Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- GMER 2.1.19163 - http://www.gmer.net
- Rootkit scan 2013-07-01 01:11:05
- Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\00000073 TOSHIBA_ rev.GH10 232.89GB
- Running: mfwfrjzb.exe; Driver: C:\Users\JANESE~1\AppData\Local\Temp\uxdyiuoc.sys
- ---- Kernel code sections - GMER 2.1 ----
- .text C:\windows\System32\win32k.sys!W32pServiceTable
- fffff96000194000 7 bytes [80, 93, F3, FF, 01, 9D, F0]
- .text C:\windows\System32\win32k.sys!W32pServiceTable + 8
- fffff96000194008 3 bytes [C0, 06, 02]
- ---- User code sections - GMER 2.1 ----
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\kernel32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\kernel32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\kernel32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!RegisterRawInputDevices
- 0000000077216ef0 8 bytes JMP 000000016fff06f8
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SystemParametersInfoA
- 0000000077218184 7 bytes JMP 000000016fff0880
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SetParent
- 0000000077218530 8 bytes JMP 000000016fff0730
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!PostMessageA
- 000000007721a404 5 bytes JMP 000000016fff0308
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!EnableWindow
- 000000007721aaa0 9 bytes JMP 000000016fff08f0
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!MoveWindow
- 000000007721aad0 8 bytes JMP 000000016fff0768
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!GetAsyncKeyState
- 000000007721c720 5 bytes JMP 000000016fff06c0
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!RegisterHotKey
- 000000007721cd50 8 bytes JMP 000000016fff0848
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!PostThreadMessageA
- 000000007721d2b0 5 bytes JMP 000000016fff0378
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SendMessageA
- 000000007721d338 5 bytes JMP 000000016fff03e8
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SendNotifyMessageW
- 000000007721dc40 9 bytes JMP 000000016fff0570
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SystemParametersInfoW
- 000000007721f510 7 bytes JMP 000000016fff08b8
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SetWindowsHookExW
- 000000007721f874 9 bytes JMP 000000016fff0298
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SendMessageTimeoutW
- 000000007721fac0 9 bytes JMP 000000016fff0490
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!PostThreadMessageW
- 0000000077220b74 10 bytes JMP 000000016fff03b0
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SetWinEventHook
- 0000000077224d4c 5 bytes JMP 000000016fff02d0
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!GetKeyState
- 0000000077225010 5 bytes JMP 000000016fff0688
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SendMessageCallbackW
- 0000000077225438 7 bytes JMP 000000016fff0500
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SendMessageW
- 0000000077226b50 5 bytes JMP 000000016fff0420
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!PostMessageW
- 00000000772276e4 7 bytes JMP 000000016fff0340
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SendDlgItemMessageW
- 000000007722dd90 5 bytes JMP 000000016fff05e0
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!GetClipboardData
- 000000007722e874 5 bytes JMP 000000016fff0810
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SetClipboardViewer
- 000000007722f780 8 bytes JMP 000000016fff07a0
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SendNotifyMessageA
- 00000000772328e4 12 bytes JMP 000000016fff0538
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!mouse_event
- 0000000077233894 7 bytes JMP 000000016fff0228
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!GetKeyboardState
- 0000000077238a10 8 bytes JMP 000000016fff0650
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SendMessageTimeoutA
- 0000000077238be0 12 bytes JMP 000000016fff0458
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SetWindowsHookExA
- 0000000077238c20 12 bytes JMP 000000016fff0260
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SendInput
- 0000000077238cd0 8 bytes JMP 000000016fff0618
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!BlockInput
- 000000007723ad60 8 bytes JMP 000000016fff07d8
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!ExitWindowsEx
- 00000000772614e0 5 bytes JMP 000000016fff0928
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!keybd_event
- 00000000772845a4 7 bytes JMP 000000016fff01f0
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SendDlgItemMessageA
- 000000007728cc08 5 bytes JMP 000000016fff05a8
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\USER32.dll!SendMessageCallbackA
- 000000007728df18 7 bytes JMP 000000016fff04c8
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\wininit.exe[492] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\csrss.exe[504] C:\windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort
- 00000000773613c0 8 bytes JMP 000000016fff00d8
- .text C:\windows\system32\csrss.exe[504] C:\windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx
- 00000000773615c0 8 bytes JMP 000000016fff0110
- .text C:\windows\system32\csrss.exe[504] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0148
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\system32\services.exe[552] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\system32\services.exe[552] C:\windows\system32\kernel32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\windows\system32\services.exe[552] C:\windows\system32\kernel32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\windows\system32\services.exe[552] C:\windows\system32\kernel32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\windows\system32\services.exe[552] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\services.exe[552] C:\windows\system32\RPCRT4.dll!RpcServerRegisterIfEx
- 000007fefeac6bd0 5 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!RegisterRawInputDevices
- 0000000077216ef0 8 bytes JMP 000000016fff06f8
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SystemParametersInfoA
- 0000000077218184 7 bytes JMP 000000016fff0880
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SetParent
- 0000000077218530 8 bytes JMP 000000016fff0730
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!PostMessageA
- 000000007721a404 5 bytes JMP 000000016fff0308
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!EnableWindow
- 000000007721aaa0 9 bytes JMP 000000016fff08f0
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!MoveWindow
- 000000007721aad0 8 bytes JMP 000000016fff0768
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!GetAsyncKeyState
- 000000007721c720 5 bytes JMP 000000016fff06c0
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!RegisterHotKey
- 000000007721cd50 8 bytes JMP 000000016fff0848
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!PostThreadMessageA
- 000000007721d2b0 5 bytes JMP 000000016fff0378
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SendMessageA
- 000000007721d338 5 bytes JMP 000000016fff03e8
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SendNotifyMessageW
- 000000007721dc40 9 bytes JMP 000000016fff0570
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SystemParametersInfoW
- 000000007721f510 7 bytes JMP 000000016fff08b8
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SetWindowsHookExW
- 000000007721f874 9 bytes JMP 000000016fff0298
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SendMessageTimeoutW
- 000000007721fac0 9 bytes JMP 000000016fff0490
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!PostThreadMessageW
- 0000000077220b74 10 bytes JMP 000000016fff03b0
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SetWinEventHook
- 0000000077224d4c 5 bytes JMP 000000016fff02d0
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!GetKeyState
- 0000000077225010 5 bytes JMP 000000016fff0688
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SendMessageCallbackW
- 0000000077225438 7 bytes JMP 000000016fff0500
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SendMessageW
- 0000000077226b50 5 bytes JMP 000000016fff0420
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!PostMessageW
- 00000000772276e4 7 bytes JMP 000000016fff0340
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SendDlgItemMessageW
- 000000007722dd90 5 bytes JMP 000000016fff05e0
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!GetClipboardData
- 000000007722e874 5 bytes JMP 000000016fff0810
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SetClipboardViewer
- 000000007722f780 8 bytes JMP 000000016fff07a0
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SendNotifyMessageA
- 00000000772328e4 12 bytes JMP 000000016fff0538
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!mouse_event
- 0000000077233894 7 bytes JMP 000000016fff0228
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!GetKeyboardState
- 0000000077238a10 8 bytes JMP 000000016fff0650
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SendMessageTimeoutA
- 0000000077238be0 12 bytes JMP 000000016fff0458
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SetWindowsHookExA
- 0000000077238c20 12 bytes JMP 000000016fff0260
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SendInput
- 0000000077238cd0 8 bytes JMP 000000016fff0618
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!BlockInput
- 000000007723ad60 8 bytes JMP 000000016fff07d8
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!ExitWindowsEx
- 00000000772614e0 5 bytes JMP 000000016fff0928
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!keybd_event
- 00000000772845a4 7 bytes JMP 000000016fff01f0
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SendDlgItemMessageA
- 000000007728cc08 5 bytes JMP 000000016fff05a8
- .text C:\windows\system32\services.exe[552] C:\windows\system32\USER32.dll!SendMessageCallbackA
- 000000007728df18 7 bytes JMP 000000016fff04c8
- .text C:\windows\system32\services.exe[552] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\services.exe[552] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\services.exe[552] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\services.exe[552] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\services.exe[552] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\services.exe[552] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\services.exe[552] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0378
- .text C:\windows\system32\services.exe[552] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\system32\lsass.exe[568] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\system32\lsass.exe[568] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\lsass.exe[568] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\lsass.exe[568] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\lsass.exe[568] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\lsass.exe[568] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\lsass.exe[568] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\lsass.exe[568] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\lsass.exe[568] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\lsass.exe[568] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\lsass.exe[568] C:\windows\system32\ADVAPI32.dll!CreateProcessAsUserA
- 000007fefebfa1a0 7 bytes JMP 000007fffd0c0180
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\system32\lsm.exe[580] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\system32\lsm.exe[580] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\lsm.exe[580] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\lsm.exe[580] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\lsm.exe[580] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\lsm.exe[580] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\lsm.exe[580] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\lsm.exe[580] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\lsm.exe[580] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\lsm.exe[580] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\system32\svchost.exe[736] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\kernel32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\kernel32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\kernel32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\RPCRT4.dll!RpcServerRegisterIfEx
- 000007fefeac6bd0 5 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0378
- .text C:\windows\system32\svchost.exe[736] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\system32\svchost.exe[812] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\system32\svchost.exe[812] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\svchost.exe[812] C:\windows\system32\RPCRT4.dll!RpcServerRegisterIfEx
- 000007fefeac6bd0 5 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\svchost.exe[812] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\svchost.exe[812] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\svchost.exe[812] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\svchost.exe[812] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\svchost.exe[812] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\svchost.exe[812] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\svchost.exe[812] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0378
- .text C:\windows\system32\svchost.exe[812] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\svchost.exe[812] C:\windows\system32\ADVAPI32.dll!CreateProcessAsUserA
- 000007fefebfa1a0 7 bytes JMP 000007fffd0c0180
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\system32\svchost.exe[944] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\kernel32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\kernel32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\kernel32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\svchost.exe[944] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\System32\svchost.exe[984] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\kernel32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\kernel32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\kernel32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\System32\svchost.exe[984] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\System32\svchost.exe[1020] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\kernel32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\kernel32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\kernel32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\System32\svchost.exe[1020] C:\windows\system32\ADVAPI32.dll!CreateProcessAsUserA
- 000007fefebfa1a0 7 bytes JMP 000007fffd0c0180
- [snip]
- .text C:\windows\system32\svchost.exe[1180] C:\windows\system32\ADVAPI32.dll!CreateProcessAsUserA
- 000007fefebfa1a0 7 bytes JMP 000007fffd0c0180
- .text C:\windows\System32\spoolsv.exe[1292] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- [snip]
- .text C:\windows\System32\spoolsv.exe[1292] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\System32\spoolsv.exe[1292] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\kernel32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\kernel32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\kernel32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\taskhost.exe[1400] C:\windows\system32\ADVAPI32.dll!CreateProcessAsUserA
- 000007fefebfa1a0 7 bytes JMP 000007fffd0c0180
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtClose
- 000000007750f9c0 5 bytes JMP 000000011001d120
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtTerminateProcess
- 000000007750fc90 5 bytes JMP 000000011002fc20
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtOpenFile
- 000000007750fd44 5 bytes JMP 000000011002e100
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtOpenSection
- 000000007750fda8 5 bytes JMP 000000011002ed90
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtAdjustPrivilegesToken
- 000000007750fea0 5 bytes JMP 000000011002c3c0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtCreateSection
- 000000007750ff84 5 bytes JMP 000000011002e7a0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtCreateThread
- 000000007750ffe4 2 bytes JMP 0000000110030080
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtCreateThread + 3
- 000000007750ffe7 2 bytes [B2, 98]
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtTerminateThread
- 0000000077510064 5 bytes JMP 000000011002fe40
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtCreateFile
- 0000000077510094 5 bytes JMP 000000011002e400
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtAlpcConnectPort
- 0000000077510398 5 bytes JMP 000000011002cde0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077510530 5 bytes JMP 000000011002b670
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtConnectPort
- 0000000077510674 5 bytes JMP 000000011002f8b0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject
- 000000007751086c 5 bytes JMP 000000011002bfe0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtCreateThreadEx
- 0000000077510884 5 bytes JMP 000000011002ca40
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtLoadDriver
- 0000000077510dd4 5 bytes JMP 000000011002f6a0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtMakeTemporaryObject
- 0000000077510eb8 5 bytes JMP 000000011002f220
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtSetSystemInformation
- 0000000077511bc4 5 bytes JMP 000000011002f460
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtShutdownSystem
- 0000000077511c94 5 bytes JMP 000000011002c670
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!NtSystemDebugControl
- 0000000077511d6c 5 bytes JMP 000000011002f020
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!LdrLoadDll
- 000000007752c45a 5 bytes JMP 0000000110027f40
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\SysWOW64\ntdll.dll!LdrUnloadDll
- 0000000077531217 7 bytes JMP 000000011001d240
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\kernel32.dll!CreateProcessW
- 0000000074ff103d 5 bytes JMP 0000000110025070
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\kernel32.dll!CreateProcessA
- 0000000074ff1072 5 bytes JMP 0000000110025c00
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\kernel32.dll!CreateProcessAsUserW
- 000000007501c9b5 5 bytes JMP 0000000110023ba0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\KERNELBASE.dll!SetProcessShutdownParameters
- 00000000760ff776 5 bytes JMP 000000011001d270
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!PostThreadMessageW
- 0000000075988bff 5 bytes JMP 000000011001b6e0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SystemParametersInfoW
- 00000000759890d3 7 bytes JMP 000000011001c470
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SendMessageW
- 0000000075989679 5 bytes JMP 000000011001b1a0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SendMessageTimeoutW
- 00000000759897d2 5 bytes JMP 000000011001ac20
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SetWinEventHook
- 000000007598ee09 5 bytes JMP 000000011001c160
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!RegisterHotKey
- 000000007598efc9 5 bytes JMP 0000000110018140
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!PostMessageW
- 00000000759912a5 5 bytes JMP 000000011001bc20
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!GetKeyState
- 000000007599291f 5 bytes JMP 00000001100193d0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SetParent
- 0000000075992d64 5 bytes JMP 0000000110018980
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!EnableWindow
- 0000000075992da4 5 bytes JMP 0000000110017ea0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!MoveWindow
- 0000000075993698 5 bytes JMP 0000000110018c20
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!PostMessageA
- 0000000075993baa 5 bytes JMP 000000011001bec0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!PostThreadMessageA
- 0000000075993c61 5 bytes JMP 000000011001b980
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SendMessageA
- 000000007599612e 5 bytes JMP 000000011001b440
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SystemParametersInfoA
- 0000000075996c30 7 bytes JMP 000000011001c690
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SetWindowsHookExW
- 0000000075997603 5 bytes JMP 000000011001c8b0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SendNotifyMessageW
- 0000000075997668 5 bytes JMP 000000011001a160
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SendMessageCallbackW
- 00000000759976e0 5 bytes JMP 000000011001a6a0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SendMessageTimeoutA
- 000000007599781f 5 bytes JMP 000000011001aee0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SetWindowsHookExA
- 000000007599835c 5 bytes JMP 000000011001cb20
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SetClipboardViewer
- 000000007599c4b6 5 bytes JMP 0000000110018780
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SendDlgItemMessageA
- 00000000759ac112 5 bytes JMP 0000000110019eb0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SendDlgItemMessageW
- 00000000759ad0f5 5 bytes JMP 0000000110019c00
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!GetAsyncKeyState
- 00000000759aeb96 5 bytes JMP 0000000110019120
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!GetKeyboardState
- 00000000759aec68 5 bytes JMP 0000000110019680
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SendInput
- 00000000759aff4a 5 bytes JMP 0000000110019930
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!GetClipboardData
- 00000000759c9f1d 5 bytes JMP 0000000110018370
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!ExitWindowsEx
- 00000000759d1497 5 bytes JMP 0000000110017c90
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!mouse_event
- 00000000759e027b 5 bytes JMP 00000001100297c0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!keybd_event
- 00000000759e02bf 5 bytes JMP 00000001100299d0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SendMessageCallbackA
- 00000000759e6cfc 5 bytes JMP 000000011001a960
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!SendNotifyMessageA
- 00000000759e6d5d 5 bytes JMP 000000011001a400
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!BlockInput
- 00000000759e7dd7 5 bytes JMP 0000000110018580
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\USER32.dll!RegisterRawInputDevices
- 00000000759e88eb 5 bytes JMP 0000000110018f00
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\GDI32.dll!DeleteDC
- 0000000075fa58b3 5 bytes JMP 0000000110028d10
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\GDI32.dll!BitBlt
- 0000000075fa5ea6 5 bytes JMP 0000000110029530
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\GDI32.dll!CreateDCA
- 0000000075fa7bcc 5 bytes JMP 0000000110029e10
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\GDI32.dll!StretchBlt
- 0000000075fab895 5 bytes JMP 0000000110028d50
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\GDI32.dll!MaskBlt
- 0000000075fac332 5 bytes JMP 0000000110029280
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\GDI32.dll!GetPixel
- 0000000075facbfb 5 bytes JMP 0000000110028ae0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\GDI32.dll!CreateDCW
- 0000000075fae743 5 bytes JMP 0000000110029d10
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\GDI32.dll!PlgBlt
- 0000000075fd4646 5 bytes JMP 0000000110028ff0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1556] C:\windows\syswow64\ADVAPI32.dll!CreateProcessAsUserA
- 0000000077002538 5 bytes JMP 00000001100244d0
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\kernel32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\kernel32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\kernel32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\svchost.exe[1720] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\svchost.exe[2088] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\svchost.exe[2088] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\svchost.exe[2088] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\svchost.exe[2088] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\svchost.exe[2088] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\svchost.exe[2088] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\svchost.exe[2088] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\svchost.exe[2088] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\svchost.exe[2088] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\kernel32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\kernel32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\kernel32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\System32\rundll32.exe[2172] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\Dwm.exe[2724] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\Dwm.exe[2724] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\Dwm.exe[2724] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\Dwm.exe[2724] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\Dwm.exe[2724] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\Dwm.exe[2724] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\Dwm.exe[2724] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\Dwm.exe[2724] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\Dwm.exe[2724] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\Explorer.EXE[2732] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\kernel32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\kernel32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\kernel32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!RegisterRawInputDevices
- 0000000077216ef0 8 bytes JMP 000000016fff06f8
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SystemParametersInfoA
- 0000000077218184 7 bytes JMP 000000016fff0880
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SetParent
- 0000000077218530 8 bytes JMP 000000016fff0730
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!PostMessageA
- 000000007721a404 5 bytes JMP 000000016fff0308
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!EnableWindow
- 000000007721aaa0 9 bytes JMP 000000016fff08f0
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!MoveWindow
- 000000007721aad0 8 bytes JMP 000000016fff0768
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!GetAsyncKeyState
- 000000007721c720 5 bytes JMP 000000016fff06c0
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!RegisterHotKey
- 000000007721cd50 8 bytes JMP 000000016fff0848
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!PostThreadMessageA
- 000000007721d2b0 5 bytes JMP 000000016fff0378
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SendMessageA
- 000000007721d338 5 bytes JMP 000000016fff03e8
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SendNotifyMessageW
- 000000007721dc40 9 bytes JMP 000000016fff0570
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SystemParametersInfoW
- 000000007721f510 7 bytes JMP 000000016fff08b8
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SetWindowsHookExW
- 000000007721f874 9 bytes JMP 000000016fff0298
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SendMessageTimeoutW
- 000000007721fac0 9 bytes JMP 000000016fff0490
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!PostThreadMessageW
- 0000000077220b74 10 bytes JMP 000000016fff03b0
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SetWinEventHook
- 0000000077224d4c 5 bytes JMP 000000016fff02d0
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!GetKeyState
- 0000000077225010 5 bytes JMP 000000016fff0688
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SendMessageCallbackW
- 0000000077225438 7 bytes JMP 000000016fff0500
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SendMessageW
- 0000000077226b50 5 bytes JMP 000000016fff0420
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!PostMessageW
- 00000000772276e4 7 bytes JMP 000000016fff0340
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SendDlgItemMessageW
- 000000007722dd90 5 bytes JMP 000000016fff05e0
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!GetClipboardData
- 000000007722e874 5 bytes JMP 000000016fff0810
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SetClipboardViewer
- 000000007722f780 8 bytes JMP 000000016fff07a0
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SendNotifyMessageA
- 00000000772328e4 12 bytes JMP 000000016fff0538
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!mouse_event
- 0000000077233894 7 bytes JMP 000000016fff0228
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!GetKeyboardState
- 0000000077238a10 8 bytes JMP 000000016fff0650
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SendMessageTimeoutA
- 0000000077238be0 12 bytes JMP 000000016fff0458
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SetWindowsHookExA
- 0000000077238c20 12 bytes JMP 000000016fff0260
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SendInput
- 0000000077238cd0 8 bytes JMP 000000016fff0618
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!BlockInput
- 000000007723ad60 8 bytes JMP 000000016fff07d8
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!ExitWindowsEx
- 00000000772614e0 5 bytes JMP 000000016fff0928
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!keybd_event
- 00000000772845a4 7 bytes JMP 000000016fff01f0
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SendDlgItemMessageA
- 000000007728cc08 5 bytes JMP 000000016fff05a8
- .text C:\windows\Explorer.EXE[2732] C:\windows\system32\USER32.dll!SendMessageCallbackA
- 000000007728df18 7 bytes JMP 000000016fff04c8
- .text C:\windows\system32\svchost.exe[2856] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\svchost.exe[2856] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\svchost.exe[2856] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\svchost.exe[2856] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\svchost.exe[2856] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\svchost.exe[2856] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\svchost.exe[2856] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\svchost.exe[2856] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\svchost.exe[2856] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\system32\kernel32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\system32\kernel32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\system32\kernel32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\windows\system32\SearchIndexer.exe[2968] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtClose
- 000000007750f9c0 5 bytes JMP 000000011001d120
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtTerminateProcess
- 000000007750fc90 5 bytes JMP 000000011002fc20
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtOpenFile
- 000000007750fd44 5 bytes JMP 000000011002e100
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtOpenSection
- 000000007750fda8 5 bytes JMP 000000011002ed90
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtAdjustPrivilegesToken
- 000000007750fea0 5 bytes JMP 000000011002c3c0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtCreateSection
- 000000007750ff84 5 bytes JMP 000000011002e7a0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtCreateThread
- 000000007750ffe4 2 bytes JMP 0000000110030080
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtCreateThread + 3
- 000000007750ffe7 2 bytes [B2, 98]
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtTerminateThread
- 0000000077510064 5 bytes JMP 000000011002fe40
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtCreateFile
- 0000000077510094 5 bytes JMP 000000011002e400
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtAlpcConnectPort
- 0000000077510398 5 bytes JMP 000000011002cde0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077510530 5 bytes JMP 000000011002b670
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtConnectPort
- 0000000077510674 5 bytes JMP 000000011002f8b0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject
- 000000007751086c 5 bytes JMP 000000011002bfe0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtCreateThreadEx
- 0000000077510884 5 bytes JMP 000000011002ca40
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtLoadDriver
- 0000000077510dd4 5 bytes JMP 000000011002f6a0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtMakeTemporaryObject
- 0000000077510eb8 5 bytes JMP 000000011002f220
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtSetSystemInformation
- 0000000077511bc4 5 bytes JMP 000000011002f460
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtShutdownSystem
- 0000000077511c94 5 bytes JMP 000000011002c670
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!NtSystemDebugControl
- 0000000077511d6c 5 bytes JMP 000000011002f020
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!LdrLoadDll
- 000000007752c45a 5 bytes JMP 0000000110027f40
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\SysWOW64\ntdll.dll!LdrUnloadDll
- 0000000077531217 7 bytes JMP 000000011001d240
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\kernel32.dll!CreateProcessW
- 0000000074ff103d 5 bytes JMP 0000000110025070
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\kernel32.dll!CreateProcessA
- 0000000074ff1072 5 bytes JMP 0000000110025c00
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\kernel32.dll!CreateProcessAsUserW
- 000000007501c9b5 5 bytes JMP 0000000110023ba0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\KERNELBASE.dll!SetProcessShutdownParameters
- 00000000760ff776 5 bytes JMP 000000011001d270
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!PostThreadMessageW
- 0000000075988bff 5 bytes JMP 000000011001b6e0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SystemParametersInfoW
- 00000000759890d3 7 bytes JMP 000000011001c470
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SendMessageW
- 0000000075989679 5 bytes JMP 000000011001b1a0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SendMessageTimeoutW
- 00000000759897d2 5 bytes JMP 000000011001ac20
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SetWinEventHook
- 000000007598ee09 5 bytes JMP 000000011001c160
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!RegisterHotKey
- 000000007598efc9 5 bytes JMP 0000000110018140
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!PostMessageW
- 00000000759912a5 5 bytes JMP 000000011001bc20
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!GetKeyState
- 000000007599291f 5 bytes JMP 00000001100193d0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SetParent
- 0000000075992d64 5 bytes JMP 0000000110018980
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!EnableWindow
- 0000000075992da4 5 bytes JMP 0000000110017ea0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!MoveWindow
- 0000000075993698 5 bytes JMP 0000000110018c20
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!PostMessageA
- 0000000075993baa 5 bytes JMP 000000011001bec0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!PostThreadMessageA
- 0000000075993c61 5 bytes JMP 000000011001b980
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SendMessageA
- 000000007599612e 5 bytes JMP 000000011001b440
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SystemParametersInfoA
- 0000000075996c30 7 bytes JMP 000000011001c690
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SetWindowsHookExW
- 0000000075997603 5 bytes JMP 000000011001c8b0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SendNotifyMessageW
- 0000000075997668 5 bytes JMP 000000011001a160
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SendMessageCallbackW
- 00000000759976e0 5 bytes JMP 000000011001a6a0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SendMessageTimeoutA
- 000000007599781f 5 bytes JMP 000000011001aee0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SetWindowsHookExA
- 000000007599835c 5 bytes JMP 000000011001cb20
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SetClipboardViewer
- 000000007599c4b6 5 bytes JMP 0000000110018780
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SendDlgItemMessageA
- 00000000759ac112 5 bytes JMP 0000000110019eb0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SendDlgItemMessageW
- 00000000759ad0f5 5 bytes JMP 0000000110019c00
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!GetAsyncKeyState
- 00000000759aeb96 5 bytes JMP 0000000110019120
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!GetKeyboardState
- 00000000759aec68 5 bytes JMP 0000000110019680
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SendInput
- 00000000759aff4a 5 bytes JMP 0000000110019930
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!GetClipboardData
- 00000000759c9f1d 5 bytes JMP 0000000110018370
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!ExitWindowsEx
- 00000000759d1497 5 bytes JMP 0000000110017c90
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!mouse_event
- 00000000759e027b 5 bytes JMP 00000001100297c0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!keybd_event
- 00000000759e02bf 5 bytes JMP 00000001100299d0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SendMessageCallbackA
- 00000000759e6cfc 5 bytes JMP 000000011001a960
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!SendNotifyMessageA
- 00000000759e6d5d 5 bytes JMP 000000011001a400
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!BlockInput
- 00000000759e7dd7 5 bytes JMP 0000000110018580
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\USER32.dll!RegisterRawInputDevices
- 00000000759e88eb 5 bytes JMP 0000000110018f00
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\GDI32.dll!DeleteDC
- 0000000075fa58b3 5 bytes JMP 0000000110028d10
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\GDI32.dll!BitBlt
- 0000000075fa5ea6 5 bytes JMP 0000000110029530
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\GDI32.dll!CreateDCA
- 0000000075fa7bcc 5 bytes JMP 0000000110029e10
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\GDI32.dll!StretchBlt
- 0000000075fab895 5 bytes JMP 0000000110028d50
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\GDI32.dll!MaskBlt
- 0000000075fac332 5 bytes JMP 0000000110029280
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\GDI32.dll!GetPixel
- 0000000075facbfb 5 bytes JMP 0000000110028ae0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\GDI32.dll!CreateDCW
- 0000000075fae743 5 bytes JMP 0000000110029d10
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\GDI32.dll!PlgBlt
- 0000000075fd4646 5 bytes JMP 0000000110028ff0
- .text C:\Users\jane \AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe[3044] C:\windows\syswow64\ADVAPI32.dll!CreateProcessAsUserA
- 0000000077002538 5 bytes JMP 00000001100244d0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtClose
- 000000007750f9c0 5 bytes JMP 000000011001d120
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtTerminateProcess
- 000000007750fc90 5 bytes JMP 000000011002fc20
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtOpenFile
- 000000007750fd44 5 bytes JMP 000000011002e100
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtOpenSection
- 000000007750fda8 5 bytes JMP 000000011002ed90
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtAdjustPrivilegesToken
- 000000007750fea0 5 bytes JMP 000000011002c3c0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtCreateSection
- 000000007750ff84 5 bytes JMP 000000011002e7a0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtCreateThread
- 000000007750ffe4 2 bytes JMP 0000000110030080
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtCreateThread + 3
- 000000007750ffe7 2 bytes [B2, 98]
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtTerminateThread
- 0000000077510064 5 bytes JMP 000000011002fe40
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtCreateFile
- 0000000077510094 5 bytes JMP 000000011002e400
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtAlpcConnectPort
- 0000000077510398 5 bytes JMP 000000011002cde0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077510530 5 bytes JMP 000000011002b670
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtConnectPort
- 0000000077510674 5 bytes JMP 000000011002f8b0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject
- 000000007751086c 5 bytes JMP 000000011002bfe0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtCreateThreadEx
- 0000000077510884 5 bytes JMP 000000011002ca40
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtLoadDriver
- 0000000077510dd4 5 bytes JMP 000000011002f6a0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtMakeTemporaryObject
- 0000000077510eb8 5 bytes JMP 000000011002f220
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtSetSystemInformation
- 0000000077511bc4 5 bytes JMP 000000011002f460
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtShutdownSystem
- 0000000077511c94 5 bytes JMP 000000011002c670
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!NtSystemDebugControl
- 0000000077511d6c 5 bytes JMP 000000011002f020
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!LdrLoadDll
- 000000007752c45a 5 bytes JMP 0000000110027f40
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\SysWOW64\ntdll.dll!LdrUnloadDll
- 0000000077531217 7 bytes JMP 000000011001d240
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\kernel32.dll!CreateProcessW
- 0000000074ff103d 5 bytes JMP 0000000110025070
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\kernel32.dll!CreateProcessA
- 0000000074ff1072 5 bytes JMP 0000000110025c00
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\kernel32.dll!CreateProcessAsUserW
- 000000007501c9b5 5 bytes JMP 0000000110023ba0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\KERNELBASE.dll!SetProcessShutdownParameters
- 00000000760ff776 5 bytes JMP 000000011001d270
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\GDI32.dll!DeleteDC
- 0000000075fa58b3 5 bytes JMP 0000000110028d10
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\GDI32.dll!BitBlt
- 0000000075fa5ea6 5 bytes JMP 0000000110029530
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\GDI32.dll!CreateDCA
- 0000000075fa7bcc 5 bytes JMP 0000000110029e10
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\GDI32.dll!StretchBlt
- 0000000075fab895 5 bytes JMP 0000000110028d50
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\GDI32.dll!MaskBlt
- 0000000075fac332 5 bytes JMP 0000000110029280
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\GDI32.dll!GetPixel
- 0000000075facbfb 5 bytes JMP 0000000110028ae0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\GDI32.dll!CreateDCW
- 0000000075fae743 5 bytes JMP 0000000110029d10
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\GDI32.dll!PlgBlt
- 0000000075fd4646 5 bytes JMP 0000000110028ff0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!PostThreadMessageW
- 0000000075988bff 5 bytes JMP 000000011001b6e0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SystemParametersInfoW
- 00000000759890d3 7 bytes JMP 000000011001c470
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SendMessageW
- 0000000075989679 5 bytes JMP 000000011001b1a0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SendMessageTimeoutW
- 00000000759897d2 5 bytes JMP 000000011001ac20
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SetWinEventHook
- 000000007598ee09 5 bytes JMP 000000011001c160
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!RegisterHotKey
- 000000007598efc9 5 bytes JMP 0000000110018140
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!PostMessageW
- 00000000759912a5 5 bytes JMP 000000011001bc20
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!GetKeyState
- 000000007599291f 5 bytes JMP 00000001100193d0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SetParent
- 0000000075992d64 5 bytes JMP 0000000110018980
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!EnableWindow
- 0000000075992da4 5 bytes JMP 0000000110017ea0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!MoveWindow
- 0000000075993698 5 bytes JMP 0000000110018c20
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!PostMessageA
- 0000000075993baa 5 bytes JMP 000000011001bec0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!PostThreadMessageA
- 0000000075993c61 5 bytes JMP 000000011001b980
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SendMessageA
- 000000007599612e 5 bytes JMP 000000011001b440
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SystemParametersInfoA
- 0000000075996c30 7 bytes JMP 000000011001c690
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SetWindowsHookExW
- 0000000075997603 5 bytes JMP 000000011001c8b0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SendNotifyMessageW
- 0000000075997668 5 bytes JMP 000000011001a160
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SendMessageCallbackW
- 00000000759976e0 5 bytes JMP 000000011001a6a0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SendMessageTimeoutA
- 000000007599781f 5 bytes JMP 000000011001aee0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SetWindowsHookExA
- 000000007599835c 5 bytes JMP 000000011001cb20
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SetClipboardViewer
- 000000007599c4b6 5 bytes JMP 0000000110018780
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SendDlgItemMessageA
- 00000000759ac112 5 bytes JMP 0000000110019eb0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SendDlgItemMessageW
- 00000000759ad0f5 5 bytes JMP 0000000110019c00
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!GetAsyncKeyState
- 00000000759aeb96 5 bytes JMP 0000000110019120
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!GetKeyboardState
- 00000000759aec68 5 bytes JMP 0000000110019680
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SendInput
- 00000000759aff4a 5 bytes JMP 0000000110019930
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!GetClipboardData
- 00000000759c9f1d 5 bytes JMP 0000000110018370
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!ExitWindowsEx
- 00000000759d1497 5 bytes JMP 0000000110017c90
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!mouse_event
- 00000000759e027b 5 bytes JMP 00000001100297c0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!keybd_event
- 00000000759e02bf 5 bytes JMP 00000001100299d0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SendMessageCallbackA
- 00000000759e6cfc 5 bytes JMP 000000011001a960
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!SendNotifyMessageA
- 00000000759e6d5d 5 bytes JMP 000000011001a400
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!BlockInput
- 00000000759e7dd7 5 bytes JMP 0000000110018580
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\USER32.dll!RegisterRawInputDevices
- 00000000759e88eb 5 bytes JMP 0000000110018f00
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\ADVAPI32.dll!CreateProcessAsUserA
- 0000000077002538 5 bytes JMP 00000001100244d0
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\psapi.dll!GetModuleInformation + 69
- 00000000774c1465 2 bytes [4C, 77]
- .text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[2460] C:\windows\syswow64\psapi.dll!GetModuleInformation + 155
- 00000000774c14bb 2 bytes [4C, 77]
- .text ...
- * 2
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!LdrUnloadDll
- 0000000077333ae0 5 bytes JMP 000000016fff0110
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!LdrLoadDll
- 0000000077337a90 5 bytes JMP 000000016fff0d50
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtClose
- 0000000077361400 8 bytes JMP 000000016fff00d8
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtTerminateProcess
- 00000000773615d0 8 bytes JMP 000000016fff0a78
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtOpenFile
- 0000000077361640 8 bytes JMP 000000016fff0c00
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtOpenSection
- 0000000077361680 8 bytes JMP 000000016fff0b90
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtAdjustPrivilegesToken
- 0000000077361720 8 bytes JMP 000000016fff0c38
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtCreateSection
- 00000000773617b0 8 bytes JMP 000000016fff0b58
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtCreateThread
- 00000000773617f0 8 bytes JMP 000000016fff0998
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread
- 0000000077361840 1 byte JMP 000000016fff09d0
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtTerminateThread + 2
- 0000000077361842 6 bytes {JMP 0xfffffffff8c8f190}
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtCreateFile
- 0000000077361860 8 bytes JMP 000000016fff0bc8
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtAlpcConnectPort
- 0000000077361a50 8 bytes JMP 000000016fff0d18
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort
- 0000000077361b60 8 bytes JMP 000000016fff0960
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtConnectPort
- 0000000077361c30 8 bytes JMP 000000016fff0ab0
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtCreateSymbolicLinkObject
- 0000000077361d80 8 bytes JMP 000000016fff0c70
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtCreateThreadEx
- 0000000077361d90 8 bytes JMP 000000016fff0ce0
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtLoadDriver
- 0000000077362100 8 bytes JMP 000000016fff0ae8
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtMakeTemporaryObject
- 0000000077362190 8 bytes JMP 000000016fff0ca8
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtSetSystemInformation
- 0000000077362a00 8 bytes JMP 000000016fff0b20
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtShutdownSystem
- 0000000077362a80 8 bytes JMP 000000016fff0a08
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\SYSTEM32\ntdll.dll!NtSystemDebugControl
- 0000000077362b00 8 bytes JMP 000000016fff0a40
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\KERNEL32.dll!CreateProcessAsUserW
- 00000000770fa420 12 bytes JMP 000000016fff01b8
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\KERNEL32.dll!CreateProcessW
- 0000000077111b50 12 bytes JMP 000000016fff0148
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\KERNEL32.dll!CreateProcessA
- 0000000077188810 7 bytes JMP 000000016fff0180
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\Program Files (x86)\EMET\EMET_notifier.exe[2524] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- .text C:\windows\system32\wbem\wmiprvse.exe[1864] C:\windows\system32\KERNELBASE.dll!SetProcessShutdownParameters
- 000007fefd305290 7 bytes JMP 000007fffd0c0148
- .text C:\windows\system32\wbem\wmiprvse.exe[1864] C:\windows\system32\ADVAPI32.dll!CreateProcessAsUserA
- 000007fefebfa1a0 7 bytes JMP 000007fffd0c0180
- .text C:\windows\system32\wbem\wmiprvse.exe[1864] C:\windows\system32\GDI32.dll!DeleteDC
- 000007fefe3522cc 5 bytes JMP 000007fffd0c0260
- .text C:\windows\system32\wbem\wmiprvse.exe[1864] C:\windows\system32\GDI32.dll!BitBlt
- 000007fefe3524c0 5 bytes JMP 000007fffd0c0298
- .text C:\windows\system32\wbem\wmiprvse.exe[1864] C:\windows\system32\GDI32.dll!MaskBlt
- 000007fefe355be0 5 bytes JMP 000007fffd0c02d0
- .text C:\windows\system32\wbem\wmiprvse.exe[1864] C:\windows\system32\GDI32.dll!CreateDCW
- 000007fefe358398 9 bytes JMP 000007fffd0c01f0
- .text C:\windows\system32\wbem\wmiprvse.exe[1864] C:\windows\system32\GDI32.dll!CreateDCA
- 000007fefe3589c8 9 bytes JMP 000007fffd0c01b8
- .text C:\windows\system32\wbem\wmiprvse.exe[1864] C:\windows\system32\GDI32.dll!GetPixel
- 000007fefe359344 5 bytes JMP 000007fffd0c0228
- .text C:\windows\system32\wbem\wmiprvse.exe[1864] C:\windows\system32\GDI32.dll!StretchBlt
- 000007fefe35b9e8 5 bytes JMP 000007fffd0c0340
- .text C:\windows\system32\wbem\wmiprvse.exe[1864] C:\windows\system32\GDI32.dll!PlgBlt
- 000007fefe365410 5 bytes JMP 000007fffd0c0308
- ---- User IAT/EAT - GMER 2.1 ----
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!_initterm]
- [5f20c48348482474]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!free]
- [ccccccccccccccc3]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!malloc]
- [6c894808245c8948]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!_unlock]
- [8966da8b48ff33c0]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!__dllonexit]
- [222444894820247c]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!_XcptFilter]
- [244489662a244489]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!??3@YAXPEAX@Z]
- [7a890574d73b482e]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!_amsg_exit]
- [23fe158d483a8904]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!??_U@YAPEAX_K@Z]
- [4cffffb763e8ffff]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!??_V@YAXPEAX@Z]
- [b80a75c73b48d88b]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!_purecall]
- [123e980070057]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[msvcrt.dll!wcschr]
- [8d482024448d4c00]
- [snip]
- IAT C:\windows\Explorer.EXE[2732] @ C:\windows\System32\shacct.dll[KERNEL32.dll!LocalAlloc]
- [1774ed851b78c085]
- <<<[IAT HOOKS FOR COMODO INTERNET SECURITY TRUNCATED FOR BREVITY]>>>
- ---- Devices - GMER 2.1 ----
- Device \FileSystem\fastfat \Fat
- fffff880081d4718
- Device \Driver\WudfPf \Device\WUDFLpcDevice
- fffff88008037910
- Device \Driver\USBSTOR -> DriverStartIo \Device\00000086
- fffff880081ac9c4
- Device \Driver\USBSTOR \Device\00000086
- fffff880081be578
- Device \Driver\WudfPf \Device\ProcessManagement
- fffff88008037910
- Device \Driver\USBSTOR -> DriverStartIo \Device\00000087
- fffff880081ac9c4
- Device \Driver\USBSTOR \Device\00000087
- fffff880081be578
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement