1908] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[1908] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[1908] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\svchost.exe[2140] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[2140] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[2140] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\svchost.exe[2140] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[2140] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\svchost.exe[2140] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[2140] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\svchost.exe[2140] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe[2188] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\ThreatFire\TFService.exe[2220] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\svchost.exe[2252] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F650F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F620F5A
.text C:\Program Files\iTunes\iTunesHelper.exe[2268] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[2280] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[2280] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[2280] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[2280] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\svchost.exe[2280] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\svchost.exe[2280] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\svchost.exe[2280] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\svchost.exe[2280] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\ThreatFire\TFTray.exe[2300] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\SearchIndexer.exe[2308] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe[2444] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[2464] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Users\Ifan\Documents\gmer.exe[2544] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe[2572] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\rundll32.exe[2752] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\rundll32.exe[2752] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\rundll32.exe[2752] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\rundll32.exe[2752] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\rundll32.exe[2752] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\rundll32.exe[2752] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\rundll32.exe[2752] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\rundll32.exe[2752] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\taskeng.exe[2772] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\taskeng.exe[2772] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\taskeng.exe[2772] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\taskeng.exe[2772] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\taskeng.exe[2772] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\taskeng.exe[2772] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\taskeng.exe[2772] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\taskeng.exe[2772] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\ehome\ehtray.exe[2848] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\ehome\ehtray.exe[2848] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\ehome\ehtray.exe[2848] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\ehome\ehtray.exe[2848] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\ehome\ehtray.exe[2848] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\ehome\ehtray.exe[2848] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\ehome\ehtray.exe[2848] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\ehome\ehtray.exe[2848] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Windows Defender\MSASCui.exe[2884] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Alwil Software\Avast4\ashDisp.exe[3004] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\Explorer.EXE[3032] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\Explorer.EXE[3032] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\Explorer.EXE[3032] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\Explorer.EXE[3032] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\Explorer.EXE[3032] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\Explorer.EXE[3032] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\Explorer.EXE[3032] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\Explorer.EXE[3032] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\WUDFHost.exe[3100] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\WUDFHost.exe[3100] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\WUDFHost.exe[3100] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\WUDFHost.exe[3100] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\WUDFHost.exe[3100] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\rundll32.exe[3176] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\rundll32.exe[3176] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\rundll32.exe[3176] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\rundll32.exe[3176] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\rundll32.exe[3176] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\rundll32.exe[3176] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\rundll32.exe[3176] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\rundll32.exe[3176] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 4D, 5F ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 3B, 5F ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F0D0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F250F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F220F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F100F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F190F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F3D0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F160F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!CreateThread + 1A 776346E2 4 Bytes [ FA, 55, E1, 88 ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F130F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F400F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F340F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F1F0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F460F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F520F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F430F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F1C0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F490F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F370F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F0A0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F4F0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F2B0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F310F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F2E0F5A
.text C:\Program Files\Spyware Doctor\pctsTray.exe[3204] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F280F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F650F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F620F5A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3344] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe[3356] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Alwil Software\Avast4\ashWebSv.exe[3404] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe[3724] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\System32\rundll32.exe[3840] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\System32\rundll32.exe[3840] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\rundll32.exe[3840] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\rundll32.exe[3840] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\System32\rundll32.exe[3840] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\System32\rundll32.exe[3840] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\rundll32.exe[3840] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\System32\rundll32.exe[3840] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Logitech\QuickCam\Quickcam.exe[3896] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[3920] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[3960] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F650F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe[3984] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F5F0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[4128] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F620F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[4296] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Windows Sidebar\sidebar.exe[4360] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\System32\svchost.exe[4776] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\System32\svchost.exe[4776] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\System32\svchost.exe[4776] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\System32\svchost.exe[4776] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Mozilla Firefox\firefox.exe[4920] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Windows\system32\taskeng.exe[5052] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\taskeng.exe[5052] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\taskeng.exe[5052] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Windows\system32\taskeng.exe[5052] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\taskeng.exe[5052] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\taskeng.exe[5052] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\taskeng.exe[5052] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Windows\system32\taskeng.exe[5052] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\ehome\ehmsas.exe[5576] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\ehome\ehmsas.exe[5576] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 60, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 4E, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!OutputDebugStringW 775FE81A 5 Bytes JMP 28001E50 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F500F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!SetUnhandledExceptionFilter 77616E2D 5 Bytes JMP 0056DBBD C:\Program Files\Windows Live\Messenger\msnmsgr.exe (Windows Live Messenger/Microsoft Corporation)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!FindResourceExA 776208DD 7 Bytes JMP 28001C20 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!FindResourceA 776209A5 5 Bytes JMP 28001B90 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!CreateEventA 77634AD8 5 Bytes JMP 28001840 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!LockResource 77637F1F 5 Bytes JMP 28001DF0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!FindResourceExW 7763813B 7 Bytes JMP 28001B00 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!LoadResource 77638213 7 Bytes JMP 28001CC0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!FindResourceW 776397C7 5 Bytes JMP 28001A80 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!SizeofResource 776397E5 7 Bytes JMP 28001D80 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F530F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F470F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ADVAPI32.dll!CryptDeriveKey 762DE6F6 7 Bytes JMP 28001000 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ADVAPI32.dll!CryptDecrypt 762DE8D9 7 Bytes JMP 28001060 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F620F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!SetWindowPlacement 761B79BB 5 Bytes JMP 28005840 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F590F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F650F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!SetWindowRgn 761B95E2 7 Bytes JMP 28005980 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!LoadImageW 761BD61D 5 Bytes JMP 280060C0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!LoadIconW 761BEC94 5 Bytes JMP 280062B0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!CreateWindowExW 761C3D67 5 Bytes JMP 28003820 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F560F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!PeekMessageW 761CFD9F 5 Bytes JMP 28004090 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!TrackPopupMenuEx 761E0F4D 5 Bytes JMP 28004970 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!CreateDialogParamW 761E1C58 5 Bytes JMP 28005AC0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] USER32.dll!MessageBoxIndirectW 7620D56B 5 Bytes JMP 28005CB0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WS2_32.dll!closesocket 7753330C 5 Bytes JMP 2800A5A0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WS2_32.dll!recv 7753343A 5 Bytes JMP 28009DC0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WS2_32.dll!WSASend 77534496 5 Bytes JMP 2800A360 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WS2_32.dll!send 7753659B 5 Bytes JMP 2800A180 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WS2_32.dll!WSARecv 77538400 5 Bytes JMP 28009F60 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F3E0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] SHELL32.dll!Shell_NotifyIconW 76A7C808 5 Bytes JMP 28002FE0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F440F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F410F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ole32.dll!CoRegisterClassObject 765345AC 5 Bytes JMP 28002200 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] ole32.dll!CoInitializeEx 7656B89A 5 Bytes JMP 28002100 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WININET.dll!HttpOpenRequestA 764306D6 5 Bytes JMP 28008BE0 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WININET.dll!InternetCloseHandle 7643607B 5 Bytes JMP 28008F20 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WININET.dll!InternetReadFile 7643A067 5 Bytes JMP 28008D70 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[5600] WININET.dll!HttpSendRequestA 764408C5 5 Bytes JMP 28008E50 C:\Program Files\Messenger Plus! Live\MsgPlusLive.dll (Messenger Plus! Live Add-On/Patchou)
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Windows\system32\wuauclt.exe[5860] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Windows\system32\wuauclt.exe[5860] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
.text C:\Windows\system32\wuauclt.exe[5860] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Windows\system32\wuauclt.exe[5860] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Windows\system32\wuauclt.exe[5860] SHELL32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F5F0F5A
.text C:\Windows\system32\wuauclt.exe[5860] SHELL32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F650F5A
.text C:\Windows\system32\wuauclt.exe[5860] SHELL32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F620F5A
.text C:\Windows\system32\wuauclt.exe[5860] SHELL32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F5C0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 4D, 5F ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 3B, 5F ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F0D0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F250F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F220F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F100F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F190F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F3D0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F160F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!CreateThread + 1A 776346E2 4 Bytes [ 0E, 62, E1, 88 ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 05, 5F ]
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F130F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F400F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F340F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F1F0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F460F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F520F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F430F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F1C0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F490F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F370F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F0A0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F4F0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] shell32.dll!ShellExecuteW 76A3A2C5 6 Bytes JMP 5F2B0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] shell32.dll!ShellExecuteExW 76A8FFBD 6 Bytes JMP 5F310F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] shell32.dll!ShellExecuteEx 76C38AA2 6 Bytes JMP 5F2E0F5A
.text C:\Program Files\Spyware Doctor\pctsGui.exe[5872] shell32.dll!ShellExecuteA 76C38B3D 6 Bytes JMP 5F280F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateProcess 779880C8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateProcess + 4 779880CC 2 Bytes [ 0E, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateProcessEx 779880D8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateProcessEx + 4 779880DC 2 Bytes [ 11, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateSection 779880F8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateSection + 4 779880FC 2 Bytes [ 05, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtLoadDriver 77988698 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtLoadDriver + 4 7798869C 2 Bytes [ 54, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtSuspendProcess 779890E8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtSuspendProcess + 4 779890EC 2 Bytes [ 42, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtTerminateProcess 77989128 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtTerminateProcess + 4 7798912C 2 Bytes [ 14, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtWriteVirtualMemory 779892A8 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtWriteVirtualMemory + 4 779892AC 2 Bytes [ 17, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateUserProcess 77989438 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ntdll.dll!NtCreateUserProcess + 4 7798943C 2 Bytes [ 0B, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!TerminateProcess 775F18EF 6 Bytes JMP 5F200F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!CreateProcessW 775F1C01 6 Bytes JMP 5F380F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!CreateProcessA 775F1C36 6 Bytes JMP 5F350F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!WriteProcessMemory 775F1CC6 6 Bytes JMP 5F230F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!LoadLibraryExW 776130C3 6 Bytes JMP 5F070F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!LoadLibraryW 7761361F 6 Bytes JMP 5F2C0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!TerminateThread 77613B73 6 Bytes JMP 5F440F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!LoadLibraryA 77619491 6 Bytes JMP 5F290F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!CreateRemoteThread 776346EF 3 Bytes [ FF, 25, 1E ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!CreateRemoteThread + 4 776346F3 2 Bytes [ 1A, 5F ]
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!GetProcAddress 7763B8B6 6 Bytes JMP 5F260F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!DebugActiveProcess 77679178 6 Bytes JMP 5F470F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] kernel32.dll!WinExec 776853E7 6 Bytes JMP 5F3B0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ADVAPI32.dll!LsaRemoveAccountRights 7633B699 6 Bytes JMP 5F1D0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] ADVAPI32.dll!CreateServiceA 76356C71 6 Bytes JMP 5F560F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!SetWindowsHookExW 761B7B69 6 Bytes JMP 5F320F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!GetAsyncKeyState 761B8DF4 6 Bytes JMP 5F4D0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!SetWinEventHook 761B915C 6 Bytes JMP 5F590F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!GetKeyState 761C87C7 6 Bytes JMP 5F4A0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!SetWindowsHookExA 761DBB0E 6 Bytes JMP 5F2F0F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!DdeConnect 761F997F 6 Bytes JMP 5F500F5A
.text C:\Program Files\iPod\bin\iPodService.exe[6056] USER32.dll!EndTask 761FACCF 6 Bytes JMP 5F3E0F5A
---- User IAT/EAT - GMER 1.0.14 ----
IAT C:\Windows\system32\services.exe[568] @ C:\Windows\system32\services.exe [ADVAPI32.dll!CreateProcessAsUserW] 00170002
IAT C:\Windows\system32\services.exe[568] @ C:\Windows\system32\services.exe [KERNEL32.dll!CreateProcessW] 00170000
IAT C:\Program Files\Spyware Doctor\pctsSvc.exe[964] @ C:\Windows\system32\shell32.dll [KERNEL32.dll!QueueUserWorkItem] [0044A014] C:\Program Files\Spyware Doctor\pctsSvc.exe (PC Tools Security Service/PC Tools)
IAT C:\Program Files\Spyware Doctor\pctsSvc.exe[964] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!QueueUserWorkItem] [0044A014] C:\Program Files\Spyware Doctor\pctsSvc.exe (PC Tools Security Service/PC Tools)
IAT C:\Program Files\Spyware Doctor\pctsTray.exe[3204] @ C:\Windows\system32\shell32.dll [KERNEL32.dll!QueueUserWorkItem] [00449E38] C:\Program Files\Spyware Doctor\pctsTray.exe (PC Tools Tray Application/PC Tools)
IAT C:\Program Files\Spyware Doctor\pctsTray.exe[3204] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!QueueUserWorkItem] [00449E38] C:\Program Files\Spyware Doctor\pctsTray.exe (PC Tools Tray Application/PC Tools)
IAT C:\Program Files\Spyware Doctor\pctsGui.exe[5872] @ C:\Windows\system32\shell32.dll [KERNEL32.dll!QueueUserWorkItem] [0044AA4C] C:\Program Files\Spyware Doctor\pctsGui.exe (PC Tools GUI Application/PC Tools)
IAT C:\Program Files\Spyware Doctor\pctsGui.exe[5872] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!QueueUserWorkItem] [0044AA4C] C:\Program Files\Spyware Doctor\pctsGui.exe (PC Tools GUI Application/PC Tools)
---- Devices - GMER 1.0.14 ----
AttachedDevice \FileSystem\Ntfs \Ntfs TfFsMon.sys (ThreatFire Filesystem Monitor/PC Tools)
AttachedDevice \Driver\tdx \Device\Tcp pctfw2.sys
AttachedDevice \Driver\tdx \Device\Udp pctfw2.sys
AttachedDevice \Driver\tdx \Device\RawIp pctfw2.sys
---- Services - GMER 1.0.14 ----
Service system32\drivers\TDSSserv.sys (*** hidden *** ) [SYSTEM] TDSSserv <-- ROOTKIT !!!
---- Registry - GMER 1.0.14 ----
Reg HKLM\SYSTEM\CurrentControlSet\Services\TDSSserv@start 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\TDSSserv@type 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\TDSSserv@imagepath \systemroot\system32\drivers\TDSSserv.sys
Reg HKLM\SYSTEM\ControlSet002\Services\TDSSserv@start 1
Reg HKLM\SYSTEM\ControlSet002\Services\TDSSserv@type 1
Reg HKLM\SYSTEM\ControlSet002\Services\TDSSserv@imagepath \systemroot\system32\drivers\TDSSserv.sys
---- EOF - GMER 1.0.14 ----