Und noch
3. GMER.log: Code:
GMER 2.1.19163 - hxxp://www.gmer.net
Rootkit scan 2013-09-05 19:36:44
Windows 6.2.9200 x64 \Device\Harddisk0\DR0 -> \Device\0000003a rev.A110 465,76GB
Running: gmer_2.1.19163.exe; Driver: C:\Users\Franzi\AppData\Local\Temp\uxtorpog.sys
---- Kernel code sections - GMER 2.1 ----
.text C:\Windows\System32\win32k.sys!W32pServiceTable fffff960001f4d00 7 bytes [40, 6C, 82, 01, 00, 55, F2]
.text C:\Windows\System32\win32k.sys!W32pServiceTable + 8 fffff960001f4d08 7 bytes [01, B1, C1, FF, 00, A1, DC]
---- User code sections - GMER 2.1 ----
.text C:\Windows\system32\csrss.exe[512] C:\Windows\SYSTEM32\kernel32.dll!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\wininit.exe[556] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\lsass.exe[672] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\svchost.exe[784] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\svchost.exe[856] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\svchost.exe[944] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\svchost.exe[984] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\System32\svchost.exe[332] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Program Files\IDT\WDM\STacSV64.exe[520] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\svchost.exe[1168] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\WLANExt.exe[1264] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\WLANExt.exe[1264] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8593a177a 4 bytes [3A, 59, F8, 07]
.text C:\Windows\system32\WLANExt.exe[1264] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8593a1782 4 bytes [3A, 59, F8, 07]
.text C:\Windows\system32\WLANExt.exe[1264] C:\Windows\system32\MSIMG32.dll!GradientFill + 690 000007f8538d1532 4 bytes [8D, 53, F8, 07]
.text C:\Windows\system32\WLANExt.exe[1264] C:\Windows\system32\MSIMG32.dll!GradientFill + 698 000007f8538d153a 4 bytes [8D, 53, F8, 07]
.text C:\Windows\system32\WLANExt.exe[1264] C:\Windows\system32\MSIMG32.dll!TransparentBlt + 246 000007f8538d165a 4 bytes [8D, 53, F8, 07]
.text C:\Windows\system32\conhost.exe[1284] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\System32\spoolsv.exe[1488] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\svchost.exe[1548] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[1688] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[1688] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 690 000007f8538d1532 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[1688] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 698 000007f8538d153a 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[1688] C:\Windows\SYSTEM32\MSIMG32.dll!TransparentBlt + 246 000007f8538d165a 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[1688] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8593a177a 4 bytes [3A, 59, F8, 07]
.text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[1688] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8593a1782 4 bytes [3A, 59, F8, 07]
.text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[1688] C:\Windows\SYSTEM32\WSOCK32.dll!recvfrom + 742 000007f850571b32 4 bytes [57, 50, F8, 07]
.text C:\Program Files\Intel\WiFi\bin\EvtEng.exe[1688] C:\Windows\SYSTEM32\WSOCK32.dll!recvfrom + 750 000007f850571b3a 4 bytes [57, 50, F8, 07]
.text C:\Windows\system32\dashost.exe[1708] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Program Files\Intel\iCLS Client\HeciServer.exe[1748] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[1924] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[1924] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8593a177a 4 bytes [3A, 59, F8, 07]
.text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[1924] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8593a1782 4 bytes [3A, 59, F8, 07]
.text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[1924] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 690 000007f8538d1532 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[1924] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 698 000007f8538d153a 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe[1924] C:\Windows\SYSTEM32\MSIMG32.dll!TransparentBlt + 246 000007f8538d165a 4 bytes [8D, 53, F8, 07]
.text C:\Windows\system32\svchost.exe[1152] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\svchost.exe[1152] C:\Windows\system32\WSOCK32.dll!recvfrom + 742 000007f850571b32 4 bytes [57, 50, F8, 07]
.text C:\Windows\system32\svchost.exe[1152] C:\Windows\system32\WSOCK32.dll!recvfrom + 750 000007f850571b3a 4 bytes [57, 50, F8, 07]
.text C:\Program Files\Intel\WiFi\bin\ZeroConfigService.exe[1360] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Program Files\Intel\WiFi\bin\ZeroConfigService.exe[1360] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 690 000007f8538d1532 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Intel\WiFi\bin\ZeroConfigService.exe[1360] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 698 000007f8538d153a 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Intel\WiFi\bin\ZeroConfigService.exe[1360] C:\Windows\SYSTEM32\MSIMG32.dll!TransparentBlt + 246 000007f8538d165a 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Intel\WiFi\bin\ZeroConfigService.exe[1360] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8593a177a 4 bytes [3A, 59, F8, 07]
.text C:\Program Files\Intel\WiFi\bin\ZeroConfigService.exe[1360] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8593a1782 4 bytes [3A, 59, F8, 07]
.text C:\Windows\system32\svchost.exe[2416] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\wbem\unsecapp.exe[2464] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\wbem\wmiprvse.exe[2584] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8593a177a 4 bytes [3A, 59, F8, 07]
.text C:\Windows\system32\wbem\wmiprvse.exe[2584] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8593a1782 4 bytes [3A, 59, F8, 07]
.text C:\Windows\system32\wbem\wmiprvse.exe[2584] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 690 000007f8538d1532 4 bytes [8D, 53, F8, 07]
.text C:\Windows\system32\wbem\wmiprvse.exe[2584] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 698 000007f8538d153a 4 bytes [8D, 53, F8, 07]
.text C:\Windows\system32\wbem\wmiprvse.exe[2584] C:\Windows\SYSTEM32\MSIMG32.dll!TransparentBlt + 246 000007f8538d165a 4 bytes [8D, 53, F8, 07]
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\system32\svchost.exe[2544] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\system32\SearchIndexer.exe[3784] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe[4864] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe[5084] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 690 000007f8538d1532 4 bytes [8D, 53, F8, 07]
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 698 000007f8538d153a 4 bytes [8D, 53, F8, 07]
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\MSIMG32.dll!TransparentBlt + 246 000007f8538d165a 4 bytes [8D, 53, F8, 07]
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Program Files (x86)\Realtek\Realtek USB 2.0 Card Reader\RIconMan.exe[2980] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\system32\csrss.exe[1964] C:\Windows\SYSTEM32\kernel32.dll!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\System32\WinLogon.exe[4636] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\System32\dwm.exe[4320] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\Explorer.EXE[4964] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\Explorer.EXE[4964] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\Explorer.EXE[4964] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\Explorer.EXE[4964] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\Explorer.EXE[4964] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\Explorer.EXE[4964] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\user32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\user32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\user32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\user32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\system32\taskhostex.exe[4024] C:\Windows\SYSTEM32\user32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Program Files\IDT\WDM\sttray64.exe[3492] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8593a177a 4 bytes [3A, 59, F8, 07]
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8593a1782 4 bytes [3A, 59, F8, 07]
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3772] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8593a177a 4 bytes [3A, 59, F8, 07]
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8593a1782 4 bytes [3A, 59, F8, 07]
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPHELPER.EXE[2212] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8593a177a 4 bytes [3A, 59, F8, 07]
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8593a1782 4 bytes [3A, 59, F8, 07]
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 690 000007f8538d1532 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 698 000007f8538d153a 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\MSIMG32.dll!TransparentBlt + 246 000007f8538d165a 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Program Files\Dell\QuickSet\quickset.exe[5492] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 690 000007f8538d1532 4 bytes [8D, 53, F8, 07]
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 698 000007f8538d153a 4 bytes [8D, 53, F8, 07]
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\MSIMG32.dll!TransparentBlt + 246 000007f8538d165a 4 bytes [8D, 53, F8, 07]
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\System32\rundll32.exe[5048] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 690 000007f8538d1532 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 698 000007f8538d153a 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\MSIMG32.dll!TransparentBlt + 246 000007f8538d165a 4 bytes [8D, 53, F8, 07]
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Program Files\Intel\CCDashboard\bin\CCDashServer.exe[3188] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\System32\igfxtray.exe[2884] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\System32\hkcmd.exe[3284] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 306 000007f8593a177a 4 bytes [3A, 59, F8, 07]
.text C:\Windows\System32\igfxpers.exe[2380] C:\Windows\system32\PSAPI.DLL!GetProcessImageFileNameA + 314 000007f8593a1782 4 bytes [3A, 59, F8, 07]
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Program Files (x86)\Dell Backup and Recovery\Components\Shell\DBRCrawler.exe[3148] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\system32\conhost.exe[3088] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\system32\wwahost.exe[3252] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Windows\System32\RuntimeBroker.exe[5288] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtAllocateVirtualMemory 000007f85b182d60 5 bytes JMP 000007f8db350b14
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtFreeVirtualMemory 000007f85b182dc0 5 bytes JMP 000007f8db350ecc
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtTerminateProcess 000007f85b182ea0 5 bytes JMP 000007f8db35163c
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtProtectVirtualMemory 000007f85b1830e0 5 bytes JMP 000007f8db351284
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 000007f85b184251 5 bytes JMP 000007f8db3519f4
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!LdrUnloadDll 000007f85b194a10 5 bytes JMP 000007f8db35075c
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f85b1b31c4 5 bytes JMP 000007f8db3503a4
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\sechost.dll!DeleteService 000007f858927510 5 bytes JMP 000007f8d8970b14
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2W 000007f858927550 5 bytes JMP 000007f8d89719f4
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\sechost.dll!CreateServiceW 000007f8589275d0 5 bytes JMP 000007f8d897075c
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigW 000007f858927b20 5 bytes JMP 000007f8d8971284
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\sechost.dll!CreateServiceA 000007f85894b034 5 bytes JMP 000007f8d89703a4
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfig2A 000007f85894b2e4 5 bytes JMP 000007f8d897163c
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\sechost.dll!ChangeServiceConfigA 000007f85894b470 5 bytes JMP 000007f8d8970ecc
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\SYSTEM32\sechost.dll!SetServiceObjectSecurity 000007f85894b6d4 5 bytes JMP 000007f8d8971dac
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\system32\USER32.dll!UnhookWindowsHookEx 000007f858c82120 5 bytes JMP 000007f8d8dd1284
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f858c8bee0 5 bytes JMP 000007f8d8dd0ecc
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\system32\USER32.dll!UnhookWinEvent 000007f858c8e030 5 bytes JMP 000007f8d8dd075c
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\system32\USER32.dll!SetWinEventHook 000007f858c92f70 5 bytes JMP 000007f8d8dd03a4
.text C:\Program Files\WindowsApps\microsoft.windowsphotos_16.4.4388.928_x64__8wekyb3d8bbwe\LiveComm.exe[4416] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f858cb1850 5 bytes JMP 000007f8d8dd0b14
.text C:\Windows\system32\AUDIODG.EXE[1600] C:\Windows\SYSTEM32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\SearchProtocolHost.exe[5416] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
.text C:\Windows\system32\SearchFilterHost.exe[2016] C:\Windows\system32\KERNEL32.DLL!GetBinaryTypeW + 163 000007f858b4f7eb 1 byte [62]
---- Threads - GMER 2.1 ----
Thread C:\Windows\system32\csrss.exe [1964:488] fffff960009055e8
---- Disk sectors - GMER 2.1 ----
Disk \Device\Harddisk0\DR0 unknown MBR code
---- EOF - GMER 2.1 ---- Ich hoffe, so ist es besser! :)
Danke fürs helfen!
Lg!
Asmaron |