halflife1409 | 14.10.2015 16:46 | Gmer.txt - Teil 2 Code:
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!EnumDeviceDrivers + 17 00000000755214dd 2 bytes JMP 757a8832 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!GetDeviceDriverBaseNameA + 17 00000000755214f5 2 bytes JMP 757a8a08 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!QueryWorkingSetEx + 17 000000007552150d 2 bytes JMP 757a8728 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!GetDeviceDriverBaseNameW + 17 0000000075521525 2 bytes JMP 757a8af2 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!GetModuleBaseNameW + 17 000000007552153d 2 bytes JMP 7571fc98 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!EnumProcesses + 17 0000000075521555 2 bytes JMP 757268df C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!GetProcessMemoryInfo + 17 000000007552156d 2 bytes JMP 757a8ff1 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!GetPerformanceInfo + 17 0000000075521585 2 bytes JMP 757a8b52 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!QueryWorkingSet + 17 000000007552159d 2 bytes JMP 757a86ec C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!GetModuleBaseNameA + 17 00000000755215b5 2 bytes JMP 7571fd31 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!GetModuleFileNameExA + 17 00000000755215cd 2 bytes JMP 7572b2cc C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!GetProcessImageFileNameW + 20 00000000755216b2 2 bytes JMP 757a8eb4 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Wuff\AppData\Roaming\Dropbox\bin\Dropbox.exe[6284] C:\Windows\syswow64\Psapi.dll!GetProcessImageFileNameW + 31 00000000755216bd 2 bytes JMP 757a8681 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000778213ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077821544 8 bytes [60, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000778218ce 8 bytes [50, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077821ba8 8 bytes [40, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077821d25 8 bytes [30, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077821e8f 8 bytes [20, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077821f75 8 bytes [10, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 0000000077822238 8 bytes [00, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000778226e0 8 bytes [F0, 6D, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 000000007786da80 8 bytes {JMP QWORD [RIP-0x4bd61]}
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 000000007786dc00 8 bytes {JMP QWORD [RIP-0x4bd77]}
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 000000007786dc30 8 bytes {JMP QWORD [RIP-0x4c6f2]}
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 000000007786dd50 8 bytes {JMP QWORD [RIP-0x4c1ae]}
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 000000007786de00 8 bytes {JMP QWORD [RIP-0x4c538]}
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 000000007786e430 8 bytes {JMP QWORD [RIP-0x4bd56]}
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 000000007786e680 8 bytes {JMP QWORD [RIP-0x4c44e]}
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000000007786eee0 8 bytes {JMP QWORD [RIP-0x4cf71]}
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 00000000752a13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 00000000752a146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 00000000752a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 00000000752a19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 00000000752a19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\1Password\Agile1pAgent.exe[6444] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 00000000752a1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000778213ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077821544 8 bytes [60, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000778218ce 8 bytes [50, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077821ba8 8 bytes [40, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077821d25 8 bytes [30, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077821e8f 8 bytes [20, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077821f75 8 bytes [10, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 0000000077822238 8 bytes [00, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000778226e0 8 bytes [F0, 6D, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 000000007786da80 8 bytes {JMP QWORD [RIP-0x4bd61]}
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 000000007786dc00 8 bytes {JMP QWORD [RIP-0x4bd77]}
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 000000007786dc30 8 bytes {JMP QWORD [RIP-0x4c6f2]}
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 000000007786dd50 8 bytes {JMP QWORD [RIP-0x4c1ae]}
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 000000007786de00 8 bytes {JMP QWORD [RIP-0x4c538]}
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 000000007786e430 8 bytes {JMP QWORD [RIP-0x4bd56]}
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 000000007786e680 8 bytes {JMP QWORD [RIP-0x4c44e]}
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000000007786eee0 8 bytes {JMP QWORD [RIP-0x4cf71]}
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 00000000752a13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 00000000752a146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 00000000752a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 00000000752a19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 00000000752a19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[6476] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 00000000752a1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000778213ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077821544 8 bytes [60, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000778218ce 8 bytes [50, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077821ba8 8 bytes [40, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077821d25 8 bytes [30, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077821e8f 8 bytes [20, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077821f75 8 bytes [10, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 0000000077822238 8 bytes [00, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000778226e0 8 bytes [F0, 6D, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 000000007786da80 8 bytes {JMP QWORD [RIP-0x4bd61]}
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 000000007786dc00 8 bytes {JMP QWORD [RIP-0x4bd77]}
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 000000007786dc30 8 bytes {JMP QWORD [RIP-0x4c6f2]}
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 000000007786dd50 8 bytes {JMP QWORD [RIP-0x4c1ae]}
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 000000007786de00 8 bytes {JMP QWORD [RIP-0x4c538]}
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 000000007786e430 8 bytes {JMP QWORD [RIP-0x4bd56]}
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 000000007786e680 8 bytes {JMP QWORD [RIP-0x4c44e]}
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000000007786eee0 8 bytes {JMP QWORD [RIP-0x4cf71]}
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 00000000752a13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 00000000752a146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 00000000752a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 00000000752a19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 00000000752a19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 00000000752a1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075521401 2 bytes JMP 7572b20b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075521419 2 bytes JMP 7572b336 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075521431 2 bytes JMP 757a8f39 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007552144a 2 bytes CALL 75704885 C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000755214dd 2 bytes JMP 757a8832 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000755214f5 2 bytes JMP 757a8a08 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007552150d 2 bytes JMP 757a8728 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075521525 2 bytes JMP 757a8af2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007552153d 2 bytes JMP 7571fc98 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075521555 2 bytes JMP 757268df C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007552156d 2 bytes JMP 757a8ff1 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075521585 2 bytes JMP 757a8b52 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007552159d 2 bytes JMP 757a86ec C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000755215b5 2 bytes JMP 7571fd31 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000755215cd 2 bytes JMP 7572b2cc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000755216b2 2 bytes JMP 757a8eb4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\concentr.exe[6636] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000755216bd 2 bytes JMP 757a8681 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000778213ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077821544 8 bytes [60, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000778218ce 8 bytes [50, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077821ba8 8 bytes [40, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077821d25 8 bytes [30, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077821e8f 8 bytes [20, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077821f75 8 bytes [10, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 0000000077822238 8 bytes [00, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000778226e0 8 bytes [F0, 6D, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 000000007786da80 8 bytes {JMP QWORD [RIP-0x4bd61]}
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 000000007786dc00 8 bytes {JMP QWORD [RIP-0x4bd77]}
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 000000007786dc30 8 bytes {JMP QWORD [RIP-0x4c6f2]}
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 000000007786dd50 8 bytes {JMP QWORD [RIP-0x4c1ae]}
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 000000007786de00 8 bytes {JMP QWORD [RIP-0x4c538]}
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 000000007786e430 8 bytes {JMP QWORD [RIP-0x4bd56]}
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 000000007786e680 8 bytes {JMP QWORD [RIP-0x4c44e]}
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000000007786eee0 8 bytes {JMP QWORD [RIP-0x4cf71]}
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 00000000752a13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 00000000752a146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 00000000752a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 00000000752a19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 00000000752a19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 00000000752a1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075521401 2 bytes JMP 7572b20b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075521419 2 bytes JMP 7572b336 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075521431 2 bytes JMP 757a8f39 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007552144a 2 bytes CALL 75704885 C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000755214dd 2 bytes JMP 757a8832 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000755214f5 2 bytes JMP 757a8a08 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007552150d 2 bytes JMP 757a8728 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075521525 2 bytes JMP 757a8af2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007552153d 2 bytes JMP 7571fc98 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075521555 2 bytes JMP 757268df C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007552156d 2 bytes JMP 757a8ff1 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075521585 2 bytes JMP 757a8b52 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007552159d 2 bytes JMP 757a86ec C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000755215b5 2 bytes JMP 7571fd31 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000755215cd 2 bytes JMP 7572b2cc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000755216b2 2 bytes JMP 757a8eb4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\ICA Client\redirector.exe[6648] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000755216bd 2 bytes JMP 757a8681 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000778213ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077821544 8 bytes [60, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000778218ce 8 bytes [50, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077821ba8 8 bytes [40, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077821d25 8 bytes [30, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077821e8f 8 bytes [20, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077821f75 8 bytes [10, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 0000000077822238 8 bytes [00, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000778226e0 8 bytes [F0, 6D, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 000000007786da80 8 bytes {JMP QWORD [RIP-0x4bd61]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 000000007786dc00 8 bytes {JMP QWORD [RIP-0x4bd77]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 000000007786dc30 8 bytes {JMP QWORD [RIP-0x4c6f2]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 000000007786dd50 8 bytes {JMP QWORD [RIP-0x4c1ae]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 000000007786de00 8 bytes {JMP QWORD [RIP-0x4c538]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 000000007786e430 8 bytes {JMP QWORD [RIP-0x4bd56]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 000000007786e680 8 bytes {JMP QWORD [RIP-0x4c44e]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000000007786eee0 8 bytes {JMP QWORD [RIP-0x4cf71]}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 00000000752a13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 00000000752a146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 00000000752a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 00000000752a19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 00000000752a19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 00000000752a1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExW + 17 0000000075521401 2 bytes JMP 7572b20b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!EnumProcessModules + 17 0000000075521419 2 bytes JMP 7572b336 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 17 0000000075521431 2 bytes JMP 757a8f39 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 42 000000007552144a 2 bytes CALL 75704885 C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!EnumDeviceDrivers + 17 00000000755214dd 2 bytes JMP 757a8832 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameA + 17 00000000755214f5 2 bytes JMP 757a8a08 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!QueryWorkingSetEx + 17 000000007552150d 2 bytes JMP 757a8728 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameW + 17 0000000075521525 2 bytes JMP 757a8af2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameW + 17 000000007552153d 2 bytes JMP 7571fc98 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!EnumProcesses + 17 0000000075521555 2 bytes JMP 757268df C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetProcessMemoryInfo + 17 000000007552156d 2 bytes JMP 757a8ff1 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetPerformanceInfo + 17 0000000075521585 2 bytes JMP 757a8b52 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!QueryWorkingSet + 17 000000007552159d 2 bytes JMP 757a86ec C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameA + 17 00000000755215b5 2 bytes JMP 7571fd31 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExA + 17 00000000755215cd 2 bytes JMP 7572b2cc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 20 00000000755216b2 2 bytes JMP 757a8eb4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe[6656] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 31 00000000755216bd 2 bytes JMP 757a8681 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000778213ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077821544 8 bytes [60, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000778218ce 8 bytes [50, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077821ba8 8 bytes [40, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077821d25 8 bytes [30, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077821e8f 8 bytes [20, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077821f75 8 bytes [10, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 0000000077822238 8 bytes [00, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000778226e0 8 bytes [F0, 6D, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 000000007786da80 8 bytes {JMP QWORD [RIP-0x4bd61]}
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 000000007786dc00 8 bytes {JMP QWORD [RIP-0x4bd77]}
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 000000007786dc30 8 bytes {JMP QWORD [RIP-0x4c6f2]}
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 000000007786dd50 8 bytes {JMP QWORD [RIP-0x4c1ae]}
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 000000007786de00 8 bytes {JMP QWORD [RIP-0x4c538]}
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 000000007786e430 8 bytes {JMP QWORD [RIP-0x4bd56]}
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 000000007786e680 8 bytes {JMP QWORD [RIP-0x4c44e]}
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000000007786eee0 8 bytes {JMP QWORD [RIP-0x4cf71]}
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 00000000752a13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 00000000752a146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 00000000752a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 00000000752a19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 00000000752a19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 00000000752a1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075521401 2 bytes JMP 7572b20b C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075521419 2 bytes JMP 7572b336 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075521431 2 bytes JMP 757a8f39 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007552144a 2 bytes CALL 75704885 C:\Windows\syswow64\KERNEL32.dll
.text ... * 9
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000755214dd 2 bytes JMP 757a8832 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000755214f5 2 bytes JMP 757a8a08 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007552150d 2 bytes JMP 757a8728 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075521525 2 bytes JMP 757a8af2 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007552153d 2 bytes JMP 7571fc98 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075521555 2 bytes JMP 757268df C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007552156d 2 bytes JMP 757a8ff1 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075521585 2 bytes JMP 757a8b52 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007552159d 2 bytes JMP 757a86ec C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000755215b5 2 bytes JMP 7571fd31 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000755215cd 2 bytes JMP 7572b2cc C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000755216b2 2 bytes JMP 757a8eb4 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\GoPro\Tools\Importer\GoPro Importer.exe[6724] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000755216bd 2 bytes JMP 757a8681 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000778213ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077821544 8 bytes [60, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000778218ce 8 bytes [50, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077821ba8 8 bytes [40, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077821d25 8 bytes [30, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077821e8f 8 bytes [20, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077821f75 8 bytes [10, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 0000000077822238 8 bytes [00, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000778226e0 8 bytes [F0, 6D, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 000000007786da80 8 bytes {JMP QWORD [RIP-0x4bd61]}
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 000000007786dc00 8 bytes {JMP QWORD [RIP-0x4bd77]}
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 000000007786dc30 8 bytes {JMP QWORD [RIP-0x4c6f2]}
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 000000007786dd50 8 bytes {JMP QWORD [RIP-0x4c1ae]}
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 000000007786de00 8 bytes {JMP QWORD [RIP-0x4c538]}
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 000000007786e430 8 bytes {JMP QWORD [RIP-0x4bd56]}
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 000000007786e680 8 bytes {JMP QWORD [RIP-0x4c44e]}
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000000007786eee0 8 bytes {JMP QWORD [RIP-0x4cf71]}
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 00000000752a13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 00000000752a146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 00000000752a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 00000000752a19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 00000000752a19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 00000000752a1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000075521401 2 bytes JMP 7572b20b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000075521419 2 bytes JMP 7572b336 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000075521431 2 bytes JMP 757a8f39 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007552144a 2 bytes CALL 75704885 C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000755214dd 2 bytes JMP 757a8832 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000755214f5 2 bytes JMP 757a8a08 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007552150d 2 bytes JMP 757a8728 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000075521525 2 bytes JMP 757a8af2 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007552153d 2 bytes JMP 7571fc98 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000075521555 2 bytes JMP 757268df C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007552156d 2 bytes JMP 757a8ff1 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000075521585 2 bytes JMP 757a8b52 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007552159d 2 bytes JMP 757a86ec C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000755215b5 2 bytes JMP 7571fd31 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000755215cd 2 bytes JMP 7572b2cc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000755216b2 2 bytes JMP 757a8eb4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Citrix\Receiver\Receiver.exe[6752] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000755216bd 2 bytes JMP 757a8681 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000778213ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077821544 8 bytes [60, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000778218ce 8 bytes [50, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077821ba8 8 bytes [40, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077821d25 8 bytes [30, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077821e8f 8 bytes [20, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077821f75 8 bytes [10, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 0000000077822238 8 bytes [00, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000778226e0 8 bytes [F0, 6D, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 000000007786da80 8 bytes {JMP QWORD [RIP-0x4bd61]}
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 000000007786dc00 8 bytes {JMP QWORD [RIP-0x4bd77]}
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 000000007786dc30 8 bytes {JMP QWORD [RIP-0x4c6f2]}
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 000000007786dd50 8 bytes {JMP QWORD [RIP-0x4c1ae]}
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 000000007786de00 8 bytes {JMP QWORD [RIP-0x4c538]}
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 000000007786e430 8 bytes {JMP QWORD [RIP-0x4bd56]}
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 000000007786e680 8 bytes {JMP QWORD [RIP-0x4c44e]}
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000000007786eee0 8 bytes {JMP QWORD [RIP-0x4cf71]}
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 00000000752a13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 00000000752a146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 00000000752a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 00000000752a19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 00000000752a19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\BenQ\Display Pilot\DTHtml.exe[6788] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 00000000752a1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000778213ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077821544 8 bytes [60, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000778218ce 8 bytes [50, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077821ba8 8 bytes [40, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077821d25 8 bytes [30, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077821e8f 8 bytes [20, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077821f75 8 bytes [10, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 0000000077822238 8 bytes [00, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000778226e0 8 bytes [F0, 6D, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 000000007786da80 8 bytes {JMP QWORD [RIP-0x4bd61]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 000000007786dc00 8 bytes {JMP QWORD [RIP-0x4bd77]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 000000007786dc30 8 bytes {JMP QWORD [RIP-0x4c6f2]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 000000007786dd50 8 bytes {JMP QWORD [RIP-0x4c1ae]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 000000007786de00 8 bytes {JMP QWORD [RIP-0x4c538]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 000000007786e430 8 bytes {JMP QWORD [RIP-0x4bd56]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 000000007786e680 8 bytes {JMP QWORD [RIP-0x4c44e]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000000007786eee0 8 bytes {JMP QWORD [RIP-0x4cf71]}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 00000000752a13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 00000000752a146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 00000000752a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 00000000752a19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 00000000752a19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[6804] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 00000000752a1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000778213ef 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 500 0000000077821544 8 bytes [60, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000778218ce 8 bytes [50, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 212 0000000077821ba8 8 bytes [40, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 0000000077821d25 8 bytes [30, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 0000000077821e8f 8 bytes [20, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 89 0000000077821f75 8 bytes [10, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 680 0000000077822238 8 bytes [00, 6E, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000778226e0 8 bytes [F0, 6D, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 000000007786da80 8 bytes {JMP QWORD [RIP-0x4bd61]}
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 000000007786dc00 8 bytes {JMP QWORD [RIP-0x4bd77]}
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 000000007786dc30 8 bytes {JMP QWORD [RIP-0x4c6f2]}
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 000000007786dd50 8 bytes {JMP QWORD [RIP-0x4c1ae]}
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 000000007786de00 8 bytes {JMP QWORD [RIP-0x4c538]}
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 000000007786e430 8 bytes {JMP QWORD [RIP-0x4bd56]}
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 000000007786e680 8 bytes {JMP QWORD [RIP-0x4c44e]}
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000000007786eee0 8 bytes {JMP QWORD [RIP-0x4cf71]}
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 00000000752a13cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 00000000752a146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 00000000752a16d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 00000000752a19db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 00000000752a19fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 00000000752a1a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExW + 17 0000000075521401 2 bytes JMP 7572b20b C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!EnumProcessModules + 17 0000000075521419 2 bytes JMP 7572b336 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 17 0000000075521431 2 bytes JMP 757a8f39 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 42 000000007552144a 2 bytes CALL 75704885 C:\Windows\syswow64\KERNEL32.dll
.text ... * 9
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!EnumDeviceDrivers + 17 00000000755214dd 2 bytes JMP 757a8832 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameA + 17 00000000755214f5 2 bytes JMP 757a8a08 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!QueryWorkingSetEx + 17 000000007552150d 2 bytes JMP 757a8728 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetDeviceDriverBaseNameW + 17 0000000075521525 2 bytes JMP 757a8af2 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameW + 17 000000007552153d 2 bytes JMP 7571fc98 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!EnumProcesses + 17 0000000075521555 2 bytes JMP 757268df C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetProcessMemoryInfo + 17 000000007552156d 2 bytes JMP 757a8ff1 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetPerformanceInfo + 17 0000000075521585 2 bytes JMP 757a8b52 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!QueryWorkingSet + 17 000000007552159d 2 bytes JMP 757a86ec C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetModuleBaseNameA + 17 00000000755215b5 2 bytes JMP 7571fd31 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetModuleFileNameExA + 17 00000000755215cd 2 bytes JMP 7572b2cc C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 20 00000000755216b2 2 bytes JMP 757a8eb4 C:\Windows\syswow64\KERNEL32.dll
.text C:\Program Files (x86)\Citrix\SelfServicePlugin\SelfServicePlugin.exe[7200] C:\Windows\syswow64\psapi.dll!GetProcessImageFileNameW + 31 |