![]() |
Windows 8 64bit - Hinweis auf Spyware in InternetExplorer und Firefox mit öffnenden Popups und Downloadhinweise Liste der Anhänge anzeigen (Anzahl: 2) Habe einen Laptop gebraucht mit Windows 8 installiert gekauft. Von Beginn an, habe ich das Phänomen, dass sich sowohl in Firefox, wie auch im Internet Explorer (weitere Browser habe ich nicht probiert) Popups öffnen, die darauf hinweisen, dass mein Computer langsam sei oder sich Spyware auf meinem System befinden würde. Teilweise befinden sich diese Informationen wie Werbebanner eingebettet in den aufgerufenen Websiten. Hatte dann Avast als Virenscanner installiert und von da an war es etwas besser, jedoch nicht behoben. Habe heute noch mit Avast einen Scan beim Hochfahren gemacht, wobei recht viele Funde in den Container verschoben wurden. Einige wenige Dateien konnte ich weder verschieben, noch reparieren, noch löschen. Z.B. folgende: C:\Users\Neuer Besitzer\App Data\Local\Mircrosoft\Windows\Temporary Internet Files\Content.IE5\2WCUO1BA\pack [1].7Z | > protector.dll Im Anhang habe ich die geforderten Log.Files angehängt (Gmer Datei war zu groß zum hochladen, daher in zwei Dateien aufgeteilt) und ein paar Screenshots in PDF Form, wie sich das Problem im Browser darstellt. Den Container von Avast hätte ich auch gerne hochgeladen, jedoch sind die Screenshots zu groß und die Möglichkeit eine .txt zu erstellen habe ich bei Avast nicht gefunden. Nutze den Computer bislang nur eingeschränkt, da ich Angst habe, dass meine Daten ausgespäht werden. Ein Leistungsdefizit konnte ich bisher jedoch nicht feststellen, es ist nur kein normales Surfen im Internet möglich ohne ständig gestört zu werden und den angebotenen Links mit Downloadbuttons vertraue ich nicht. Bitte um eure Hilfe um meinen Computer wieder sauber zu bekommen. |
Hallo, hänge die Logfiles bitte nicht an (das erschwert mir das Auswerten massiv), sondern füge deren Inhalt direkt innerhalb von Codetags ein: [code]Inhalt Logfile[/code]. (Anleitung)) Wenn es zu viele Zeichen sind, dann teile die Logs auf mehrere Posts auf. Danke. |
Werde die Logs einzeln posten, damit es nicht zu unübersichtlich wird. Hier der erste Log: Addition:FRST Additions Logfile: Code: Additional scan result of Farbar Recovery Scan Tool (x64) Version: 16-09-2013 01 Hier defogger_disable: defogger_disable by jpshortstuff (23.02.10.1) Log created at 09:04 on 16/09/2013 (Neuer Besitzer) Checking for autostart values... HKCU\~\Run values retrieved. HKLM\~\Run values retrieved. Checking for services/drivers... -=E.O.F=- Hier FRST: FRST Logfile: FRST Logfile: Code: Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 16-09-2013 01 --- --- --- |
Hier Gmer Teil1: GMER 2.1.19163 - GMER - Rootkit Detector and Remover Rootkit scan 2013-09-16 12:38:50 Windows 6.2.9200 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 HITACHI_HTS723216A7A364 rev.EC1ZB70B 149,05GB Running: gmer_2.1.19163.exe; Driver: C:\Users\NEUERB~1\AppData\Local\Temp\kxloapob.sys ---- Kernel code sections - GMER 2.1 ---- .text C:\WINDOWS\System32\win32k.sys!W32pServiceTable fffff9600009fd00 7 bytes [40, 6C, 82, 01, 00, 55, F2] .text C:\WINDOWS\System32\win32k.sys!W32pServiceTable + 8 fffff9600009fd08 7 bytes [01, B1, C1, FF, 00, A1, DC] ---- User code sections - GMER 2.1 ---- .text C:\WINDOWS\system32\csrss.exe[732] C:\WINDOWS\SYSTEM32\kernel32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\csrss.exe[780] C:\WINDOWS\SYSTEM32\kernel32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\wininit.exe[788] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\winlogon.exe[832] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\services.exe[872] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\lsass.exe[880] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\svchost.exe[980] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\ibmpmsvc.exe[344] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\svchost.exe[536] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\System32\svchost.exe[500] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\dwm.exe[676] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\System32\svchost.exe[652] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\svchost.exe[512] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\svchost.exe[540] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\svchost.exe[1208] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\svchost.exe[1232] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\WLANExt.exe[1372] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8f579177a 4 bytes [79, F5, F8, 07] .text C:\WINDOWS\system32\WLANExt.exe[1372] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8f5791782 4 bytes [79, F5, F8, 07] .text C:\WINDOWS\system32\WLANExt.exe[1372] C:\WINDOWS\system32\WSOCK32.dll!recvfrom + 742 000007f8edf01b32 4 bytes [F0, ED, F8, 07] .text C:\WINDOWS\system32\WLANExt.exe[1372] C:\WINDOWS\system32\WSOCK32.dll!recvfrom + 750 000007f8edf01b3a 4 bytes [F0, ED, F8, 07] .text C:\WINDOWS\system32\conhost.exe[1392] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Program Files\LENOVO\HOTKEY\TPHKLOAD.exe[1968] C:\WINDOWS\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Program Files\Bonjour\mDNSResponder.exe[2128] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\dashost.exe[2196] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8f579177a 4 bytes [79, F5, F8, 07] .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8f5791782 4 bytes [79, F5, F8, 07] .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\WSOCK32.dll!recvfrom + 742 000007f8edf01b32 4 bytes [F0, ED, F8, 07] .text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[2232] C:\WINDOWS\SYSTEM32\WSOCK32.dll!recvfrom + 750 000007f8edf01b3a 4 bytes [F0, ED, F8, 07] .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\user32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\wbem\unsecapp.exe[2752] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\user32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8f579177a 4 bytes [79, F5, F8, 07] .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2788] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8f5791782 4 bytes [79, F5, F8, 07] .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\user32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\wbem\wmiprvse.exe[2820] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8f579177a 4 bytes [79, F5, F8, 07] .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8f5791782 4 bytes [79, F5, F8, 07] .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[2896] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\svchost.exe[2920] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\user32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\svchost.exe[2460] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Windows\System32\WUDFHost.exe[3116] C:\Windows\System32\MSIMG32.dll!GradientFill + 690 000007f8e9fa1532 4 bytes [FA, E9, F8, 07] .text C:\Windows\System32\WUDFHost.exe[3116] C:\Windows\System32\MSIMG32.dll!GradientFill + 698 000007f8e9fa153a 4 bytes [FA, E9, F8, 07] .text C:\Windows\System32\WUDFHost.exe[3116] C:\Windows\System32\MSIMG32.dll!TransparentBlt + 246 000007f8e9fa165a 4 bytes [FA, E9, F8, 07] .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8f579177a 4 bytes [79, F5, F8, 07] .text C:\Windows\System32\WUDFHost.exe[3116] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8f5791782 4 bytes [79, F5, F8, 07] .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\user32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\taskhostex.exe[3480] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\PROGRA~1\Lenovo\HOTKEY\SHTCTKY.EXE[3572] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\MSIMG32.dll!GradientFill + 690 000007f8e9fa1532 4 bytes [FA, E9, F8, 07] .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\MSIMG32.dll!GradientFill + 698 000007f8e9fa153a 4 bytes [FA, E9, F8, 07] .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\SYSTEM32\MSIMG32.dll!TransparentBlt + 246 000007f8e9fa165a 4 bytes [FA, E9, F8, 07] .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8f579177a 4 bytes [79, F5, F8, 07] .text C:\WINDOWS\Explorer.EXE[3684] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8f5791782 4 bytes [79, F5, F8, 07] .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\system32\SearchIndexer.exe[3052] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Windows\System32\RuntimeBroker.exe[3436] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Windows\System32\TpShocks.exe[1408] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Windows\System32\igfxtray.exe[3996] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Windows\System32\hkcmd.exe[1820] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory |
Hier Gmer Teil 2: 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8f579177a 4 bytes [79, F5, F8, 07] .text C:\Windows\System32\igfxpers.exe[2748] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8f5791782 4 bytes [79, F5, F8, 07] .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8f579177a 4 bytes [79, F5, F8, 07] .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8f5791782 4 bytes [79, F5, F8, 07] .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[1504] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Program Files\Synaptics\SynTP\SynTPLpr.exe[4184] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Program Files\Lenovo\HOTKEY\extapsup.exe[4224] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8f579177a 4 bytes [79, F5, F8, 07] .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8f5791782 4 bytes [79, F5, F8, 07] .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[4264] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files (x86)\Integrated Camera Driver\X64\RCIMGDIR.exe[4400] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\MSIMG32.dll!GradientFill + 690 000007f8e9fa1532 4 bytes [FA, E9, F8, 07] .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\MSIMG32.dll!GradientFill + 698 000007f8e9fa153a 4 bytes [FA, E9, F8, 07] .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\MSIMG32.dll!TransparentBlt + 246 000007f8e9fa165a 4 bytes [FA, E9, F8, 07] .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8f579177a 4 bytes [79, F5, F8, 07] .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8f5791782 4 bytes [79, F5, F8, 07] .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\system32\rundll32.exe[4428] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\system32\igfxext.exe[4568] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Program Files\iPod\bin\iPodService.exe[4144] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IMSS\PrivacyIconClient.exe[5044] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files\Lenovo\Lenovo Mobile Hotspot\LnvHotSpotSvc.exe[4564] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\conhost.exe[1404] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\System32\svchost.exe[5672] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\user32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\user32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\system32\DllHost.exe[6992] C:\WINDOWS\SYSTEM32\user32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE[6500] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f8f382f7eb 1 byte [62] .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\WINDOWS\System32\spoolsv.exe[8456] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f8f5fc2dc0 5 bytes JMP 000007f976190ecc .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f8f5fc2ea0 5 bytes JMP 000007f97619163c .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f8f5fc30e0 5 bytes JMP 000007f976191284 .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 000007f8f5fc4251 5 bytes JMP 000007f9761919f4 .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f8f5fd4a10 5 bytes JMP 000007f97619075c .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\ntdll.dll!LdrLoadDll 000007f8f5ff31c4 5 bytes JMP 000007f9761903a4 .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\sechost.dll!DeleteService 000007f8f5747510 5 bytes JMP 000007f975790b14 .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f8f5747550 5 bytes JMP 000007f9757919f4 .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceW 000007f8f57475d0 5 bytes JMP 000007f97579075c .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f8f5747b20 5 bytes JMP 000007f975791284 .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\sechost.dll!CreateServiceA 000007f8f576b034 5 bytes JMP 000007f9757903a4 .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f8f576b2e4 5 bytes JMP 000007f97579163c .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f8f576b470 5 bytes JMP 000007f975790ecc .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f8f576b6d4 5 bytes JMP 000007f975791dac .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\system32\USER32.dll!UnhookWindowsHookEx 000007f8f5da2120 5 bytes JMP 000007f975ef1284 .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExW 000007f8f5dabee0 5 bytes JMP 000007f975ef0ecc .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\system32\USER32.dll!UnhookWinEvent 000007f8f5dae030 5 bytes JMP 000007f975ef075c .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\system32\USER32.dll!SetWinEventHook 000007f8f5db2f70 5 bytes JMP 000007f975ef03a4 .text C:\Program Files\WindowsApps\Microsoft.Reader_6.2.9200.20780_x64__8wekyb3d8bbwe\glcnd.exe[8540] C:\WINDOWS\system32\USER32.dll!SetWindowsHookExA 000007f8f5dd1850 5 bytes JMP 000007f975ef0b14 ---- Threads - GMER 2.1 ---- Thread C:\WINDOWS\system32\csrss.exe [780:796] fffff960008425e8 ---- Registry - GMER 2.1 ---- Reg HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Kernel\RNG@RNGAuxiliarySeed -1587657269 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk@Type 2 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk@Start 2 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk@ErrorControl 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk@DisplayName aswFsBlk Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk@Group FSFilter Activity Monitor Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk@DependOnService FltMgr? Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk@Description avast! mini-filter driver (aswFsBlk) Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk@Tag 2 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk\Instances Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk\Instances@DefaultInstance aswFsBlk Instance Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk\Instances\aswFsBlk Instance Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk\Instances\aswFsBlk Instance@Altitude 388400 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk\Instances\aswFsBlk Instance@Flags 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswFsBlk Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt@Type 2 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt@Start 2 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt@ErrorControl 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt@ImagePath \??\C:\WINDOWS\system32\drivers\aswMonFlt.sys Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt@DisplayName aswMonFlt Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt@Group FSFilter Anti-Virus Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt@DependOnService FltMgr? Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt@Description avast! mini-filter driver (aswMonFlt) Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt\Instances Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt\Instances@DefaultInstance aswMonFlt Instance Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt\Instances\aswMonFlt Instance Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt\Instances\aswMonFlt Instance@Altitude 320700 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt\Instances\aswMonFlt Instance@Flags 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswMonFlt Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr@ImagePath \SystemRoot\System32\Drivers\aswrdr2.sys Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr@Type 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr@Start 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr@ErrorControl 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr@DisplayName aswRdr Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr@Group PNP_TDI Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr@DependOnService tcpip? Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr@Description avast! WFP Redirect driver Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr\Parameters Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr\Parameters@MSIgnoreLSPDefault Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr\Parameters@WSIgnoreLSPDefault nl_lsp.dll,imon.dll,xfire_lsp.dll,mslsp.dll,mssplsp.dll,cwhook.dll,spi.dll,bmnet.dll,winsflt.dll Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRdr Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRvrt@Type 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRvrt@Start 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRvrt@ErrorControl 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRvrt@DisplayName aswRvrt Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRvrt@Description avast! Revert Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRvrt\Parameters Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRvrt\Parameters@BootCounter 2 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRvrt\Parameters@TickCounter 1164097 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRvrt\Parameters@SystemRoot \Device\HarddiskVolume2\WINDOWS Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRvrt\Parameters@ImproperShutdown 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswRvrt Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx@Type 2 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx@Start 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx@ErrorControl 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx@DisplayName aswSnx Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx@Group FSFilter Virtualization Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx@DependOnService FltMgr? Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx@Description avast! virtualization driver (aswSnx) Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx@Tag 2 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx\Instances Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx\Instances@DefaultInstance aswSnx Instance Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx\Instances\aswSnx Instance Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx\Instances\aswSnx Instance@Altitude 137600 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx\Instances\aswSnx Instance@Flags 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx\Parameters Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx\Parameters@ProgramFolder \DosDevices\C:\Program Files\AVAST Software\Avast Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx\Parameters@DataFolder \DosDevices\C:\ProgramData\AVAST Software\Avast Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSnx Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP@Type 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP@Start 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP@ErrorControl 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP@DisplayName aswSP Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP@Description avast! Self Protection Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP\Parameters Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP\Parameters@BehavShield 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP\Parameters@ProgramFolder \DosDevices\C:\Program Files\AVAST Software\Avast Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP\Parameters@DataFolder \DosDevices\C:\ProgramData\AVAST Software\Avast Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP\Parameters@ProgramFilesFolder \DosDevices\C:\Program Files Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP\Parameters@GadgetFolder \DosDevices\C:\Program Files\Windows Sidebar\Shared Gadgets\aswSidebar.gadget Reg HKLM\SYSTEM\CurrentControlSet\Services\aswSP Reg HKLM\SYSTEM\CurrentControlSet\Services\aswTdi@Type 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswTdi@Start 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswTdi@ErrorControl 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswTdi@DisplayName avast! Network Shield Support Reg HKLM\SYSTEM\CurrentControlSet\Services\aswTdi@Group PNP_TDI Reg HKLM\SYSTEM\CurrentControlSet\Services\aswTdi@DependOnService tcpip? Reg HKLM\SYSTEM\CurrentControlSet\Services\aswTdi@Description avast! Network Shield TDI driver Reg HKLM\SYSTEM\CurrentControlSet\Services\aswTdi@Tag 10 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswTdi Reg HKLM\SYSTEM\CurrentControlSet\Services\aswVmm@Type 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswVmm@Start 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswVmm@ErrorControl 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\aswVmm@DisplayName aswVmm Reg HKLM\SYSTEM\CurrentControlSet\Services\aswVmm@Description avast! VM Monitor Reg HKLM\SYSTEM\CurrentControlSet\Services\aswVmm\Parameters Reg HKLM\SYSTEM\CurrentControlSet\Services\aswVmm Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus@Type 32 Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus@Start 2 Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus@ErrorControl 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus@ImagePath "C:\Program Files\AVAST Software\Avast\AvastSvc.exe" Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus@DisplayName avast! Antivirus Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus@Group ShellSvcGroup Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus@DependOnService aswMonFlt?RpcSS? Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus@WOW64 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus@ObjectName LocalSystem Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus@ServiceSidType 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus@Description Verwaltet und implementiert avast! Antivirus-Dienste f?r diesen Computer. Dies beinhaltet den Echtzeit-Schutz, den Virus-Container und den Planer. Reg HKLM\SYSTEM\CurrentControlSet\Services\avast! Antivirus Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\e02a82f2a4a9 ---- EOF - GMER 2.1 ---- |
Entschuldigung, das war nicht wie gewünscht. Daher hier nochmals: Addtition: Code: Additional scan result of Farbar Recovery Scan Tool (x64) Version: 16-09-2013 01 Code: defogger_disable by jpshortstuff (23.02.10.1) FRST Logfile: FRST Logfile: Code: Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 16-09-2013 01 --- --- --- |
Gmer Teil 1: Code: GMER 2.1.19163 - hxxp://www.gmer.net |
Ok, dann: Schritt 1
Schritt 2 Downloade Dir bitte ![]()
Schritt 3 Starte noch einmal FRST.
|
Gmer Teil 2: Code: 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 |
Meine nächsten Anweisungen stehen in meinem vorherigen Post. :) |
Gmer Teil 2: Code: 000007f8f5fc2d60 5 bytes JMP 000007f976190b14 |
Ok, die nächsten Schritte sind hier: http://www.trojaner-board.de/141644-...ml#post1156194 |
Ergebnis adwcleaner: AdwCleaner Logfile: Code: # AdwCleaner v3.004 - Bericht erstellt am 16/09/2013 um 14:25:40 [/CODE] FRST Ergebnis: FRST Logfile: Code: Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 16-09-2013 01 |
Welche Probleme bestehen nach diesen Schritten noch? Schritt 1 Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster. Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument Code: FF Extension: No Name - C:\Users\Neuer Besitzer\AppData\Roaming\Mozilla\Firefox\Profiles\4s4l07tq.default\Extensions\130 Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
Schritt 2 Downloade Dir bitte ![]()
Schritt 3 ESET Online Scanner
|
So es hat etwas gedauert bis Eset durch war mit dem Scan. Hier die drei Log Files: 1. FRST FRST Logfile: Code: Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 16-09-2013 01 2. Malwarebytes Log: Code: Malwarebytes Anti-Malware 1.75.0.1300 Code: ESETSmartInstaller@High as downloader log: |
Alle Zeitangaben in WEZ +1. Es ist jetzt 23:08 Uhr. |
Copyright ©2000-2025, Trojaner-Board