Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- GMER 2.1.19163 - http://www.gmer.net
- Rootkit scan 2013-07-21 17:44:48
- Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 M4-CT128 rev.000F 119,24GB
- Running: ow6cus0p.exe; Driver: C:\Users\Yves\AppData\Local\Temp\fwloqpod.sys
- ---- User code sections - GMER 2.1 ----
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 00000001001d091c
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 00000001001d0048
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001001d02ee
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001001d04b2
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001001d09fe
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 00000001001d0ae0
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010003004c
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 00000001001d012a
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 00000001001d0758
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 00000001001d0676
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001001d03d0
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 00000001001d0594
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 00000001001d083a
- .text C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe[964] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 00000001001d020c
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010027091c
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100270048
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001002702ee
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001002704b2
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001002709fe
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100270ae0
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010027012a
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100270758
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100270676
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001002703d0
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100270594
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010027083a
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010027020c
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100270f52
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 0000000100280210
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 0000000100280048
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a69a9d1}
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100270ca6
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001002803d8
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 000000010028012c
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001002802f4
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100270e6e
- .text C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe[468] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001002804bc
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 00000001001a091c
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 00000001001a0048
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001001a02ee
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001001a04b2
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001001a09fe
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 00000001001a0ae0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 00000001001a012a
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 00000001001a0758
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 00000001001a0676
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001001a03d0
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 00000001001a0594
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 00000001001a083a
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 00000001001a020c
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001001b059e
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 00000001001a0f52
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 00000001001b0210
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 00000001001b0048
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a5ca9d1}
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 00000001001a0ca6
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001001b03d8
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 00000001001b012c
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001001b02f4
- .text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1604] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 00000001001a0e6e
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 00000001001d091c
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 00000001001d0048
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001001d02ee
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001001d04b2
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001001d09fe
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 00000001001d0ae0
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 00000001001d012a
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 00000001001d0758
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 00000001001d0676
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001001d03d0
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 00000001001d0594
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 00000001001d083a
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 00000001001d020c
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 00000001001d0f52
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 0000000100260210
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 0000000100260048
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a67a9d1}
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 00000001001d0ca6
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001002603d8
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 000000010026012c
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001002602f4
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 00000001001d0e6e
- .text C:\Program Files (x86)\ASUS\AXSP\1.00.18\atkexComSvc.exe[1952] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001002604bc
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010029091c
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100290048
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001002902ee
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001002904b2
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001002909fe
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100290ae0
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010003004c
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010029012a
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100290758
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100290676
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001002903d0
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100290594
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010029083a
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010029020c
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001002a04bc
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100290f52
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 00000001002a0210
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 00000001002a0048
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a6ba9d1}
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100290ca6
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001002a03d8
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 00000001002a012c
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001002a02f4
- .text C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe[2116] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100290e6e
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010031091c
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100310048
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001003102ee
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001003104b2
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001003109fe
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100310ae0
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010003004c
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010031012a
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100310758
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100310676
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001003103d0
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100310594
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010031083a
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010031020c
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100310f52
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 0000000100320210
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 0000000100320048
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a73a9d1}
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100310ca6
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001003203d8
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 000000010032012c
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001003202f4
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100310e6e
- .text C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.11\AsSysCtrlService.exe[2152] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001003204bc
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 00000001003d091c
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 00000001003d0048
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001003d02ee
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001003d04b2
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001003d09fe
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 00000001003d0ae0
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 00000001001f004c
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 00000001003d012a
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 00000001003d0758
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 00000001003d0676
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001003d03d0
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 00000001003d0594
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 00000001003d083a
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 00000001003d020c
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001003e059e
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 00000001003d0f52
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 00000001003e0210
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 00000001003e0048
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a7fa9d1}
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 00000001003d0ca6
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001003e03d8
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 00000001003e012c
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001003e02f4
- .text C:\Program Files (x86)\devolo\dlan\devolonetsvc.exe[2188] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 00000001003d0e6e
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010009091c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100090048
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001000902ee
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001000904b2
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001000909fe
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100090ae0
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010009012a
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100090758
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100090676
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001000903d0
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100090594
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010009083a
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010009020c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100090f52
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 00000001000a0210
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 00000001000a0048
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a4ba9d1}
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100090ca6
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001000a03d8
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 00000001000a012c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001000a02f4
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100090e6e
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001000a04bc
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000772c1465 2 bytes [2C, 77]
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[2388] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000772c14bb 2 bytes [2C, 77]
- .text ... * 2
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 00000001001c091c
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 00000001001c0048
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001001c02ee
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001001c04b2
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001001c09fe
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 00000001001c0ae0
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 00000001001c012a
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 00000001001c0758
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 00000001001c0676
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001001c03d0
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 00000001001c0594
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 00000001001c083a
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 00000001001c020c
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001001d059e
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 00000001001c0f52
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 00000001001d0210
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 00000001001d0048
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a5ea9d1}
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 00000001001c0ca6
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001001d03d8
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 00000001001d012c
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001001d02f4
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 00000001001c0e6e
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 322 0000000072341a22 2 bytes [34, 72]
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 496 0000000072341ad0 2 bytes [34, 72]
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 552 0000000072341b08 2 bytes [34, 72]
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 730 0000000072341bba 2 bytes [34, 72]
- .text C:\Windows\SysWOW64\PnkBstrA.exe[3068] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 762 0000000072341bda 2 bytes [34, 72]
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 00000001001d091c
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 00000001001d0048
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001001d02ee
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001001d04b2
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001001d09fe
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 00000001001d0ae0
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 00000001001d012a
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 00000001001d0758
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 00000001001d0676
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001001d03d0
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 00000001001d0594
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 00000001001d083a
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 00000001001d020c
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 000000010026059e
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 00000001001d0f52
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 0000000100260210
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 0000000100260048
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a67a9d1}
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 00000001001d0ca6
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001002603d8
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 000000010026012c
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001002602f4
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 00000001001d0e6e
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 26 0000000073e013c6 2 bytes [E0, 73]
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 74 0000000073e013f6 2 bytes [E0, 73]
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 257 0000000073e014ad 2 bytes [E0, 73]
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 303 0000000073e014db 2 bytes [E0, 73]
- .text ... * 2
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 79 0000000073e01577 2 bytes [E0, 73]
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 175 0000000073e015d7 2 bytes [E0, 73]
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 620 0000000073e01794 2 bytes [E0, 73]
- .text C:\Windows\SysWOW64\vmnat.exe[2656] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 921 0000000073e018c1 2 bytes [E0, 73]
- .text D:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[3220] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000772c1465 2 bytes [2C, 77]
- .text D:\Program Files (x86)\VMware\VMware Player\vmware-authd.exe[3220] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000772c14bb 2 bytes [2C, 77]
- .text ... * 2
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010024091c
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100240048
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001002402ee
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001002404b2
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001002409fe
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100240ae0
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010024012a
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100240758
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100240676
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001002403d0
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100240594
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010024083a
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010024020c
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001002504bc
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100240f52
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 0000000100250210
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 0000000100250048
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a66a9d1}
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100240ca6
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001002503d8
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 000000010025012c
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001002502f4
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100240e6e
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\syswow64\Psapi.dll!GetModuleInformation + 69 00000000772c1465 2 bytes [2C, 77]
- .text C:\Users\Yves\AppData\Roaming\Dropbox\bin\Dropbox.exe[3228] C:\Windows\syswow64\Psapi.dll!GetModuleInformation + 155 00000000772c14bb 2 bytes [2C, 77]
- .text ... * 2
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 00000001000a091c
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 00000001000a0048
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001000a02ee
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001000a04b2
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001000a09fe
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 00000001000a0ae0
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010003004c
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 00000001000a012a
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 00000001000a0758
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 00000001000a0676
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001000a03d0
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 00000001000a0594
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 00000001000a083a
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 00000001000a020c
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001000b059e
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 00000001000a0f52
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 00000001000b0210
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 00000001000b0048
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a4ca9d1}
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 00000001000a0ca6
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001000b03d8
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 00000001000b012c
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001000b02f4
- .text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[3444] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 00000001000a0e6e
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010029091c
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100290048
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001002902ee
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001002904b2
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001002909fe
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100290ae0
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010029012a
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100290758
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100290676
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001002903d0
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100290594
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010029083a
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010029020c
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001002a0762
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100290f52
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 00000001002a0210
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 00000001002a0048
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a6ba9d1}
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100290ca6
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001002a03d8
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 00000001002a012c
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001002a02f4
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100290e6e
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000772c1465 2 bytes [2C, 77]
- .text C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe[3784] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000772c14bb 2 bytes [2C, 77]
- .text ... * 2
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010029091c
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100290048
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001002902ee
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001002904b2
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001002909fe
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100290ae0
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010029012a
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100290758
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100290676
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001002903d0
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100290594
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010029083a
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010029020c
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100290f52
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 00000001002a0210
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 00000001002a0048
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a6ba9d1}
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100290ca6
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001002a03d8
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 00000001002a012c
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001002a02f4
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100290e6e
- .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3184] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001002a059e
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010018091c
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100180048
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001001802ee
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001001804b2
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001001809fe
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100180ae0
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010018012a
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100180758
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100180676
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001001803d0
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100180594
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010018083a
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010018020c
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001001904bc
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100180f52
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 0000000100190210
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 0000000100190048
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a5aa9d1}
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100180ca6
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001001903d8
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 000000010019012c
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001001902f4
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[4660] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100180e6e
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010027091c
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100270048
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001002702ee
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001002704b2
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001002709fe
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100270ae0
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010027012a
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100270758
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100270676
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001002703d0
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100270594
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010027083a
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010027020c
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100270f52
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 0000000100290210
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 0000000100290048
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a6aa9d1}
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100270ca6
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001002903d8
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 000000010029012c
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001002902f4
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100270e6e
- .text D:\Program Files\AI Suite II\Sensor\AlertHelper\AlertHelper.exe[1244] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001002904bc
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010014091c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100140048
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001001402ee
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001001404b2
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001001409fe
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100140ae0
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010014012a
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100140758
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100140676
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001001403d0
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100140594
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010014083a
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010014020c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100140f52
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 0000000100150210
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 0000000100150048
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a56a9d1}
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100140ca6
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001001503d8
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 000000010015012c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001001502f4
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100140e6e
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[6856] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001001504bc
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010014091c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100140048
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001001402ee
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001001404b2
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001001409fe
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100140ae0
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010012004c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010014012a
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100140758
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100140676
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001001403d0
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100140594
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010014083a
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010014020c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100140f52
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 0000000100150210
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 0000000100150048
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a56a9d1}
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100140ca6
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001001503d8
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 000000010015012c
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001001502f4
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100140e6e
- .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[7044] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001001504bc
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007778fc90 5 bytes JMP 000000010028091c
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtWriteVirtualMemory 000000007778fdf4 5 bytes JMP 0000000100280048
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtOpenEvent 000000007778fe88 5 bytes JMP 00000001002802ee
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtCreateThread 000000007778ffe4 5 bytes JMP 00000001002804b2
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077790018 5 bytes JMP 00000001002809fe
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtResumeThread 0000000077790048 5 bytes JMP 0000000100280ae0
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtTerminateThread 0000000077790064 5 bytes JMP 000000010002004c
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtCreateMutant 000000007779077c 5 bytes JMP 000000010028012a
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtCreateSymbolicLinkObject 000000007779086c 5 bytes JMP 0000000100280758
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtCreateThreadEx 0000000077790884 5 bytes JMP 0000000100280676
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtLoadDriver 0000000077790dd4 5 bytes JMP 00000001002803d0
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 0000000077791900 5 bytes JMP 0000000100280594
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtSetSystemInformation 0000000077791bc4 5 bytes JMP 000000010028083a
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\ntdll.dll!NtSuspendThread 0000000077791d50 5 bytes JMP 000000010028020c
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity + 206 0000000075be524f 7 bytes JMP 0000000100280f52
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA + 380 0000000075be53d0 7 bytes JMP 0000000100290210
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 149 0000000075be5677 1 byte JMP 0000000100290048
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W + 151 0000000075be5679 5 bytes {JMP 0xffffffff8a6aa9d1}
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\sechost.dll!CreateServiceA + 542 0000000075be589a 7 bytes JMP 0000000100280ca6
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\sechost.dll!CreateServiceW + 382 0000000075be5a1d 7 bytes JMP 00000001002903d8
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\sechost.dll!QueryServiceConfigW + 370 0000000075be5c9b 7 bytes JMP 000000010029012c
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\sechost.dll!ControlServiceExA + 231 0000000075be5d87 7 bytes JMP 00000001002902f4
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\SysWOW64\sechost.dll!I_ScBroadcastServiceControlMessage + 123 0000000075be7240 7 bytes JMP 0000000100280e6e
- .text C:\Users\Yves\Downloads\ow6cus0p.exe[2592] C:\Windows\syswow64\USER32.dll!RecordShutdownReason + 882 0000000076f81492 7 bytes JMP 00000001002904bc
- ---- Threads - GMER 2.1 ----
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2444] 00000000777c3e45
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2888] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2892] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2896] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2904] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2912] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2916] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2920] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2924] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2928] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2932] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2936] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2940] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:3612] 00000000777c3e45
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:3152] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:4032] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:4028] 00000000777c2e25
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:3992] 0000000042cf2820
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:3552] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:3548] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:3404] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:2460] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:3640] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:5424] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:524] 00000000757cf5e1
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:4456] 00000000777c7111
- Thread D:\Program Files (x86)\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe [2432:6620] 00000000757cf5e1
- ---- Registry - GMER 2.1 ----
- Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Users\Yves\AppData\Local\Temp\JREInstall\x3031 1
- ---- EOF - GMER 2.1 ----
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement