Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- GMER 2.1.19163 - http://www.gmer.net
- Rootkit scan 2013-08-27 19:16:58
- Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 ST1000DM005_HD103SJ rev.1AJ100E5 931.51GB
- Running: lcxouxr3.exe; Driver: C:\Users\Chris\AppData\Local\Temp\fwloqpod.sys
- ---- Kernel code sections - GMER 2.1 ----
- INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 544 fffff800031ba000 45 bytes [00, 00, 00, 00, 00, 00, 00, ...]
- INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 591 fffff800031ba02f 16 bytes [00, 00, 00, 00, 00, 00, 00, ...]
- .text C:\Windows\system32\DRIVERS\USBPORT.SYS!DllUnload fffff880043add64 12 bytes {MOV RAX, 0xfffffa80081892a0; JMP RAX}
- ---- User code sections - GMER 2.1 ----
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000149840460
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000149840450
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000149840370
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000149840470
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000001498403e0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000149840320
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000001498403b0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000149840390
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000001498402e0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000001498402d0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000149840310
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000001498403c0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000001498403f0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000149840230
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000149840480
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000001498403a0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000001498402f0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000149840350
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000149840290
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000001498402b0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000001498403d0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000149840330
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000149840410
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000149840240
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000001498401e0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000149840250
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000149840490
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000001498404a0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000149840300
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000149840360
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000001498402a0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000001498402c0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000149840380
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000149840340
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000149840440
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000149840260
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000149840270
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000149840400
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000001498401f0
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000149840210
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000149840200
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000149840420
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000149840430
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000149840220
- .text C:\Windows\system32\csrss.exe[496] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000149840280
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000149840460
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000149840450
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000149840370
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000149840470
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000001498403e0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000149840320
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000001498403b0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000149840390
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000001498402e0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000001498402d0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000149840310
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000001498403c0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000001498403f0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000149840230
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000149840480
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000001498403a0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000001498402f0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000149840350
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000149840290
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000001498402b0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000001498403d0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000149840330
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000149840410
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000149840240
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000001498401e0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000149840250
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000149840490
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000001498404a0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000149840300
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000149840360
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000001498402a0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000001498402c0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000149840380
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000149840340
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000149840440
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000149840260
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000149840270
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000149840400
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000001498401f0
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000149840210
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000149840200
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000149840420
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000149840430
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000149840220
- .text C:\Windows\system32\csrss.exe[580] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000149840280
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 000000014a0c0460
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 000000014a0c0450
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 000000014a0c0370
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 000000014a0c0470
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 000000014a0c03e0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 000000014a0c0320
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 000000014a0c03b0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 000000014a0c0390
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 000000014a0c02e0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 000000014a0c02d0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 000000014a0c0310
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 000000014a0c03c0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 000000014a0c03f0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 000000014a0c0230
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 000000014a0c0480
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 000000014a0c03a0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 000000014a0c02f0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 000000014a0c0350
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 000000014a0c0290
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 000000014a0c02b0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 000000014a0c03d0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 000000014a0c0330
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 000000014a0c0410
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 000000014a0c0240
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 000000014a0c01e0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 000000014a0c0250
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 000000014a0c0490
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 000000014a0c04a0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 000000014a0c0300
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 000000014a0c0360
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 000000014a0c02a0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 000000014a0c02c0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 000000014a0c0380
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 000000014a0c0340
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 000000014a0c0440
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 000000014a0c0260
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 000000014a0c0270
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 000000014a0c0400
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 000000014a0c01f0
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 000000014a0c0210
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 000000014a0c0200
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 000000014a0c0420
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 000000014a0c0430
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 000000014a0c0220
- .text C:\Windows\system32\psxss.exe[588] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 000000014a0c0280
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\wininit.exe[628] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\winlogon.exe[636] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\services.exe[696] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\services.exe[696] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\lsass.exe[704] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\lsm.exe[712] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\svchost.exe[808] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\svchost.exe[900] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\atiesrxx.exe[980] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000100070460
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000100070450
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000100070370
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000100070470
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000001000703e0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000100070320
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000001000703b0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000100070390
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000001000702e0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000001000702d0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000100070310
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000001000703c0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000001000703f0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000100070230
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000100070480
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000001000703a0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000001000702f0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000100070350
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000100070290
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000001000702b0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000001000703d0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000100070330
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000100070410
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000100070240
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000001000701e0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000100070250
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000100070490
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000001000704a0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000100070300
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000100070360
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000001000702a0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000001000702c0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000100070380
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000100070340
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000100070440
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000100070260
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000100070270
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000100070400
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000001000701f0
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000100070210
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000100070200
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000100070420
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000100070430
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000100070220
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000100070280
- .text C:\Windows\System32\svchost.exe[116] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000100070460
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000100070450
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000100070370
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000100070470
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000001000703e0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000100070320
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000001000703b0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000100070390
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000001000702e0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000001000702d0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000100070310
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000001000703c0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000001000703f0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000100070230
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000100070480
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000001000703a0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000001000702f0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000100070350
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000100070290
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000001000702b0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000001000703d0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000100070330
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000100070410
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000100070240
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000001000701e0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000100070250
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000100070490
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000001000704a0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000100070300
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000100070360
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000001000702a0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000001000702c0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000100070380
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000100070340
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000100070440
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000100070260
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000100070270
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000100070400
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000001000701f0
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000100070210
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000100070200
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000100070420
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000100070430
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000100070220
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000100070280
- .text C:\Windows\System32\svchost.exe[396] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000100070460
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000100070450
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000100070370
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000100070470
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000001000703e0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000100070320
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000001000703b0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000100070390
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000001000702e0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000001000702d0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000100070310
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000001000703c0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000001000703f0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000100070230
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000100070480
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000001000703a0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000001000702f0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000100070350
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000100070290
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000001000702b0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000001000703d0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000100070330
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000100070410
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000100070240
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000001000701e0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000100070250
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000100070490
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000001000704a0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000100070300
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000100070360
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000001000702a0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000001000702c0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000100070380
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000100070340
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000100070440
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000100070260
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000100070270
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000100070400
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000001000701f0
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000100070210
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000100070200
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000100070420
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000100070430
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000100070220
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000100070280
- .text C:\Windows\system32\svchost.exe[432] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\svchost.exe[684] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\AUDIODG.EXE[1080] C:\Windows\System32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\svchost.exe[1292] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\atieclxx.exe[1596] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\System32\spoolsv.exe[1968] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1640] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Program Files\Bonjour\mDNSResponder.exe[1756] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Program Files (x86)\GNU\GnuPG\dirmngr.exe[1788] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000000771503e0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 0000000077150400
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Program Files\Droid Explorer\DroidExplorer.Service.exe[1720] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 000000007719fac0 5 bytes JMP 0000000100030600
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 000000007719fb58 5 bytes JMP 0000000100030804
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007719fcb0 5 bytes JMP 0000000100030c0c
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 00000000771a0038 5 bytes JMP 0000000100030a08
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 00000000771a1920 5 bytes JMP 0000000100030e10
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 00000000771bc4dd 5 bytes JMP 00000001000301f8
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 00000000771c1287 5 bytes JMP 00000001000303fc
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity 0000000075515181 5 bytes JMP 00000001000f1014
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA 0000000075515254 5 bytes JMP 00000001000f0804
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigW 00000000755153d5 5 bytes JMP 00000001000f0a08
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2A 00000000755154c2 5 bytes JMP 00000001000f0c0c
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W 00000000755155e2 5 bytes JMP 00000001000f0e10
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\sechost.dll!CreateServiceA 000000007551567c 5 bytes JMP 00000001000f01f8
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\sechost.dll!CreateServiceW 000000007551589f 5 bytes JMP 00000001000f03fc
- .text C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe[2320] C:\Windows\SysWOW64\sechost.dll!DeleteService 0000000075515a22 5 bytes JMP 00000001000f0600
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 000000007719fac0 5 bytes JMP 0000000100030600
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 000000007719fb58 5 bytes JMP 0000000100030804
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007719fcb0 5 bytes JMP 0000000100030c0c
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 00000000771a0038 5 bytes JMP 0000000100030a08
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 00000000771a1920 5 bytes JMP 0000000100030e10
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 00000000771bc4dd 5 bytes JMP 00000001000301f8
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 00000000771c1287 5 bytes JMP 00000001000303fc
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\syswow64\USER32.dll!SetWinEventHook 0000000076aaee09 5 bytes JMP 00000001002301f8
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 0000000076ab3982 5 bytes JMP 00000001002303fc
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 0000000076ab7603 5 bytes JMP 0000000100230804
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 0000000076ab835c 5 bytes JMP 0000000100230600
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 0000000076acf52b 5 bytes JMP 0000000100230a08
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity 0000000075515181 5 bytes JMP 0000000100241014
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA 0000000075515254 5 bytes JMP 0000000100240804
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigW 00000000755153d5 5 bytes JMP 0000000100240a08
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2A 00000000755154c2 5 bytes JMP 0000000100240c0c
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W 00000000755155e2 5 bytes JMP 0000000100240e10
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\sechost.dll!CreateServiceA 000000007551567c 5 bytes JMP 00000001002401f8
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\sechost.dll!CreateServiceW 000000007551589f 5 bytes JMP 00000001002403fc
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\sechost.dll!DeleteService 0000000075515a22 5 bytes JMP 0000000100240600
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 322 0000000074371a22 2 bytes [37, 74]
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 496 0000000074371ad0 2 bytes [37, 74]
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 552 0000000074371b08 2 bytes [37, 74]
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 730 0000000074371bba 2 bytes [37, 74]
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 762 0000000074371bda 2 bytes [37, 74]
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000074df1465 2 bytes [DF, 74]
- .text C:\Windows\SysWOW64\PnkBstrA.exe[2376] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 0000000074df14bb 2 bytes [DF, 74]
- .text ... * 2
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 0000000076fc3b10 5 bytes JMP 000000010051075c
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 0000000076fc7ac0 5 bytes JMP 00000001005103a4
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000100070460
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000100070450
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 0000000076ff1430 5 bytes JMP 0000000100510b14
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 0000000076ff1490 5 bytes JMP 0000000100510ecc
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000100070370
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000100070470
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 000000010051163c
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000100070320
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000001000703b0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000100070390
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000001000702e0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000001000702d0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000100070310
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000001000703c0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 0000000076ff17b0 5 bytes JMP 0000000100511284
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000001000703f0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000100070230
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000100070480
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000001000703a0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000001000702f0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000100070350
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000100070290
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000001000702b0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000001000703d0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000100070330
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000100070410
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000100070240
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000001000701e0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000100070250
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000100070490
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000001000704a0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000100070300
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000100070360
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000001000702a0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000001000702c0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000100070380
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000100070340
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000100070440
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000100070260
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000100070270
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 00000001005119f4
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000001000701f0
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000100070210
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000100070200
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000100070420
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000100070430
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000100070220
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000100070280
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[2428] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Windows\system32\svchost.exe[2452] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\svchost.exe[2452] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\system32\svchost.exe[2452] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\system32\svchost.exe[2452] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\system32\svchost.exe[2452] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\system32\svchost.exe[2452] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\system32\svchost.exe[2452] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\system32\svchost.exe[2452] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\system32\svchost.exe[2452] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 0000000076fc3b10 5 bytes JMP 00000001001a075c
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 0000000076fc7ac0 5 bytes JMP 00000001001a03a4
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 0000000076ff1430 5 bytes JMP 00000001001a0b14
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 0000000076ff1490 5 bytes JMP 00000001001a0ecc
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000001001a163c
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 0000000076ff17b0 5 bytes JMP 00000001001a1284
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 00000001001a19f4
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\system32\svchost.exe[2472] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 000000007719fac0 5 bytes JMP 0000000100030600
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 000000007719fb58 5 bytes JMP 0000000100030804
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007719fcb0 5 bytes JMP 0000000100030c0c
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 00000000771a0038 5 bytes JMP 0000000100030a08
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 00000000771a1920 5 bytes JMP 0000000100030e10
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 00000000771bc4dd 5 bytes JMP 00000001000301f8
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 00000000771c1287 5 bytes JMP 00000001000303fc
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity 0000000075515181 5 bytes JMP 00000001000a1014
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA 0000000075515254 5 bytes JMP 00000001000a0804
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigW 00000000755153d5 5 bytes JMP 00000001000a0a08
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2A 00000000755154c2 5 bytes JMP 00000001000a0c0c
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W 00000000755155e2 5 bytes JMP 00000001000a0e10
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\sechost.dll!CreateServiceA 000000007551567c 5 bytes JMP 00000001000a01f8
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\sechost.dll!CreateServiceW 000000007551589f 5 bytes JMP 00000001000a03fc
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\SysWOW64\sechost.dll!DeleteService 0000000075515a22 5 bytes JMP 00000001000a0600
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\syswow64\USER32.dll!SetWinEventHook 0000000076aaee09 5 bytes JMP 00000001000b01f8
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 0000000076ab3982 5 bytes JMP 00000001000b03fc
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 0000000076ab7603 5 bytes JMP 00000001000b0804
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 0000000076ab835c 5 bytes JMP 00000001000b0600
- .text C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe[2560] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 0000000076acf52b 5 bytes JMP 00000001000b0a08
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 000000007719fac0 5 bytes JMP 0000000100100600
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 000000007719fb58 5 bytes JMP 0000000100100804
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007719fcb0 5 bytes JMP 0000000100100c0c
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 00000000771a0038 5 bytes JMP 0000000100100a08
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 00000000771a1920 5 bytes JMP 0000000100100e10
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 00000000771bc4dd 5 bytes JMP 00000001001001f8
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 00000000771c1287 5 bytes JMP 00000001001003fc
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\syswow64\USER32.dll!SetWinEventHook 0000000076aaee09 5 bytes JMP 00000001001101f8
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 0000000076ab3982 5 bytes JMP 00000001001103fc
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 0000000076ab7603 5 bytes JMP 0000000100110804
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 0000000076ab835c 5 bytes JMP 0000000100110600
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 0000000076acf52b 5 bytes JMP 0000000100110a08
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity 0000000075515181 5 bytes JMP 0000000100171014
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA 0000000075515254 5 bytes JMP 0000000100170804
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigW 00000000755153d5 5 bytes JMP 0000000100170a08
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2A 00000000755154c2 5 bytes JMP 0000000100170c0c
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W 00000000755155e2 5 bytes JMP 0000000100170e10
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\sechost.dll!CreateServiceA 000000007551567c 5 bytes JMP 00000001001701f8
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\sechost.dll!CreateServiceW 000000007551589f 5 bytes JMP 00000001001703fc
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\sechost.dll!DeleteService 0000000075515a22 5 bytes JMP 0000000100170600
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 26 000000006f7a13c6 2 bytes [7A, 6F]
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 74 000000006f7a13f6 2 bytes [7A, 6F]
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 257 000000006f7a14ad 2 bytes [7A, 6F]
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 303 000000006f7a14db 2 bytes [7A, 6F]
- .text ... * 2
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 79 000000006f7a1577 2 bytes [7A, 6F]
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 175 000000006f7a15d7 2 bytes [7A, 6F]
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 620 000000006f7a1794 2 bytes [7A, 6F]
- .text C:\Windows\SysWOW64\vmnat.exe[2616] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 921 000000006f7a18c1 2 bytes [7A, 6F]
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 0000000076fc3b10 5 bytes JMP 000000010013075c
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 0000000076fc7ac0 5 bytes JMP 00000001001303a4
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 0000000076ff1430 5 bytes JMP 0000000100130b14
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 0000000076ff1490 5 bytes JMP 0000000100130ecc
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 000000010013163c
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 0000000076ff17b0 5 bytes JMP 0000000100131284
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 00000001001319f4
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2856] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 000000007719fac0 5 bytes JMP 0000000100030600
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 000000007719fb58 5 bytes JMP 0000000100030804
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007719fcb0 5 bytes JMP 0000000100030c0c
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 00000000771a0038 5 bytes JMP 0000000100030a08
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 00000000771a1920 5 bytes JMP 0000000100030e10
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 00000000771bc4dd 5 bytes JMP 00000001000301f8
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 00000000771c1287 5 bytes JMP 00000001000303fc
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity 0000000075515181 5 bytes JMP 00000001000d1014
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA 0000000075515254 5 bytes JMP 00000001000d0804
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigW 00000000755153d5 5 bytes JMP 00000001000d0a08
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2A 00000000755154c2 5 bytes JMP 00000001000d0c0c
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W 00000000755155e2 5 bytes JMP 00000001000d0e10
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\sechost.dll!CreateServiceA 000000007551567c 5 bytes JMP 00000001000d01f8
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\sechost.dll!CreateServiceW 000000007551589f 5 bytes JMP 00000001000d03fc
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\SysWOW64\sechost.dll!DeleteService 0000000075515a22 5 bytes JMP 00000001000d0600
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000074df1465 2 bytes [DF, 74]
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 0000000074df14bb 2 bytes [DF, 74]
- .text ... * 2
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\syswow64\USER32.dll!SetWinEventHook 0000000076aaee09 5 bytes JMP 00000001000e01f8
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 0000000076ab3982 5 bytes JMP 00000001000e03fc
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 0000000076ab7603 5 bytes JMP 00000001000e0804
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 0000000076ab835c 5 bytes JMP 00000001000e0600
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe[2952] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 0000000076acf52b 5 bytes JMP 00000001000e0a08
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 0000000076fc3b10 5 bytes JMP 000000010046075c
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 0000000076fc7ac0 5 bytes JMP 00000001004603a4
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000100070460
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000100070450
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 0000000076ff1430 5 bytes JMP 0000000100460b14
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 0000000076ff1490 5 bytes JMP 0000000100460ecc
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000100070370
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000100070470
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 000000010046163c
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000100070320
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000001000703b0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000100070390
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000001000702e0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000001000702d0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000100070310
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000001000703c0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 0000000076ff17b0 5 bytes JMP 0000000100461284
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000001000703f0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000100070230
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000100070480
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000001000703a0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000001000702f0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000100070350
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000100070290
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000001000702b0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000001000703d0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000100070330
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000100070410
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000100070240
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000001000701e0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000100070250
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000100070490
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000001000704a0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000100070300
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000100070360
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000001000702a0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000001000702c0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000100070380
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000100070340
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000100070440
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000100070260
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000100070270
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 00000001004619f4
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000001000701f0
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000100070210
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000100070200
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000100070420
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000100070430
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000100070220
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000100070280
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\system32\wbem\wmiprvse.exe[3056] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2088] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2088] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2088] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2088] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2088] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2088] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2088] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2088] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 000000007719fac0 5 bytes JMP 0000000100100600
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 000000007719fb58 5 bytes JMP 0000000100100804
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007719fcb0 5 bytes JMP 0000000100100c0c
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 00000000771a0038 5 bytes JMP 0000000100100a08
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 00000000771a1920 5 bytes JMP 0000000100100e10
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 00000000771bc4dd 5 bytes JMP 00000001001001f8
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 00000000771c1287 5 bytes JMP 00000001001003fc
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\syswow64\USER32.dll!SetWinEventHook 0000000076aaee09 5 bytes JMP 00000001001601f8
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 0000000076ab3982 5 bytes JMP 00000001001603fc
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 0000000076ab7603 5 bytes JMP 0000000100160804
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 0000000076ab835c 5 bytes JMP 0000000100160600
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 0000000076acf52b 5 bytes JMP 0000000100160a08
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity 0000000075515181 5 bytes JMP 0000000100171014
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA 0000000075515254 5 bytes JMP 0000000100170804
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigW 00000000755153d5 5 bytes JMP 0000000100170a08
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2A 00000000755154c2 5 bytes JMP 0000000100170c0c
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W 00000000755155e2 5 bytes JMP 0000000100170e10
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\sechost.dll!CreateServiceA 000000007551567c 5 bytes JMP 00000001001701f8
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\sechost.dll!CreateServiceW 000000007551589f 5 bytes JMP 00000001001703fc
- .text C:\Windows\SysWOW64\vmnetdhcp.exe[1564] C:\Windows\SysWOW64\sechost.dll!DeleteService 0000000075515a22 5 bytes JMP 0000000100170600
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 0000000076fc3b10 5 bytes JMP 00000001003d075c
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 0000000076fc7ac0 5 bytes JMP 00000001003d03a4
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 0000000076ff1430 5 bytes JMP 00000001003d0b14
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 0000000076ff1490 5 bytes JMP 00000001003d0ecc
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000001003d163c
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 0000000076ff17b0 5 bytes JMP 00000001003d1284
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 00000001003d19f4
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe[2708] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 000000007719fac0 5 bytes JMP 0000000100030600
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 000000007719fb58 5 bytes JMP 0000000100030804
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007719fcb0 5 bytes JMP 0000000100030c0c
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 00000000771a0038 5 bytes JMP 0000000100030a08
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 00000000771a1920 5 bytes JMP 0000000100030e10
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 00000000771bc4dd 5 bytes JMP 00000001000301f8
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 00000000771c1287 5 bytes JMP 00000001000303fc
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\syswow64\USER32.dll!SetWinEventHook 0000000076aaee09 5 bytes JMP 00000001001201f8
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 0000000076ab3982 5 bytes JMP 00000001001203fc
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 0000000076ab7603 5 bytes JMP 0000000100120804
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 0000000076ab835c 5 bytes JMP 0000000100120600
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 0000000076acf52b 5 bytes JMP 0000000100120a08
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity 0000000075515181 5 bytes JMP 0000000100131014
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA 0000000075515254 5 bytes JMP 0000000100130804
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigW 00000000755153d5 5 bytes JMP 0000000100130a08
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2A 00000000755154c2 5 bytes JMP 0000000100130c0c
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W 00000000755155e2 5 bytes JMP 0000000100130e10
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\sechost.dll!CreateServiceA 000000007551567c 5 bytes JMP 00000001001301f8
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\sechost.dll!CreateServiceW 000000007551589f 5 bytes JMP 00000001001303fc
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\SysWOW64\sechost.dll!DeleteService 0000000075515a22 5 bytes JMP 0000000100130600
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000074df1465 2 bytes [DF, 74]
- .text C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe[3220] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 0000000074df14bb 2 bytes [DF, 74]
- .text ... * 2
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 0000000076fc3b10 5 bytes JMP 00000001002f075c
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 0000000076fc7ac0 5 bytes JMP 00000001002f03a4
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 0000000076ff1430 5 bytes JMP 00000001002f0b14
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 0000000076ff1490 5 bytes JMP 00000001002f0ecc
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000001002f163c
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 0000000076ff17b0 5 bytes JMP 00000001002f1284
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 00000001002f19f4
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\system32\SearchIndexer.exe[3376] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Windows\System32\alg.exe[3540] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\System32\alg.exe[3540] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\System32\alg.exe[3540] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\System32\alg.exe[3540] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\System32\alg.exe[3540] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\System32\alg.exe[3540] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\System32\alg.exe[3540] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\System32\alg.exe[3540] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Windows\System32\svchost.exe[3568] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\System32\svchost.exe[3568] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\System32\svchost.exe[3568] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\System32\svchost.exe[3568] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\System32\svchost.exe[3568] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\System32\svchost.exe[3568] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\System32\svchost.exe[3568] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\System32\svchost.exe[3568] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Windows\system32\svchost.exe[3600] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\system32\svchost.exe[3600] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\system32\svchost.exe[3600] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\system32\svchost.exe[3600] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\system32\svchost.exe[3600] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\system32\svchost.exe[3600] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\system32\svchost.exe[3600] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\system32\svchost.exe[3600] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 0000000076fc3b10 5 bytes JMP 00000001002b075c
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 0000000076fc7ac0 5 bytes JMP 00000001002b03a4
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 0000000076ff1430 5 bytes JMP 00000001002b0b14
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 0000000076ff1490 5 bytes JMP 00000001002b0ecc
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000001002b163c
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 0000000076ff17b0 5 bytes JMP 00000001002b1284
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 00000001002b19f4
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\system32\svchost.exe[3732] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Program Files (x86)\Steam\Steam.exe[5072] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 000000007719fac0 5 bytes JMP 0000000100030600
- .text C:\Program Files (x86)\Steam\Steam.exe[5072] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 000000007719fb58 5 bytes JMP 0000000100030804
- .text C:\Program Files (x86)\Steam\Steam.exe[5072] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007719fcb0 5 bytes JMP 0000000100030c0c
- .text C:\Program Files (x86)\Steam\Steam.exe[5072] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 00000000771a0038 5 bytes JMP 0000000100030a08
- .text C:\Program Files (x86)\Steam\Steam.exe[5072] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 00000000771a1920 5 bytes JMP 0000000100030e10
- .text C:\Program Files (x86)\Steam\Steam.exe[5072] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 00000000771bc4dd 5 bytes JMP 00000001000301f8
- .text C:\Program Files (x86)\Steam\Steam.exe[5072] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 00000000771c1287 5 bytes JMP 00000001000303fc
- .text C:\Program Files (x86)\Steam\Steam.exe[5072] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Program Files\AVAST Software\Avast\AvastUI.exe[3812] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Program Files\AVAST Software\Avast\AvastUI.exe[3812] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000074df1465 2 bytes [DF, 74]
- .text C:\Program Files\AVAST Software\Avast\AvastUI.exe[3812] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 0000000074df14bb 2 bytes [DF, 74]
- .text ... * 2
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 0000000076fc3b10 5 bytes JMP 000000010017075c
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 0000000076fc7ac0 5 bytes JMP 00000001001703a4
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 0000000076ff1430 5 bytes JMP 0000000100170b14
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 0000000076ff1490 5 bytes JMP 0000000100170ecc
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 000000010017163c
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 0000000076ff17b0 5 bytes JMP 0000000100171284
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 00000001001719f4
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\System32\svchost.exe[4544] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 0000000076fc3b10 5 bytes JMP 000000010023075c
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 0000000076fc7ac0 5 bytes JMP 00000001002303a4
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 0000000076ff1430 5 bytes JMP 0000000100230b14
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 0000000076ff1490 5 bytes JMP 0000000100230ecc
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 000000010023163c
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 0000000076ff17b0 5 bytes JMP 0000000100231284
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 00000001002319f4
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Program Files\Windows Media Player\wmpnetwk.exe[5060] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 0000000076fc3b10 5 bytes JMP 000000010025075c
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 0000000076fc7ac0 5 bytes JMP 00000001002503a4
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePort 0000000076ff1360 5 bytes JMP 0000000077150460
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtQueryObject 0000000076ff13b0 5 bytes JMP 0000000077150450
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 0000000076ff1430 5 bytes JMP 0000000100250b14
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 0000000076ff1490 5 bytes JMP 0000000100250ecc
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess 0000000076ff1510 5 bytes JMP 0000000077150370
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtReplyWaitReceivePortEx 0000000076ff1560 5 bytes JMP 0000000077150470
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 000000010025163c
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000076ff1620 5 bytes JMP 0000000077150320
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 0000000076ff1650 5 bytes JMP 00000000771503b0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtDuplicateObject 0000000076ff1670 5 bytes JMP 0000000077150390
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEvent 0000000076ff16b0 5 bytes JMP 00000000771502e0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEvent 0000000076ff1730 5 bytes JMP 00000000771502d0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000076ff1750 5 bytes JMP 0000000077150310
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThread 0000000076ff1790 5 bytes JMP 00000000771503c0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 0000000076ff17b0 5 bytes JMP 0000000100251284
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateThread 0000000076ff17e0 5 bytes JMP 00000000771503f0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtAddBootEntry 0000000076ff1940 5 bytes JMP 0000000077150230
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtAlpcSendWaitReceivePort 0000000076ff1b00 5 bytes JMP 0000000077150480
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtAssignProcessToJobObject 0000000076ff1b30 5 bytes JMP 00000000771503a0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtCreateEventPair 0000000076ff1c10 5 bytes JMP 00000000771502f0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtCreateIoCompletion 0000000076ff1c20 5 bytes JMP 0000000077150350
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtCreateMutant 0000000076ff1c80 5 bytes JMP 0000000077150290
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSemaphore 0000000076ff1d10 5 bytes JMP 00000000771502b0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 0000000076ff1d30 5 bytes JMP 00000000771503d0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtCreateTimer 0000000076ff1d40 5 bytes JMP 0000000077150330
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtDebugActiveProcess 0000000076ff1db0 5 bytes JMP 0000000077150410
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtDeleteBootEntry 0000000076ff1de0 5 bytes JMP 0000000077150240
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtLoadDriver 0000000076ff20a0 5 bytes JMP 00000000771501e0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtModifyBootEntry 0000000076ff2160 5 bytes JMP 0000000077150250
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeKey 0000000076ff2190 5 bytes JMP 0000000077150490
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtNotifyChangeMultipleKeys 0000000076ff21a0 5 bytes JMP 00000000771504a0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenEventPair 0000000076ff21d0 5 bytes JMP 0000000077150300
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenIoCompletion 0000000076ff21e0 5 bytes JMP 0000000077150360
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenMutant 0000000076ff2240 5 bytes JMP 00000000771502a0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSemaphore 0000000076ff2290 5 bytes JMP 00000000771502c0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread 0000000076ff22c0 5 bytes JMP 0000000077150380
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtOpenTimer 0000000076ff22d0 5 bytes JMP 0000000077150340
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThreadEx 0000000076ff25c0 5 bytes JMP 0000000077150440
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootEntryOrder 0000000076ff27c0 5 bytes JMP 0000000077150260
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtSetBootOptions 0000000076ff27d0 5 bytes JMP 0000000077150270
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 00000001002519f4
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemInformation 0000000076ff29a0 5 bytes JMP 00000000771501f0
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtSetSystemPowerState 0000000076ff29b0 5 bytes JMP 0000000077150210
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtShutdownSystem 0000000076ff2a20 5 bytes JMP 0000000077150200
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendProcess 0000000076ff2a80 5 bytes JMP 0000000077150420
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtSuspendThread 0000000076ff2a90 5 bytes JMP 0000000077150430
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtSystemDebugControl 0000000076ff2aa0 5 bytes JMP 0000000077150220
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\ntdll.dll!NtVdmControl 0000000076ff2b80 5 bytes JMP 0000000077150280
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Program Files\iPod\bin\iPodService.exe[2876] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Windows\system32\DllHost.exe[5144] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\system32\DllHost.exe[5144] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\system32\DllHost.exe[5144] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\system32\DllHost.exe[5144] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\system32\DllHost.exe[5144] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\system32\DllHost.exe[5144] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\system32\DllHost.exe[5144] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\system32\DllHost.exe[5144] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Windows\system32\svchost.exe[5212] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\system32\svchost.exe[5212] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\system32\svchost.exe[5212] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\system32\svchost.exe[5212] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\system32\svchost.exe[5212] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\system32\svchost.exe[5212] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\system32\svchost.exe[5212] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\system32\svchost.exe[5212] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Program Files (x86)\iTunes\iTunes.exe[5444] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 000000007719fac0 5 bytes JMP 0000000100030600
- .text C:\Program Files (x86)\iTunes\iTunes.exe[5444] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 000000007719fb58 5 bytes JMP 0000000100030804
- .text C:\Program Files (x86)\iTunes\iTunes.exe[5444] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007719fcb0 5 bytes JMP 0000000100030c0c
- .text C:\Program Files (x86)\iTunes\iTunes.exe[5444] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 00000000771a0038 5 bytes JMP 0000000100030a08
- .text C:\Program Files (x86)\iTunes\iTunes.exe[5444] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 00000000771a1920 5 bytes JMP 0000000100030e10
- .text C:\Program Files (x86)\iTunes\iTunes.exe[5444] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 00000000771bc4dd 5 bytes JMP 00000001000301f8
- .text C:\Program Files (x86)\iTunes\iTunes.exe[5444] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 00000000771c1287 5 bytes JMP 00000001000303fc
- .text C:\Program Files (x86)\iTunes\iTunes.exe[5444] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Windows\system32\vssvc.exe[7900] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 189 0000000076ddeecd 1 byte [62]
- .text C:\Windows\system32\vssvc.exe[7900] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\system32\vssvc.exe[7900] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\system32\vssvc.exe[7900] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\system32\vssvc.exe[7900] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\system32\vssvc.exe[7900] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\system32\vssvc.exe[7900] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\system32\vssvc.exe[7900] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\system32\vssvc.exe[7900] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Windows\System32\svchost.exe[4440] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\System32\svchost.exe[4440] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\System32\svchost.exe[4440] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\System32\svchost.exe[4440] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\System32\svchost.exe[4440] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\System32\svchost.exe[4440] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\System32\svchost.exe[4440] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\System32\svchost.exe[4440] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 0000000076fc3b10 5 bytes JMP 00000001001b075c
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 0000000076fc7ac0 5 bytes JMP 00000001001b03a4
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 0000000076ff1430 5 bytes JMP 00000001001b0b14
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 0000000076ff1490 5 bytes JMP 00000001001b0ecc
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 0000000076ff1570 5 bytes JMP 00000001001b163c
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 0000000076ff17b0 5 bytes JMP 00000001001b1284
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 0000000076ff27e0 5 bytes JMP 00000001001b19f4
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007fefd1b6e00 5 bytes JMP 000007ff7d1d1dac
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007fefd1b6f2c 5 bytes JMP 000007ff7d1d0ecc
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007fefd1b7220 5 bytes JMP 000007ff7d1d1284
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007fefd1b739c 5 bytes JMP 000007ff7d1d163c
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007fefd1b7538 5 bytes JMP 000007ff7d1d19f4
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007fefd1b75e8 5 bytes JMP 000007ff7d1d03a4
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007fefd1b790c 5 bytes JMP 000007ff7d1d075c
- .text C:\Windows\system32\taskeng.exe[6920] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007fefd1b7ab4 5 bytes JMP 000007ff7d1d0b14
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 000000007719fac0 5 bytes JMP 0000000100030600
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 000000007719fb58 5 bytes JMP 0000000100030804
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 000000007719fcb0 5 bytes JMP 0000000100030c0c
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 00000000771a0038 5 bytes JMP 0000000100030a08
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\ntdll.dll!NtSetContextThread 00000000771a1920 5 bytes JMP 0000000100030e10
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 00000000771bc4dd 5 bytes JMP 00000001000301f8
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 00000000771c1287 5 bytes JMP 00000001000303fc
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 112 00000000755fa30a 1 byte [62]
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\sechost.dll!SetServiceObjectSecurity 0000000075515181 5 bytes JMP 0000000100241014
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigA 0000000075515254 5 bytes JMP 0000000100240804
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfigW 00000000755153d5 5 bytes JMP 0000000100240a08
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2A 00000000755154c2 5 bytes JMP 0000000100240c0c
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\sechost.dll!ChangeServiceConfig2W 00000000755155e2 5 bytes JMP 0000000100240e10
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\sechost.dll!CreateServiceA 000000007551567c 5 bytes JMP 00000001002401f8
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\sechost.dll!CreateServiceW 000000007551589f 5 bytes JMP 00000001002403fc
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\SysWOW64\sechost.dll!DeleteService 0000000075515a22 5 bytes JMP 0000000100240600
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\syswow64\USER32.dll!SetWinEventHook 0000000076aaee09 5 bytes JMP 00000001002501f8
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 0000000076ab3982 5 bytes JMP 00000001002503fc
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 0000000076ab7603 5 bytes JMP 0000000100250804
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 0000000076ab835c 5 bytes JMP 0000000100250600
- .text C:\Users\Chris\Downloads\lcxouxr3.exe[7612] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 0000000076acf52b 5 bytes JMP 0000000100250a08
- ---- Kernel IAT/EAT - GMER 2.1 ----
- IAT C:\Windows\system32\drivers\atapi.sys[ataport.SYS!AtaPortReadPortBufferUshort] [fffff880010b7f1c] \SystemRoot\System32\Drivers\sptd.sys [.text]
- IAT C:\Windows\system32\drivers\atapi.sys[ataport.SYS!AtaPortReadPortUchar] [fffff880010b7cc0] \SystemRoot\System32\Drivers\sptd.sys [.text]
- IAT C:\Windows\system32\drivers\atapi.sys[ataport.SYS!AtaPortWritePortUchar] [fffff880010b869c] \SystemRoot\System32\Drivers\sptd.sys [.text]
- IAT C:\Windows\system32\drivers\atapi.sys[ataport.SYS!AtaPortWritePortUlong] [fffff880010b8a98] \SystemRoot\System32\Drivers\sptd.sys [.text]
- IAT C:\Windows\system32\drivers\atapi.sys[ataport.SYS!AtaPortWritePortBufferUshort] [fffff880010b88f4] \SystemRoot\System32\Drivers\sptd.sys [.text]
- ---- Devices - GMER 2.1 ----
- Device \Driver\atapi \Device\Ide\IdeDeviceP0T0L0-0 fffffa800702a2c0
- Device \Driver\atapi \Device\Ide\IdePort4 fffffa800702a2c0
- Device \Driver\atapi \Device\Ide\IdePort0 fffffa800702a2c0
- Device \Driver\atapi \Device\Ide\IdePort5 fffffa800702a2c0
- Device \Driver\atapi \Device\Ide\IdePort1 fffffa800702a2c0
- Device \Driver\atapi \Device\Ide\IdePort2 fffffa800702a2c0
- Device \Driver\atapi \Device\Ide\IdeDeviceP1T0L0-1 fffffa800702a2c0
- Device \Driver\atapi \Device\Ide\IdePort3 fffffa800702a2c0
- Device \Driver\afk0cy62 \Device\Scsi\afk0cy621 fffffa80082b22c0
- Device \Driver\afk0cy62 \Device\Scsi\afk0cy621Port6Path0Target0Lun0 fffffa80082b22c0
- Device \FileSystem\Ntfs \Ntfs fffffa80070302c0
- Device \Driver\NetBT \Device\NetBT_Tcpip_{F1C51DBC-D0CC-4E42-9454-2AF2BC5802C8} fffffa80080982c0
- Device \Driver\usbehci \Device\USBPDO-1 fffffa800818b2c0
- Device \Driver\cdrom \Device\CdRom0 fffffa8007f952c0
- Device \Driver\NetBT \Device\NetBT_Tcpip_{18EC1B8A-0395-49EA-9BC4-65252B9344A7} fffffa80080982c0
- Device \Driver\cdrom \Device\CdRom1 fffffa8007f952c0
- Device \Driver\usbehci \Device\USBFDO-0 fffffa800818b2c0
- Device \Driver\NetBT \Device\NetBT_Tcpip_{315CA033-B662-4320-9052-2A2F51D679C9} fffffa80080982c0
- Device \Driver\usbehci \Device\USBFDO-1 fffffa800818b2c0
- Device \Driver\NetBT \Device\NetBT_Tcpip_{70FCE05E-CDAD-4655-B88C-53777CF81E00} fffffa80080982c0
- Device \Driver\NetBT \Device\NetBt_Wins_Export fffffa80080982c0
- Device \Driver\NetBT \Device\NetBT_Tcpip_{3A5543DA-ACBE-47F9-9FFE-00D72B1F571F} fffffa80080982c0
- Device \Driver\atapi \Device\ScsiPort0 fffffa800702a2c0
- Device \Driver\usbehci \Device\USBPDO-0 fffffa800818b2c0
- Device \Driver\atapi \Device\ScsiPort1 fffffa800702a2c0
- Device \Driver\atapi \Device\ScsiPort2 fffffa800702a2c0
- Device \Driver\atapi \Device\ScsiPort3 fffffa800702a2c0
- Device \Driver\atapi \Device\ScsiPort4 fffffa800702a2c0
- Device \Driver\atapi \Device\ScsiPort5 fffffa800702a2c0
- Device \Driver\afk0cy62 \Device\ScsiPort6 fffffa80082b22c0
- ---- Modules - GMER 2.1 ----
- Module \SystemRoot\System32\Drivers\afk0cy62.SYS fffff88001b9a000-fffff88001beb000 (331776 bytes)
- ---- Threads - GMER 2.1 ----
- Thread C:\Windows\System32\svchost.exe [3568:5136] 000007fef9fd9688
- Thread C:\Windows\Explorer.EXE [3932:4152] 000007fefd33c608
- Thread C:\Windows\Explorer.EXE [3932:4224] 000007fefd33c608
- Thread C:\Windows\Explorer.EXE [3932:4276] 000007fef1402154
- Thread C:\Windows\Explorer.EXE [3932:4880] 000007fefd33c608
- Thread C:\Windows\Explorer.EXE [3932:4908] 000007fefd33c608
- Thread C:\Windows\Explorer.EXE [3932:4916] 000007fefd33c608
- Thread C:\Windows\Explorer.EXE [3932:4920] 000007fefec60168
- Thread C:\Windows\Explorer.EXE [3932:4928] 000007fefd33c608
- Thread C:\Windows\Explorer.EXE [3932:4952] 000007fefaab1010
- Thread C:\Windows\Explorer.EXE [3932:4956] 000007fefd33c608
- Thread C:\Windows\Explorer.EXE [3932:4964] 000007fefb346204
- Thread C:\Windows\Explorer.EXE [3932:5040] 000007fefd33c608
- Thread C:\Windows\Explorer.EXE [3932:5044] 000007fefd33c608
- Thread C:\Windows\Explorer.EXE [3932:1280] 000007feec292118
- Thread C:\Windows\Explorer.EXE [3932:6220] 000007fefec60168
- Thread C:\Windows\Explorer.EXE [3932:7128] 000007fefd33c608
- Thread C:\Windows\Explorer.EXE [3932:8052] 000007fefec60168
- Thread c:\Program Files\Microsoft Mouse and Keyboard Center\itype.exe [1396:6824] 000007feeecd4094
- Thread c:\Program Files\Microsoft Mouse and Keyboard Center\itype.exe [1396:6880] 000007feeecd4094
- Thread c:\Program Files\Microsoft Mouse and Keyboard Center\itype.exe [1396:6932] 000007fed25ec680
- Thread c:\Program Files\Microsoft Mouse and Keyboard Center\ipoint.exe [3360:7028] 000007feeecd4094
- Thread c:\Program Files\Microsoft Mouse and Keyboard Center\ipoint.exe [3360:7032] 000007fed292838c
- Thread c:\Program Files\Microsoft Mouse and Keyboard Center\ipoint.exe [3360:7036] 000007feeecd4094
- Thread c:\Program Files\Microsoft Mouse and Keyboard Center\ipoint.exe [3360:7040] 000007fed25ec680
- Thread c:\Program Files\Microsoft Mouse and Keyboard Center\ipoint.exe [3360:7044] 000007feeecd4094
- Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [5060:4780] 000007fefec60168
- Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [5060:2820] 000007fefafc2a7c
- Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [5060:4884] 000007fee593d618
- Thread C:\Program Files\Windows Media Player\wmpnetwk.exe [5060:3856] 000007fef4cb5124
- Thread C:\Windows\system32\svchost.exe [5212:4372] 000007fef96ee8c4
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:5892] 000007fee8efeb4c
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:4156] 000007fee8efd724
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:2184] 000007fee8ecb7ec
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:5772] 000007fee8ef19d4
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:4608] 000007fee8efeb4c
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:2112] 000007fee8efeb4c
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:5172] 000007fed49f5d28
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:6104] 000007fee8efeb4c
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:5960] 000007fee8efeb4c
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:6236] 000007fefec60168
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:6260] 000007fed3b91b5c
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:6360] 000007fee8efeb4c
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:7016] 000007fee8efeb4c
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:7164] 000007fed6edf6dc
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:7076] 000007fefaab1010
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:6544] 000007fee9117674
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:6780] 000007feff02c648
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:6716] 000007fee8efeb4c
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:2488] 000007fefec60168
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:6452] 000007fee8efeb4c
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:8124] 000007fee8efeb4c
- Thread C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE [5400:6744] 000007fee8efeb4c
- ---- Registry - GMER 2.1 ----
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk@Type 2
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk@Start 2
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk@ErrorControl 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk@DisplayName aswFsBlk
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk@Group FSFilter Activity Monitor
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk@DependOnService FltMgr?
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk@Description avast! mini-filter driver (aswFsBlk)
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk@Tag 2
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk\Instances
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk\Instances@DefaultInstance aswFsBlk Instance
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk\Instances\aswFsBlk Instance
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk\Instances\aswFsBlk Instance@Altitude 388400
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk\Instances\aswFsBlk Instance@Flags 0
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswFsBlk
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt@Type 2
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt@Start 2
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt@ErrorControl 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt@ImagePath \??\C:\Windows\system32\drivers\aswMonFlt.sys
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt@DisplayName aswMonFlt
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt@Group FSFilter Anti-Virus
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt@DependOnService FltMgr?
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt@Description avast! mini-filter driver (aswMonFlt)
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt\Instances
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt\Instances@DefaultInstance aswMonFlt Instance
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt\Instances\aswMonFlt Instance
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt\Instances\aswMonFlt Instance@Altitude 320700
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt\Instances\aswMonFlt Instance@Flags 0
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswMonFlt
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr@ImagePath \SystemRoot\System32\Drivers\aswrdr2.sys
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr@Type 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr@Start 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr@ErrorControl 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr@DisplayName aswRdr
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr@Group PNP_TDI
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr@DependOnService tcpip?
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr@Description avast! WFP Redirect driver
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr\Parameters
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr\Parameters@MSIgnoreLSPDefault
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr\Parameters@WSIgnoreLSPDefault nl_lsp.dll,imon.dll,xfire_lsp.dll,mslsp.dll,mssplsp.dll,cwhook.dll,spi.dll,bmnet.dll,winsflt.dll
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRdr
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRvrt@Type 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRvrt@Start 0
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRvrt@ErrorControl 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRvrt@DisplayName aswRvrt
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRvrt@Description avast! Revert
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRvrt\Parameters
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRvrt\Parameters@BootCounter 90
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRvrt\Parameters@TickCounter 2864999
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRvrt\Parameters@SystemRoot \Device\Harddisk0\Partition2\Windows
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRvrt\Parameters@ImproperShutdown 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswRvrt
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx@Type 2
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx@Start 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx@ErrorControl 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx@DisplayName aswSnx
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx@Group FSFilter Virtualization
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx@DependOnService FltMgr?
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx@Description avast! virtualization driver (aswSnx)
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx@Tag 2
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx\Instances
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx\Instances@DefaultInstance aswSnx Instance
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx\Instances\aswSnx Instance
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx\Instances\aswSnx Instance@Altitude 137600
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx\Instances\aswSnx Instance@Flags 0
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx\Parameters
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx\Parameters@ProgramFolder \DosDevices\C:\Program Files\AVAST Software\Avast
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx\Parameters@DataFolder \DosDevices\C:\ProgramData\AVAST Software\Avast
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSnx
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP@Type 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP@Start 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP@ErrorControl 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP@DisplayName aswSP
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP@Description avast! Self Protection
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP\Parameters
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP\Parameters@BehavShield 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP\Parameters@ProgramFolder \DosDevices\C:\Program Files\AVAST Software\Avast
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP\Parameters@DataFolder \DosDevices\C:\ProgramData\AVAST Software\Avast
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP\Parameters@NoWelcomeScreen 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP\Parameters@ProgramFilesFolder \DosDevices\C:\Program Files
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP\Parameters@GadgetFolder \DosDevices\C:\Program Files\Windows Sidebar\Shared Gadgets\aswSidebar.gadget
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswSP
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswTdi@Type 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswTdi@Start 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswTdi@ErrorControl 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswTdi@DisplayName avast! Network Shield Support
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswTdi@Group PNP_TDI
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswTdi@DependOnService tcpip?
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswTdi@Description avast! Network Shield TDI driver
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswTdi@Tag 9
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswTdi
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswVmm@Type 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswVmm@Start 0
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswVmm@ErrorControl 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswVmm@DisplayName aswVmm
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswVmm@Description avast! VM Monitor
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswVmm\Parameters
- Reg HKLM\SYSTEM\CurrentControlSet\services\aswVmm
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus@Type 32
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus@Start 2
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus@ErrorControl 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus@ImagePath "C:\Program Files\AVAST Software\Avast\AvastSvc.exe"
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus@DisplayName avast! Antivirus
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus@Group ShellSvcGroup
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus@DependOnService aswMonFlt?RpcSS?
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus@WOW64 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus@ObjectName LocalSystem
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus@ServiceSidType 1
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus@Description Manages and implements avast! antivirus services for this computer. This includes the resident protection, the virus chest and the scheduler.
- Reg HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus
- Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
- Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x00 0x00 0x00 0x00 ...
- Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
- Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x17 0x69 0x09 0x31 ...
- Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files (x86)\DAEMON Tools Lite\
- Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001
- Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0xFD 0x5B 0x2B 0xB6 ...
- Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0xA0 0x02 0x00 0x00 ...
- Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0
- Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x2E 0xF1 0x13 0x24 ...
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk@Type 2
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk@Start 2
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk@ErrorControl 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk@DisplayName aswFsBlk
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk@Group FSFilter Activity Monitor
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk@DependOnService FltMgr?
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk@Description avast! mini-filter driver (aswFsBlk)
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk@Tag 2
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk\Instances (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk\Instances@DefaultInstance aswFsBlk Instance
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk\Instances\aswFsBlk Instance (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk\Instances\aswFsBlk Instance@Altitude 388400
- Reg HKLM\SYSTEM\ControlSet002\services\aswFsBlk\Instances\aswFsBlk Instance@Flags 0
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt@Type 2
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt@Start 2
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt@ErrorControl 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt@ImagePath \??\C:\Windows\system32\drivers\aswMonFlt.sys
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt@DisplayName aswMonFlt
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt@Group FSFilter Anti-Virus
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt@DependOnService FltMgr?
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt@Description avast! mini-filter driver (aswMonFlt)
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt\Instances (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt\Instances@DefaultInstance aswMonFlt Instance
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt\Instances\aswMonFlt Instance (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt\Instances\aswMonFlt Instance@Altitude 320700
- Reg HKLM\SYSTEM\ControlSet002\services\aswMonFlt\Instances\aswMonFlt Instance@Flags 0
- Reg HKLM\SYSTEM\ControlSet002\services\aswRdr@ImagePath \SystemRoot\System32\Drivers\aswrdr2.sys
- Reg HKLM\SYSTEM\ControlSet002\services\aswRdr@Type 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswRdr@Start 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswRdr@ErrorControl 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswRdr@DisplayName aswRdr
- Reg HKLM\SYSTEM\ControlSet002\services\aswRdr@Group PNP_TDI
- Reg HKLM\SYSTEM\ControlSet002\services\aswRdr@DependOnService tcpip?
- Reg HKLM\SYSTEM\ControlSet002\services\aswRdr@Description avast! WFP Redirect driver
- Reg HKLM\SYSTEM\ControlSet002\services\aswRdr\Parameters (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\aswRdr\Parameters@MSIgnoreLSPDefault
- Reg HKLM\SYSTEM\ControlSet002\services\aswRdr\Parameters@WSIgnoreLSPDefault nl_lsp.dll,imon.dll,xfire_lsp.dll,mslsp.dll,mssplsp.dll,cwhook.dll,spi.dll,bmnet.dll,winsflt.dll
- Reg HKLM\SYSTEM\ControlSet002\services\aswRvrt@Type 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswRvrt@Start 0
- Reg HKLM\SYSTEM\ControlSet002\services\aswRvrt@ErrorControl 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswRvrt@DisplayName aswRvrt
- Reg HKLM\SYSTEM\ControlSet002\services\aswRvrt@Description avast! Revert
- Reg HKLM\SYSTEM\ControlSet002\services\aswRvrt\Parameters (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\aswRvrt\Parameters@BootCounter 90
- Reg HKLM\SYSTEM\ControlSet002\services\aswRvrt\Parameters@TickCounter 2864999
- Reg HKLM\SYSTEM\ControlSet002\services\aswRvrt\Parameters@SystemRoot \Device\Harddisk0\Partition2\Windows
- Reg HKLM\SYSTEM\ControlSet002\services\aswRvrt\Parameters@ImproperShutdown 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx@Type 2
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx@Start 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx@ErrorControl 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx@DisplayName aswSnx
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx@Group FSFilter Virtualization
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx@DependOnService FltMgr?
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx@Description avast! virtualization driver (aswSnx)
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx@Tag 2
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx\Instances (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx\Instances@DefaultInstance aswSnx Instance
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx\Instances\aswSnx Instance (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx\Instances\aswSnx Instance@Altitude 137600
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx\Instances\aswSnx Instance@Flags 0
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx\Parameters (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx\Parameters@ProgramFolder \DosDevices\C:\Program Files\AVAST Software\Avast
- Reg HKLM\SYSTEM\ControlSet002\services\aswSnx\Parameters@DataFolder \DosDevices\C:\ProgramData\AVAST Software\Avast
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP@Type 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP@Start 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP@ErrorControl 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP@DisplayName aswSP
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP@Description avast! Self Protection
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP\Parameters (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP\Parameters@BehavShield 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP\Parameters@ProgramFolder \DosDevices\C:\Program Files\AVAST Software\Avast
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP\Parameters@DataFolder \DosDevices\C:\ProgramData\AVAST Software\Avast
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP\Parameters@NoWelcomeScreen 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP\Parameters@ProgramFilesFolder \DosDevices\C:\Program Files
- Reg HKLM\SYSTEM\ControlSet002\services\aswSP\Parameters@GadgetFolder \DosDevices\C:\Program Files\Windows Sidebar\Shared Gadgets\aswSidebar.gadget
- Reg HKLM\SYSTEM\ControlSet002\services\aswTdi@Type 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswTdi@Start 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswTdi@ErrorControl 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswTdi@DisplayName avast! Network Shield Support
- Reg HKLM\SYSTEM\ControlSet002\services\aswTdi@Group PNP_TDI
- Reg HKLM\SYSTEM\ControlSet002\services\aswTdi@DependOnService tcpip?
- Reg HKLM\SYSTEM\ControlSet002\services\aswTdi@Description avast! Network Shield TDI driver
- Reg HKLM\SYSTEM\ControlSet002\services\aswTdi@Tag 9
- Reg HKLM\SYSTEM\ControlSet002\services\aswVmm@Type 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswVmm@Start 0
- Reg HKLM\SYSTEM\ControlSet002\services\aswVmm@ErrorControl 1
- Reg HKLM\SYSTEM\ControlSet002\services\aswVmm@DisplayName aswVmm
- Reg HKLM\SYSTEM\ControlSet002\services\aswVmm@Description avast! VM Monitor
- Reg HKLM\SYSTEM\ControlSet002\services\aswVmm\Parameters (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\avast! Antivirus@Type 32
- Reg HKLM\SYSTEM\ControlSet002\services\avast! Antivirus@Start 2
- Reg HKLM\SYSTEM\ControlSet002\services\avast! Antivirus@ErrorControl 1
- Reg HKLM\SYSTEM\ControlSet002\services\avast! Antivirus@ImagePath "C:\Program Files\AVAST Software\Avast\AvastSvc.exe"
- Reg HKLM\SYSTEM\ControlSet002\services\avast! Antivirus@DisplayName avast! Antivirus
- Reg HKLM\SYSTEM\ControlSet002\services\avast! Antivirus@Group ShellSvcGroup
- Reg HKLM\SYSTEM\ControlSet002\services\avast! Antivirus@DependOnService aswMonFlt?RpcSS?
- Reg HKLM\SYSTEM\ControlSet002\services\avast! Antivirus@WOW64 1
- Reg HKLM\SYSTEM\ControlSet002\services\avast! Antivirus@ObjectName LocalSystem
- Reg HKLM\SYSTEM\ControlSet002\services\avast! Antivirus@ServiceSidType 1
- Reg HKLM\SYSTEM\ControlSet002\services\avast! Antivirus@Description Manages and implements avast! antivirus services for this computer. This includes the resident protection, the virus chest and the scheduler.
- Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x00 0x00 0x00 0x00 ...
- Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
- Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x1F 0xA0 0x50 0x94 ...
- Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files (x86)\DAEMON Tools Lite\
- Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001 (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0xFD 0x5B 0x2B 0xB6 ...
- Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0xA0 0x02 0x00 0x00 ...
- Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0 (not active ControlSet)
- Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0xC1 0x03 0x4D 0xD0 ...
- ---- EOF - GMER 2.1 ----
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement