Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Redirects, and MalwareBytes blocked on startup - Vista 32


  • Please log in to reply
23 replies to this topic

#1 easymac

easymac

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:17 PM

Posted 30 July 2011 - 05:17 PM

Hey, I've been getting google redirects from almost every website (clicking on Cached can bypass in most cases). MalwareBytes generally blocks them from going through, but essentially every google link I click is bad. I think it started about 5 days ago, and since then I've downloaded MSE, MalwareBytes, updated some old programs, and run many anti-virus scans. The scans found a couple trojans which I'll list below. I've deleted them all but the searches still redirect.

The other symptoms I've noticed are some changes with my task bar icons. MS One Note is there now, which I never use, and even sketchier, an icon for a windows list of blocked start up programs now appears. When I run the mouse over it it displays MalwareBytes. I originally fell for it and clicked open, and it just lists all the programs that usually start up on boot (including MB) and they're all listed as enabled. MB runs fine if I start it normally, but whether this is malware or some legit windows process I've never seen before, it blocks MB every time I boot.

I run Vista 32bit, service pack 2, my browser is Firefox, and I don't currently use P2P (don't think I even installed one on this machine). Here are the notable finds from recent virus scans. I use MSE, MB, and sometimes Avast free.

On 7/26 Avast found and deleted
NlsData004c32.exe from system 32

And from MSE
Win32/Tracur.Q this was found and removed twice, 7/26 at 10:37 and 10:41 pm
then
Win32/Obfuscator.QG Same deal on 7/29 at 10:33 and 10:47

MBAM @ 7/27/2011 4:45:53 PM
Registry Keys Infected:
HKEY_CLASSES_ROOT\.fsharproj (Trojan.BHO) -> Quarantined and deleted successfully.

And Avast on 7/28
C\$Recycle.Bin\>numbers and dashes and numbers<\$RP3QU6U.exe

Most recent MalwareBytes quick scan is totally clean. Have had no results from TDSSkiller or RKill.

I would appreciate any help. My PC up till this point has run pretty well, and its worrying that I can't seem to fix the problem with my current anti-virus programs. Thanks for reading.

<Edit- My Temp Folder, or really anything in and including AppData is hidden. Not sure what, if any, other folders are hidden too.>

Edited by easymac, 30 July 2011 - 05:33 PM.


BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:17 AM

Posted 30 July 2011 - 05:33 PM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 easymac

easymac
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:17 PM

Posted 30 July 2011 - 06:05 PM

Thanks Broni. Here are the first 3 logs, and I will run GMER right after.

Results of screen317's Security Check version 0.99.7
Windows Vista Service Pack 2 (UAC is enabled)
Internet Explorer 7 Out of date!
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Enabled!
avast! Free Antivirus
Microsoft Security Essentials
WMI entry may not exist for antivirus; attempting automatic update.
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Java™ 6 Update 26
Java™ 6 Update 2
Java™ 6 Update 4
Java™ 6 Update 7
Out of date Java installed!
Adobe Flash Player 10.1.53.64
Adobe Reader 8.3.0
Out of date Adobe Reader installed!
Mozilla Thunderbird (2.0.0) Thunderbird Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Windows Defender MSMpEng.exe
Malwarebytes' Anti-Malware mbamservice.exe
Malwarebytes' Anti-Malware mbamgui.exe
Malwarebytes' Anti-Malware mbam.exe
Microsoft Security Essentials msseces.exe
Microsoft Security Client Antimalware MsMpEng.exe
Microsoft Security Client Antimalware NisSrv.exe
Alwil Software Avast5 AvastSvc.exe
Alwil Software Avast5 AvastUI.exe
``````````End of Log````````````

---------------------------

MiniToolBox by Farbar
Ran by Ben (administrator) on 30-07-2011 at 18:51:03
Windows Vista ™ Home Premium Service Pack 2 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================


::1 localhost


========================= IP Configuration: ================================

# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration



Windows IP Configuration

Host Name . . . . . . . . . . . . : Ben-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Wireless LAN adapter Wireless Network Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel® Wireless WiFi Link 4965AGN
Physical Address. . . . . . . . . : 00-21-5C-28-CC-45
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::fce9:d394:c38f:af4%11(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.104(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Saturday, July 30, 2011 1:16:53 AM
Lease Expires . . . . . . . . . . : Sunday, July 31, 2011 4:42:11 PM
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 352330076
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-10-0E-0A-55-00-1D-72-68-53-15
DNS Servers . . . . . . . . . . . : 192.168.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : ddns.umass.edu
Description . . . . . . . . . . . : Marvell Yukon 88E8039 PCI-E Fast Ethernet Controller
Physical Address. . . . . . . . . : 00-1D-72-68-53-15
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 7:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{BB075C8F-085A-40B6-9215-5DF2E2C3F6C9}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 6:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 02-00-54-55-4E-01
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2001:0:4137:9e76:c73:1e4e:3f57:fe97(Preferred)
Link-local IPv6 Address . . . . . : fe80::c73:1e4e:3f57:fe97%13(Preferred)
Default Gateway . . . . . . . . . : ::
NetBIOS over Tcpip. . . . . . . . : Disabled

Tunnel adapter Local Area Connection* 11:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 6TO4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 12:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.ddns.umass.edu
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Server: UnKnown
Address: 192.168.1.1

Name: google.com
Addresses: 74.125.115.99
74.125.115.106
74.125.115.103
74.125.115.147
74.125.115.104
74.125.115.105



Pinging google.com [74.125.93.147] with 32 bytes of data:

Reply from 74.125.93.147: bytes=32 time=81ms TTL=50

Reply from 74.125.93.147: bytes=32 time=79ms TTL=50



Ping statistics for 74.125.93.147:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 79ms, Maximum = 81ms, Average = 80ms

Server: UnKnown
Address: 192.168.1.1

Name: yahoo.com
Addresses: 72.30.2.43
98.137.149.56
209.191.122.70
67.195.160.76
69.147.125.65



Pinging yahoo.com [67.195.160.76] with 32 bytes of data:

Reply from 67.195.160.76: bytes=32 time=24ms TTL=51

Reply from 67.195.160.76: bytes=32 time=30ms TTL=51



Ping statistics for 67.195.160.76:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 24ms, Maximum = 30ms, Average = 27ms



Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time=8ms TTL=128

Reply from 127.0.0.1: bytes=32 time=2ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 2ms, Maximum = 8ms, Average = 5ms

===========================================================================
Interface List
11 ...00 21 5c 28 cc 45 ...... Intel® Wireless WiFi Link 4965AGN
10 ...00 1d 72 68 53 15 ...... Marvell Yukon 88E8039 PCI-E Fast Ethernet Controller
1 ........................... Software Loopback Interface 1
15 ...00 00 00 00 00 00 00 e0 isatap.{BB075C8F-085A-40B6-9215-5DF2E2C3F6C9}
13 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
12 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
14 ...00 00 00 00 00 00 00 e0 isatap.ddns.umass.edu
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.104 25
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.1.0 255.255.255.0 On-link 192.168.1.104 281
192.168.1.104 255.255.255.255 On-link 192.168.1.104 281
192.168.1.255 255.255.255.255 On-link 192.168.1.104 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.104 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.104 281
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
13 18 ::/0 On-link
1 306 ::1/128 On-link
13 18 2001::/32 On-link
13 266 2001:0:4137:9e76:c73:1e4e:3f57:fe97/128
On-link
11 281 fe80::/64 On-link
13 266 fe80::/64 On-link
13 266 fe80::c73:1e4e:3f57:fe97/128
On-link
11 281 fe80::fce9:d394:c38f:af4/128
On-link
1 306 ff00::/8 On-link
13 266 ff00::/8 On-link
11 281 ff00::/8 On-link
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/30/2011 05:06:39 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (07/30/2011 04:52:22 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (07/30/2011 04:42:45 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (07/30/2011 01:18:25 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (07/29/2011 11:00:35 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (07/29/2011 11:00:35 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (07/29/2011 11:00:31 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (07/29/2011 11:00:31 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (07/29/2011 10:58:42 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (07/29/2011 10:50:36 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.


System errors:
=============
Error: (07/30/2011 01:18:25 AM) (Source: Service Control Manager) (User: )
Description: Parallel port driver%%1058

Error: (07/29/2011 03:29:35 AM) (Source: Service Control Manager) (User: )
Description: Parallel port driver%%1058

Error: (07/29/2011 03:11:49 AM) (Source: Service Control Manager) (User: )
Description: Windows Search%%1053

Error: (07/29/2011 03:11:49 AM) (Source: Service Control Manager) (User: )
Description: 30000Windows Search

Error: (07/29/2011 03:11:49 AM) (Source: Service Control Manager) (User: )
Description: Windows Search%%1053

Error: (07/29/2011 03:11:49 AM) (Source: Service Control Manager) (User: )
Description: 30000Windows Search

Error: (07/29/2011 03:11:11 AM) (Source: Service Control Manager) (User: )
Description: Windows Search%%1053

Error: (07/29/2011 03:11:11 AM) (Source: Service Control Manager) (User: )
Description: 30000Windows Search

Error: (07/29/2011 03:10:23 AM) (Source: Service Control Manager) (User: )
Description: Windows Search%%1053

Error: (07/29/2011 03:10:23 AM) (Source: Service Control Manager) (User: )
Description: 30000Windows Search


Microsoft Office Sessions:
=========================

========================= Memory info: ===================================

Percentage of memory in use: 42%
Total physical RAM: 3061.61 MB
Available physical RAM: 1748.13 MB
Total Pagefile: 6325.49 MB
Available Pagefile: 4666.7 MB
Total Virtual: 2047.88 MB
Available Virtual: 1965.44 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:221.19 GB) (Free:81.46 GB) NTFS
2 Drive d: (HP_RECOVERY) (Fixed) (Total:11.69 GB) (Free:2 GB) NTFS

========================= Users: ========================================

User accounts for \\BEN-PC

Administrator ASPNET Ben
Guest


== End of log ==

---------------

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7331

Windows 6.0.6002 Service Pack 2
Internet Explorer 7.0.6002.18005

7/30/2011 6:59:18 PM
mbam-log-2011-07-30 (18-59-18).txt

Scan type: Quick scan
Objects scanned: 170907
Time elapsed: 5 minute(s), 21 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:17 AM

Posted 30 July 2011 - 06:16 PM

You're running two AV programs:
avast! Free Antivirus
Microsoft Security Essentials

One of them has to go.
Your choice.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 easymac

easymac
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:17 PM

Posted 30 July 2011 - 06:24 PM

Yeah, since I got MSE I've been trying to keep it so only one is running real time protection, but its not the most efficient idea. I'll get rid of avast. Uninstall it completely?

#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:17 AM

Posted 30 July 2011 - 06:33 PM

Yes please...

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 easymac

easymac
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:17 PM

Posted 30 July 2011 - 08:28 PM

GMER reply log:

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-07-30 21:17:04
Windows 6.0.6002 Service Pack 2 Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-0 Hitachi_ rev.BBFO
Running: z62pvbi7.exe; Driver: C:\Users\Ben\AppData\Local\Temp\uwldqpow.sys


---- System - GMER 1.0.15 ----

SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwAddBootEntry [0x8F6D5202]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwCreateEvent [0x8F6D77F0]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwCreateEventPair [0x8F6D7848]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwCreateIoCompletion [0x8F6D795E]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwCreateMutant [0x8F6D7746]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwCreateSection [0x8F6D7898]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwCreateSemaphore [0x8F6D779A]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwCreateTimer [0x8F6D790C]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwDeleteBootEntry [0x8F6D5226]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwLoadDriver [0x8F6D4FF0]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwModifyBootEntry [0x8F6D524A]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwNotifyChangeKey [0x8F6D7D56]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwNotifyChangeMultipleKeys [0x8F6D5CDA]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwOpenEvent [0x8F6D7820]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwOpenEventPair [0x8F6D7870]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwOpenIoCompletion [0x8F6D7988]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwOpenMutant [0x8F6D7772]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwOpenSection [0x8F6D78D8]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwOpenSemaphore [0x8F6D77C8]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwOpenTimer [0x8F6D7936]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwQueryObject [0x8F6D5BA0]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwSetBootEntryOrder [0x8F6D526E]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwSetBootOptions [0x8F6D5292]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwSetSystemInformation [0x8F6D504A]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwSetSystemPowerState [0x8F6D5186]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwShutdownSystem [0x8F6D5162]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwSystemDebugControl [0x8F6D51AA]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS ZwVdmControl [0x8F6D52B6]

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!KeSetEvent + 10D 826E0890 4 Bytes [02, 52, 6D, 8F]
.text ntkrnlpa.exe!KeSetEvent + 1D1 826E0954 8 Bytes [F0, 77, 6D, 8F, 48, 78, 6D, ...]
.text ntkrnlpa.exe!KeSetEvent + 1DD 826E0960 4 Bytes [5E, 79, 6D, 8F]
.text ntkrnlpa.exe!KeSetEvent + 1F5 826E0978 4 Bytes [46, 77, 6D, 8F]
.text ntkrnlpa.exe!KeSetEvent + 215 826E0998 8 Bytes [98, 78, 6D, 8F, 9A, 77, 6D, ...]
.text ...
PAGE ntkrnlpa.exe!ZwReplyWaitReceivePortEx + 110 8286DE18 4 Bytes CALL 8F6D634B \SystemRoot\System32\Drivers\aswSnx.SYS
PAGE ntkrnlpa.exe!ZwAlpcSendWaitReceivePort + 121 82871A8C 4 Bytes CALL 8F6D6361 \SystemRoot\System32\Drivers\aswSnx.SYS
? System32\Drivers\aswSnx.SYS The system cannot find the path specified. !
? System32\Drivers\aswTdi.SYS The system cannot find the path specified. !
? System32\Drivers\aswRdr.SYS The system cannot find the path specified. !
? System32\Drivers\aswSP.SYS The system cannot find the path specified. !
.text win32k.sys!EngCreateRectRgn + 4537 97E1FC80 5 Bytes JMP 8F6D8440 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngCreatePalette + C20 97E38EA9 5 Bytes JMP 8F6D8E0C \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngTransparentBlt + 4A1 97E39C95 5 Bytes JMP 8F6D8F72 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngTransparentBlt + 8C03 97E423F7 5 Bytes JMP 8F6D7D8C \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!XLATEOBJ_iXlate + 616 97E4334E 5 Bytes JMP 8F6D8BD8 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!XFORMOBJ_iGetXform + 3103 97E4EA94 5 Bytes JMP 8F6D8316 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!XFORMOBJ_iGetXform + 456E 97E4FEFF 5 Bytes JMP 8F6D7F34 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngMapFontFileFD + 119C6 97E69A35 5 Bytes JMP 8F6D8180 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngMapFontFileFD + 11A1A 97E69A89 5 Bytes JMP 8F6D8326 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngGradientFill + 377F 97E90A8E 5 Bytes JMP 8F6D8B64 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngGradientFill + 60DE 97E933ED 5 Bytes JMP 8F6D7E58 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngMulDiv + 4D3F 97E99D2E 5 Bytes JMP 8F6D7FA4 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngStretchBlt + 2B42 97EA41CC 5 Bytes JMP 8F6D9014 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngStrokePath + 5FF 97EA70B4 5 Bytes JMP 8F6D7E70 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngNineGrid + 81C 97EC54E5 5 Bytes JMP 8F6D8D54 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngNineGrid + 6EEA 97ECBBB3 5 Bytes JMP 8F6D8BAE \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngCopyBits + B0F 97ECF32A 5 Bytes JMP 8F6D8CA2 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!STROBJ_vEnumStart + 4728 97ED6C49 5 Bytes JMP 8F6D7EF0 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngDeleteSemaphore + E80 97EF51BC 5 Bytes JMP 8F6D80AE \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!CLIPOBJ_bEnum + 248 97EFAA3A 5 Bytes JMP 8F6D8008 \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngPlgBlt + 26D9 97EFE572 5 Bytes JMP 8F6D8ECA \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngLineTo + A0F 97F1CA97 5 Bytes JMP 8F6D803E \SystemRoot\System32\Drivers\aswSnx.SYS
.text win32k.sys!EngLineTo + D269 97F292F1 5 Bytes JMP 8F6D80E8 \SystemRoot\System32\Drivers\aswSnx.SYS
? C:\Windows\system32\drivers\aswMonFlt.sys The system cannot find the file specified. !
? System32\Drivers\aswFsBlk.SYS The system cannot find the path specified. !

---- User code sections - GMER 1.0.15 ----

.text C:\Windows\system32\svchost.exe[12] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[12] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[12] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\svchost.exe[12] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[12] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[12] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[12] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[12] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[12] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[12] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[12] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[12] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00970600
.text C:\Windows\system32\svchost.exe[12] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00970804
.text C:\Windows\system32\svchost.exe[12] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00970A08
.text C:\Windows\system32\svchost.exe[12] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 009701F8
.text C:\Windows\system32\svchost.exe[12] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 009703FC
.text C:\Windows\System32\spoolsv.exe[432] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000901F8
.text C:\Windows\System32\spoolsv.exe[432] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000903FC
.text C:\Windows\System32\spoolsv.exe[432] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\System32\spoolsv.exe[432] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000B03FC
.text C:\Windows\System32\spoolsv.exe[432] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 000B0600
.text C:\Windows\System32\spoolsv.exe[432] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 000B1014
.text C:\Windows\System32\spoolsv.exe[432] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 000B0804
.text C:\Windows\System32\spoolsv.exe[432] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 000B0A08
.text C:\Windows\System32\spoolsv.exe[432] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 000B0C0C
.text C:\Windows\System32\spoolsv.exe[432] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 000B0E10
.text C:\Windows\System32\spoolsv.exe[432] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000B01F8
.text C:\Windows\System32\spoolsv.exe[432] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 009A0600
.text C:\Windows\System32\spoolsv.exe[432] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 009A0804
.text C:\Windows\System32\spoolsv.exe[432] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 009A0A08
.text C:\Windows\System32\spoolsv.exe[432] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 009A01F8
.text C:\Windows\System32\spoolsv.exe[432] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 009A03FC
.text C:\Windows\system32\svchost.exe[584] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[584] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[584] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\svchost.exe[584] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[584] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[584] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[584] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[584] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[584] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[584] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[584] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[584] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 000D0600
.text C:\Windows\system32\svchost.exe[584] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 000D0804
.text C:\Windows\system32\svchost.exe[584] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 000D0A08
.text C:\Windows\system32\svchost.exe[584] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000D01F8
.text C:\Windows\system32\svchost.exe[584] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000D03FC
.text C:\Windows\system32\csrss.exe[632] KERNEL32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\wininit.exe[672] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000301F8
.text C:\Windows\system32\wininit.exe[672] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000303FC
.text C:\Windows\system32\wininit.exe[672] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\wininit.exe[672] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000503FC
.text C:\Windows\system32\wininit.exe[672] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00050600
.text C:\Windows\system32\wininit.exe[672] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00051014
.text C:\Windows\system32\wininit.exe[672] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00050804
.text C:\Windows\system32\wininit.exe[672] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00050A08
.text C:\Windows\system32\wininit.exe[672] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00050C0C
.text C:\Windows\system32\wininit.exe[672] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00050E10
.text C:\Windows\system32\wininit.exe[672] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000501F8
.text C:\Windows\system32\wininit.exe[672] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00060600
.text C:\Windows\system32\wininit.exe[672] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00060804
.text C:\Windows\system32\wininit.exe[672] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00060A08
.text C:\Windows\system32\wininit.exe[672] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000601F8
.text C:\Windows\system32\wininit.exe[672] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000603FC
.text C:\Windows\system32\csrss.exe[684] KERNEL32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\services.exe[716] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\services.exe[716] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\services.exe[716] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\services.exe[716] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\services.exe[716] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\services.exe[716] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\services.exe[716] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\services.exe[716] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\services.exe[716] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\services.exe[716] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\services.exe[716] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\services.exe[716] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00080600
.text C:\Windows\system32\services.exe[716] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00080804
.text C:\Windows\system32\services.exe[716] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\services.exe[716] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\services.exe[716] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000803FC
.text C:\Windows\system32\lsass.exe[728] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\lsass.exe[728] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\lsass.exe[728] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\lsass.exe[728] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000803FC
.text C:\Windows\system32\lsass.exe[728] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00080600
.text C:\Windows\system32\lsass.exe[728] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00081014
.text C:\Windows\system32\lsass.exe[728] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00080804
.text C:\Windows\system32\lsass.exe[728] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00080A08
.text C:\Windows\system32\lsass.exe[728] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00080C0C
.text C:\Windows\system32\lsass.exe[728] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00080E10
.text C:\Windows\system32\lsass.exe[728] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000801F8
.text C:\Windows\system32\lsass.exe[728] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 000D0600
.text C:\Windows\system32\lsass.exe[728] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 000D0804
.text C:\Windows\system32\lsass.exe[728] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 000D0A08
.text C:\Windows\system32\lsass.exe[728] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000D01F8
.text C:\Windows\system32\lsass.exe[728] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000D03FC
.text C:\Windows\system32\lsm.exe[736] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\lsm.exe[736] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\lsm.exe[736] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\lsm.exe[736] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000B03FC
.text C:\Windows\system32\lsm.exe[736] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 000B0600
.text C:\Windows\system32\lsm.exe[736] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 000B1014
.text C:\Windows\system32\lsm.exe[736] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 000B0804
.text C:\Windows\system32\lsm.exe[736] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 000B0A08
.text C:\Windows\system32\lsm.exe[736] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 000B0C0C
.text C:\Windows\system32\lsm.exe[736] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 000B0E10
.text C:\Windows\system32\lsm.exe[736] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000B01F8
.text C:\Windows\system32\winlogon.exe[800] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000301F8
.text C:\Windows\system32\winlogon.exe[800] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000303FC
.text C:\Windows\system32\winlogon.exe[800] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\winlogon.exe[800] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000903FC
.text C:\Windows\system32\winlogon.exe[800] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00090600
.text C:\Windows\system32\winlogon.exe[800] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00091014
.text C:\Windows\system32\winlogon.exe[800] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00090804
.text C:\Windows\system32\winlogon.exe[800] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00090A08
.text C:\Windows\system32\winlogon.exe[800] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00090C0C
.text C:\Windows\system32\winlogon.exe[800] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00090E10
.text C:\Windows\system32\winlogon.exe[800] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000901F8
.text C:\Windows\system32\winlogon.exe[800] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 000A0600
.text C:\Windows\system32\winlogon.exe[800] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 000A0804
.text C:\Windows\system32\winlogon.exe[800] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 000A0A08
.text C:\Windows\system32\winlogon.exe[800] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000A01F8
.text C:\Windows\system32\winlogon.exe[800] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000A03FC
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001601F8
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001603FC
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00180600
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00180804
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00180A08
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001801F8
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[888] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001803FC
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000E01F8
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000E03FC
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001003FC
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00100600
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00101014
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00100804
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00100A08
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00100C0C
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00100E10
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001001F8
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00110600
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00110804
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00110A08
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001101F8
.text C:\Program Files\Bonjour\mDNSResponder.exe[920] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001103FC
.text C:\Windows\system32\svchost.exe[924] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000901F8
.text C:\Windows\system32\svchost.exe[924] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000903FC
.text C:\Windows\system32\svchost.exe[924] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\svchost.exe[924] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000B03FC
.text C:\Windows\system32\svchost.exe[924] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 000B0600
.text C:\Windows\system32\svchost.exe[924] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 000B1014
.text C:\Windows\system32\svchost.exe[924] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 000B0804
.text C:\Windows\system32\svchost.exe[924] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 000B0A08
.text C:\Windows\system32\svchost.exe[924] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 000B0C0C
.text C:\Windows\system32\svchost.exe[924] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 000B0E10
.text C:\Windows\system32\svchost.exe[924] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000B01F8
.text C:\Windows\system32\svchost.exe[924] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00C30600
.text C:\Windows\system32\svchost.exe[924] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00C30804
.text C:\Windows\system32\svchost.exe[924] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00C30A08
.text C:\Windows\system32\svchost.exe[924] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 00C301F8
.text C:\Windows\system32\svchost.exe[924] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 00C303FC
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00160600
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00160804
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00160A08
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001601F8
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001603FC
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.exe[992] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Windows\system32\svchost.exe[996] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[996] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[996] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\svchost.exe[996] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[996] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[996] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[996] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[996] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[996] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[996] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[996] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[996] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 001E0600
.text C:\Windows\system32\svchost.exe[996] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 001E0804
.text C:\Windows\system32\svchost.exe[996] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 001E0A08
.text C:\Windows\system32\svchost.exe[996] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001E01F8
.text C:\Windows\system32\svchost.exe[996] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001E03FC
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00070600
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00070804
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00070A08
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000701F8
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000703FC
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000803FC
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00080600
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00081014
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00080804
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00080A08
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00080C0C
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00080E10
.text c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe[1056] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000801F8
.text C:\Windows\System32\svchost.exe[1136] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\System32\svchost.exe[1136] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\System32\svchost.exe[1136] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\System32\svchost.exe[1136] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00160600
.text C:\Windows\System32\svchost.exe[1136] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00160804
.text C:\Windows\System32\svchost.exe[1136] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00160A08
.text C:\Windows\System32\svchost.exe[1136] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001601F8
.text C:\Windows\System32\svchost.exe[1136] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001603FC
.text C:\Windows\System32\svchost.exe[1160] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\System32\svchost.exe[1160] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\System32\svchost.exe[1160] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\System32\svchost.exe[1160] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\System32\svchost.exe[1160] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\System32\svchost.exe[1160] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\System32\svchost.exe[1160] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\System32\svchost.exe[1160] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\System32\svchost.exe[1160] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\System32\svchost.exe[1160] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\System32\svchost.exe[1160] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\System32\svchost.exe[1160] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00C10600
.text C:\Windows\System32\svchost.exe[1160] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00C10804
.text C:\Windows\System32\svchost.exe[1160] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00C10A08
.text C:\Windows\System32\svchost.exe[1160] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 00C101F8
.text C:\Windows\System32\svchost.exe[1160] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 00C103FC
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[1172] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[1172] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\svchost.exe[1172] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[1172] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[1172] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[1172] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[1172] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[1172] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[1172] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[1172] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 000C0600
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 000C0804
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 000C0A08
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000C01F8
.text C:\Windows\system32\svchost.exe[1172] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000C03FC
.text C:\Windows\system32\AUDIODG.EXE[1276] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\Explorer.EXE[1336] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000901F8
.text C:\Windows\Explorer.EXE[1336] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000903FC
.text C:\Windows\Explorer.EXE[1336] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\Explorer.EXE[1336] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000B03FC
.text C:\Windows\Explorer.EXE[1336] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 000B0600
.text C:\Windows\Explorer.EXE[1336] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 000B1014
.text C:\Windows\Explorer.EXE[1336] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 000B0804
.text C:\Windows\Explorer.EXE[1336] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 000B0A08
.text C:\Windows\Explorer.EXE[1336] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 000B0C0C
.text C:\Windows\Explorer.EXE[1336] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 000B0E10
.text C:\Windows\Explorer.EXE[1336] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000B01F8
.text C:\Windows\Explorer.EXE[1336] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 000C0600
.text C:\Windows\Explorer.EXE[1336] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 000C0804
.text C:\Windows\Explorer.EXE[1336] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 000C0A08
.text C:\Windows\Explorer.EXE[1336] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000C01F8
.text C:\Windows\Explorer.EXE[1336] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000C03FC
.text C:\Windows\System32\svchost.exe[1364] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\System32\svchost.exe[1364] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\System32\svchost.exe[1364] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\System32\svchost.exe[1364] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\System32\svchost.exe[1364] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\System32\svchost.exe[1364] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\System32\svchost.exe[1364] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\System32\svchost.exe[1364] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\System32\svchost.exe[1364] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\System32\svchost.exe[1364] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\System32\svchost.exe[1364] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\System32\svchost.exe[1364] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 009D0600
.text C:\Windows\System32\svchost.exe[1364] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 009D0804
.text C:\Windows\System32\svchost.exe[1364] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 009D0A08
.text C:\Windows\System32\svchost.exe[1364] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 009D01F8
.text C:\Windows\System32\svchost.exe[1364] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 009D03FC
.text C:\Program Files\iPod\bin\iPodService.exe[1448] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Program Files\iPod\bin\iPodService.exe[1448] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Program Files\iPod\bin\iPodService.exe[1448] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\iPod\bin\iPodService.exe[1448] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Program Files\iPod\bin\iPodService.exe[1448] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Program Files\iPod\bin\iPodService.exe[1448] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Program Files\iPod\bin\iPodService.exe[1448] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Program Files\iPod\bin\iPodService.exe[1448] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Program Files\iPod\bin\iPodService.exe[1448] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Program Files\iPod\bin\iPodService.exe[1448] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Program Files\iPod\bin\iPodService.exe[1448] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Program Files\iPod\bin\iPodService.exe[1448] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00180600
.text C:\Program Files\iPod\bin\iPodService.exe[1448] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00180804
.text C:\Program Files\iPod\bin\iPodService.exe[1448] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00180A08
.text C:\Program Files\iPod\bin\iPodService.exe[1448] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001801F8
.text C:\Program Files\iPod\bin\iPodService.exe[1448] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001803FC
.text C:\Windows\system32\svchost.exe[1512] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[1512] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[1512] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\svchost.exe[1512] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[1512] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[1512] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[1512] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[1512] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[1512] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[1512] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[1512] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[1512] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00160600
.text C:\Windows\system32\svchost.exe[1512] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00160804
.text C:\Windows\system32\svchost.exe[1512] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00160A08
.text C:\Windows\system32\svchost.exe[1512] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001601F8
.text C:\Windows\system32\svchost.exe[1512] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001603FC
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00080600
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00080804
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00080A08
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000801F8
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1572] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000803FC
.text C:\Windows\system32\svchost.exe[1604] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[1604] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[1604] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\svchost.exe[1604] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[1604] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[1604] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[1604] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[1604] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[1604] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[1604] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[1604] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[1604] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00B70600
.text C:\Windows\system32\svchost.exe[1604] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00B70804
.text C:\Windows\system32\svchost.exe[1604] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00B70A08
.text C:\Windows\system32\svchost.exe[1604] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 00B701F8
.text C:\Windows\system32\svchost.exe[1604] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 00B703FC
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00170600
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00170804
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00170A08
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001701F8
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001703FC
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001803FC
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00180600
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00181014
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00180804
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00180A08
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00180C0C
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00180E10
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[1844] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001801F8
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00170600
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00170804
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00170A08
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001701F8
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001703FC
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001803FC
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00180600
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00181014
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00180804
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00180A08
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00180C0C
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00180E10
.text C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[1872] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001801F8
.text C:\Windows\System32\svchost.exe[1880] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\System32\svchost.exe[1880] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\System32\svchost.exe[1880] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\System32\svchost.exe[1880] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\System32\svchost.exe[1880] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\System32\svchost.exe[1880] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\System32\svchost.exe[1880] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\System32\svchost.exe[1880] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\System32\svchost.exe[1880] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\System32\svchost.exe[1880] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\System32\svchost.exe[1880] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001401F8
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001403FC
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00160600
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00160804
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00160A08
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001601F8
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001603FC
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe[2064] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Windows\system32\taskeng.exe[2076] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\taskeng.exe[2076] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\taskeng.exe[2076] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\taskeng.exe[2076] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000B03FC
.text C:\Windows\system32\taskeng.exe[2076] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 000B0600
.text C:\Windows\system32\taskeng.exe[2076] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 000B1014
.text C:\Windows\system32\taskeng.exe[2076] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 000B0804
.text C:\Windows\system32\taskeng.exe[2076] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 000B0A08
.text C:\Windows\system32\taskeng.exe[2076] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 000B0C0C
.text C:\Windows\system32\taskeng.exe[2076] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 000B0E10
.text C:\Windows\system32\taskeng.exe[2076] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000B01F8
.text C:\Windows\system32\taskeng.exe[2076] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 000C0600
.text C:\Windows\system32\taskeng.exe[2076] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 000C0804
.text C:\Windows\system32\taskeng.exe[2076] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 000C0A08
.text C:\Windows\system32\taskeng.exe[2076] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000C01F8
.text C:\Windows\system32\taskeng.exe[2076] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000C03FC
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[2252] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[2252] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[2252] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00180600
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00180804
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00180A08
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001801F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2276] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001803FC
.text c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe[2296] KERNEL32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00170600
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00170804
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00170A08
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001701F8
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001703FC
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001803FC
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00180600
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00181014
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00180804
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00180A08
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00180C0C
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00180E10
.text C:\Program Files\CyberLink\Shared Files\RichVideo.exe[2340] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001801F8
.text C:\Windows\system32\svchost.exe[2376] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[2376] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[2376] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\svchost.exe[2376] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Windows\system32\svchost.exe[2376] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Windows\system32\svchost.exe[2376] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Windows\system32\svchost.exe[2376] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Windows\system32\svchost.exe[2376] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Windows\system32\svchost.exe[2376] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Windows\system32\svchost.exe[2376] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Windows\system32\svchost.exe[2376] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Windows\System32\svchost.exe[2404] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\System32\svchost.exe[2404] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\System32\svchost.exe[2404] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\System32\svchost.exe[2404] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\System32\svchost.exe[2404] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\System32\svchost.exe[2404] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\System32\svchost.exe[2404] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\System32\svchost.exe[2404] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\System32\svchost.exe[2404] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\System32\svchost.exe[2404] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\System32\svchost.exe[2404] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\SearchIndexer.exe[2432] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000D01F8
.text C:\Windows\system32\SearchIndexer.exe[2432] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000D03FC
.text C:\Windows\system32\SearchIndexer.exe[2432] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\SearchIndexer.exe[2432] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000F03FC
.text C:\Windows\system32\SearchIndexer.exe[2432] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 000F0600
.text C:\Windows\system32\SearchIndexer.exe[2432] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 000F1014
.text C:\Windows\system32\SearchIndexer.exe[2432] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 000F0804
.text C:\Windows\system32\SearchIndexer.exe[2432] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 000F0A08
.text C:\Windows\system32\SearchIndexer.exe[2432] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 000F0C0C
.text C:\Windows\system32\SearchIndexer.exe[2432] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 000F0E10
.text C:\Windows\system32\SearchIndexer.exe[2432] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000F01F8
.text C:\Windows\system32\SearchIndexer.exe[2432] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00100600
.text C:\Windows\system32\SearchIndexer.exe[2432] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00100804
.text C:\Windows\system32\SearchIndexer.exe[2432] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00100A08
.text C:\Windows\system32\SearchIndexer.exe[2432] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001001F8
.text C:\Windows\system32\SearchIndexer.exe[2432] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001003FC
.text C:\Program Files\Apoint2K\Apntex.exe[2476] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001401F8
.text C:\Program Files\Apoint2K\Apntex.exe[2476] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001403FC
.text C:\Program Files\Apoint2K\Apntex.exe[2476] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Apoint2K\Apntex.exe[2476] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00160600
.text C:\Program Files\Apoint2K\Apntex.exe[2476] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00160804
.text C:\Program Files\Apoint2K\Apntex.exe[2476] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00160A08
.text C:\Program Files\Apoint2K\Apntex.exe[2476] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001601F8
.text C:\Program Files\Apoint2K\Apntex.exe[2476] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001603FC
.text C:\Program Files\Apoint2K\Apntex.exe[2476] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Program Files\Apoint2K\Apntex.exe[2476] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Program Files\Apoint2K\Apntex.exe[2476] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Program Files\Apoint2K\Apntex.exe[2476] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Program Files\Apoint2K\Apntex.exe[2476] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Program Files\Apoint2K\Apntex.exe[2476] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Program Files\Apoint2K\Apntex.exe[2476] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Program Files\Apoint2K\Apntex.exe[2476] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001401F8
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001403FC
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001603FC
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00160600
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00161014
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00160804
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00160A08
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00160C0C
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00160E10
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001601F8
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00170600
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00170804
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00170A08
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001701F8
.text C:\Windows\system32\DRIVERS\xaudio.exe[2516] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001703FC
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00170600
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00170804
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00170A08
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001701F8
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001703FC
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001803FC
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00180600
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00181014
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00180804
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00180A08
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00180C0C
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00180E10
.text C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe[2552] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001801F8
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00170600
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00170804
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00170A08
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001701F8
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001703FC
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001803FC
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00180600
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00181014
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00180804
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00180A08
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00180C0C
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00180E10
.text C:\Program Files\Freecorder\FLVSrvc.exe[2584] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001801F8
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00180600
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00180804
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00180A08
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001801F8
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001803FC
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001903FC
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00190600
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00191014
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00190804
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00190A08
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00190C0C
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00190E10
.text C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe[2636] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001901F8
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001401F8
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001403FC
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00160600
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00160804
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00160A08
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001601F8
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001603FC
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe[2756] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Windows\System32\hkcmd.exe[2968] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Windows\System32\hkcmd.exe[2968] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Windows\System32\hkcmd.exe[2968] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\System32\hkcmd.exe[2968] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00180600
.text C:\Windows\System32\hkcmd.exe[2968] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00180804
.text C:\Windows\System32\hkcmd.exe[2968] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00180A08
.text C:\Windows\System32\hkcmd.exe[2968] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001801F8
.text C:\Windows\System32\hkcmd.exe[2968] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001803FC
.text C:\Windows\System32\hkcmd.exe[2968] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001903FC
.text C:\Windows\System32\hkcmd.exe[2968] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00190600
.text C:\Windows\System32\hkcmd.exe[2968] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00191014
.text C:\Windows\System32\hkcmd.exe[2968] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00190804
.text C:\Windows\System32\hkcmd.exe[2968] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00190A08
.text C:\Windows\System32\hkcmd.exe[2968] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00190C0C
.text C:\Windows\System32\hkcmd.exe[2968] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00190E10
.text C:\Windows\System32\hkcmd.exe[2968] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001901F8
.text C:\Windows\system32\igfxsrvc.exe[2984] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Windows\system32\igfxsrvc.exe[2984] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Windows\system32\igfxsrvc.exe[2984] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\igfxsrvc.exe[2984] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00180600
.text C:\Windows\system32\igfxsrvc.exe[2984] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00180804
.text C:\Windows\system32\igfxsrvc.exe[2984] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00180A08
.text C:\Windows\system32\igfxsrvc.exe[2984] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001801F8
.text C:\Windows\system32\igfxsrvc.exe[2984] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001803FC
.text C:\Windows\system32\igfxsrvc.exe[2984] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001903FC
.text C:\Windows\system32\igfxsrvc.exe[2984] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00190600
.text C:\Windows\system32\igfxsrvc.exe[2984] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00191014
.text C:\Windows\system32\igfxsrvc.exe[2984] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00190804
.text C:\Windows\system32\igfxsrvc.exe[2984] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00190A08
.text C:\Windows\system32\igfxsrvc.exe[2984] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00190C0C
.text C:\Windows\system32\igfxsrvc.exe[2984] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00190E10
.text C:\Windows\system32\igfxsrvc.exe[2984] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001901F8
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001401F8
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001403FC
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00160600
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00160804
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00160A08
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001601F8
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001603FC
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Program Files\HP\QuickPlay\QPService.exe[3064] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Windows\System32\igfxpers.exe[3108] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Windows\System32\igfxpers.exe[3108] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Windows\System32\igfxpers.exe[3108] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\System32\igfxpers.exe[3108] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00180600
.text C:\Windows\System32\igfxpers.exe[3108] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00180804
.text C:\Windows\System32\igfxpers.exe[3108] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00180A08
.text C:\Windows\System32\igfxpers.exe[3108] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001801F8
.text C:\Windows\System32\igfxpers.exe[3108] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001803FC
.text C:\Windows\System32\igfxpers.exe[3108] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001903FC
.text C:\Windows\System32\igfxpers.exe[3108] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00190600
.text C:\Windows\System32\igfxpers.exe[3108] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00191014
.text C:\Windows\System32\igfxpers.exe[3108] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00190804
.text C:\Windows\System32\igfxpers.exe[3108] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00190A08
.text C:\Windows\System32\igfxpers.exe[3108] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00190C0C
.text C:\Windows\System32\igfxpers.exe[3108] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00190E10
.text C:\Windows\System32\igfxpers.exe[3108] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001901F8
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00180600
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00180804
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00180A08
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001801F8
.text C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe[3120] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001803FC
.text C:\Program Files\Apoint2K\Apoint.exe[3240] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001401F8
.text C:\Program Files\Apoint2K\Apoint.exe[3240] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001403FC
.text C:\Program Files\Apoint2K\Apoint.exe[3240] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Apoint2K\Apoint.exe[3240] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00160600
.text C:\Program Files\Apoint2K\Apoint.exe[3240] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00160804
.text C:\Program Files\Apoint2K\Apoint.exe[3240] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00160A08
.text C:\Program Files\Apoint2K\Apoint.exe[3240] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001601F8
.text C:\Program Files\Apoint2K\Apoint.exe[3240] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001603FC
.text C:\Program Files\Apoint2K\Apoint.exe[3240] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Program Files\Apoint2K\Apoint.exe[3240] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Program Files\Apoint2K\Apoint.exe[3240] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Program Files\Apoint2K\Apoint.exe[3240] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Program Files\Apoint2K\Apoint.exe[3240] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Program Files\Apoint2K\Apoint.exe[3240] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Program Files\Apoint2K\Apoint.exe[3240] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Program Files\Apoint2K\Apoint.exe[3240] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000401F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000403FC
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000603FC
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00060600
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00061014
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00060804
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00060A08
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00060C0C
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00060E10
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000601F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00070600
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00070804
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00070A08
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000701F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[3316] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000703FC
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00080600
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00080804
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00080A08
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000801F8
.text C:\Program Files\Microsoft Security Client\msseces.exe[3324] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000803FC
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00080600
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00080804
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\wbem\wmiprvse.exe[3364] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000803FC
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00080600
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00080804
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00080A08
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000801F8
.text C:\Program Files\iTunes\iTunesHelper.exe[3372] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000803FC
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00170600
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00170804
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00170A08
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001701F8
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001703FC
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001803FC
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00180600
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00181014
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00180804
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00180A08
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00180C0C
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00180E10
.text C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe[3428] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001801F8
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00070600
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00070804
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00070A08
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000701F8
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000703FC
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000803FC
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00080600
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00081014
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00080804
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00080A08
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00080C0C
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00080E10
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[3456] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000801F8
.text C:\Program Files\Hewlett-Packard\HP Advisor\HPAdvisor.exe[3512] KERNEL32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00180600
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00180804
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00180A08
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001801F8
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe[3516] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001803FC
.text C:\Windows\System32\igfxtray.exe[3740] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Windows\System32\igfxtray.exe[3740] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Windows\System32\igfxtray.exe[3740] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\System32\igfxtray.exe[3740] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00280600
.text C:\Windows\System32\igfxtray.exe[3740] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00280804
.text C:\Windows\System32\igfxtray.exe[3740] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00280A08
.text C:\Windows\System32\igfxtray.exe[3740] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 002801F8
.text C:\Windows\System32\igfxtray.exe[3740] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 002803FC
.text C:\Windows\System32\igfxtray.exe[3740] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 002903FC
.text C:\Windows\System32\igfxtray.exe[3740] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00290600
.text C:\Windows\System32\igfxtray.exe[3740] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00291014
.text C:\Windows\System32\igfxtray.exe[3740] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00290804
.text C:\Windows\System32\igfxtray.exe[3740] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00290A08
.text C:\Windows\System32\igfxtray.exe[3740] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00290C0C
.text C:\Windows\System32\igfxtray.exe[3740] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00290E10
.text C:\Windows\System32\igfxtray.exe[3740] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 002901F8
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 001501F8
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 001503FC
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 001703FC
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00170600
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00171014
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00170804
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00170A08
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00170C0C
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00170E10
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 001701F8
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00180600
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00180804
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00180A08
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 001801F8
.text C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe[3772] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 001803FC
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000401F8
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000403FC
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00060600
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00060804
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00060A08
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000601F8
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000603FC
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN[3984] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\taskeng.exe[4000] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\taskeng.exe[4000] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\taskeng.exe[4000] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\taskeng.exe[4000] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\taskeng.exe[4000] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\taskeng.exe[4000] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\taskeng.exe[4000] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\taskeng.exe[4000] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\taskeng.exe[4000] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\taskeng.exe[4000] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\taskeng.exe[4000] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\taskeng.exe[4000] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00080600
.text C:\Windows\system32\taskeng.exe[4000] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00080804
.text C:\Windows\system32\taskeng.exe[4000] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\taskeng.exe[4000] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\taskeng.exe[4000] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000803FC
.text C:\Windows\system32\Dwm.exe[4052] ntdll.dll!LdrLoadDll 778E93A8 5 Bytes JMP 000501F8
.text C:\Windows\system32\Dwm.exe[4052] ntdll.dll!LdrUnloadDll 778FB740 5 Bytes JMP 000503FC
.text C:\Windows\system32\Dwm.exe[4052] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Windows\system32\Dwm.exe[4052] ADVAPI32.dll!CreateServiceW 76059EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\Dwm.exe[4052] ADVAPI32.dll!DeleteService 7605A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\Dwm.exe[4052] ADVAPI32.dll!SetServiceObjectSecurity 76096CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\Dwm.exe[4052] ADVAPI32.dll!ChangeServiceConfigA 76096DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\Dwm.exe[4052] ADVAPI32.dll!ChangeServiceConfigW 76096F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\Dwm.exe[4052] ADVAPI32.dll!ChangeServiceConfig2A 76097099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\Dwm.exe[4052] ADVAPI32.dll!ChangeServiceConfig2W 760971E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\Dwm.exe[4052] ADVAPI32.dll!CreateServiceA 760972A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\Dwm.exe[4052] USER32.dll!SetWindowsHookExA 765B6322 5 Bytes JMP 00080600
.text C:\Windows\system32\Dwm.exe[4052] USER32.dll!SetWindowsHookExW 765B87AD 5 Bytes JMP 00080804
.text C:\Windows\system32\Dwm.exe[4052] USER32.dll!UnhookWindowsHookEx 765B98DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\Dwm.exe[4052] USER32.dll!SetWinEventHook 765B9F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\Dwm.exe[4052] USER32.dll!UnhookWinEvent 765BC06F 5 Bytes JMP 000803FC
.text C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe[4772] KERNEL32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]
.text C:\Users\Ben\Desktop\z62pvbi7.exe[5996] kernel32.dll!GetBinaryTypeW + 70 768C2247 1 Byte [62]

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\Windows\system32\services.exe[716] @ C:\Windows\system32\services.exe [ADVAPI32.dll!CreateProcessAsUserW] 00250002
IAT C:\Windows\system32\services.exe[716] @ C:\Windows\system32\services.exe [KERNEL32.dll!CreateProcessW] 00250000
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusShutdown] [73477817] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCloneImage] [734CA86D] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDrawImageRectI] [7347BB22] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetInterpolationMode] [7346F695] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusStartup] [734775E9] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateFromHDC] [7346E7CA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStreamICM] [734A8395] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStream] [7347DA60] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageHeight] [7346FFFA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageWidth] [7346FF61] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDisposeImage] [734671CF] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFileICM] [734FCAE2] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFile] [7349C8D8] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDeleteGraphics] [7346D968] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipFree] [73466853] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipAlloc] [7346687E] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1336] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetCompositingMode] [73472AD1] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----

#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:17 AM

Posted 30 July 2011 - 11:20 PM

Download aswMBR to your desktop.
Double click the aswMBR.exe to run it.
Click the "Scan" button to start scan:
Posted Image

On completion of the scan click "Save log", save it to your desktop and post in your next reply:
Posted Image

NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

=======================================================

Please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can download, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 easymac

easymac
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:17 PM

Posted 31 July 2011 - 10:20 AM

aswMBR version 0.9.8.978 Copyright© 2011 AVAST Software
Run date: 2011-07-31 09:28:14
-----------------------------
09:28:14.652 OS Version: Windows 6.0.6002 Service Pack 2
09:28:14.652 Number of processors: 2 586 0xF0D
09:28:14.652 ComputerName: BEN-PC UserName: Ben
09:28:35.494 Initialize success
09:28:50.361 AVAST engine defs: 11073001
09:29:01.873 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-0
09:29:01.873 Disk 0 Vendor: Hitachi_ BBFO Size: 238475MB BusType: 3
09:29:01.905 Disk 0 MBR read successfully
09:29:01.905 Disk 0 MBR scan
09:29:01.920 Disk 0 unknown MBR code
09:29:01.920 Disk 0 scanning sectors +488392065
09:29:01.998 Disk 0 scanning C:\Windows\system32\drivers
09:29:26.989 Service scanning
09:29:28.050 Service MpKslcee497c8 c:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{63E50414-F1B3-4697-A182-8B9E5474C12C}\MpKslcee497c8.sys **LOCKED** 32
09:29:28.066 Service MpNWMon C:\Windows\system32\DRIVERS\MpNWMon.sys **LOCKED** 32
09:29:28.971 Modules scanning
09:29:42.331 Disk 0 trace - called modules:
09:29:42.367 ntkrnlpa.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll iaStor.sys
09:29:42.727 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x864503f8]
09:29:42.737 3 CLASSPNP.SYS[8ada08b3] -> nt!IofCallDriver -> [0x8592c760]
09:29:42.747 5 acpi.sys[8069e6bc] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-0[0x84f7b030]
09:29:43.935 AVAST engine scan C:\Windows
09:29:48.591 AVAST engine scan C:\Windows\system32
09:34:10.901 AVAST engine scan C:\Windows\system32\drivers
09:34:36.390 AVAST engine scan C:\Users\Ben
10:02:11.277 AVAST engine scan C:\ProgramData
10:05:31.295 Scan finished successfully
10:10:26.890 Disk 0 MBR has been saved successfully to "C:\Users\Ben\Desktop\MBR.dat"
10:10:26.905 The log file has been saved successfully to "C:\Users\Ben\Desktop\aswMBR.txt"

------------------------

RkU Version: 3.8.389.593, Type LE (SR2)
==============================================
OS Name: Windows Vista
Version 6.0.6002 (Service Pack 2)
Number of processors #2
==============================================
>Drivers
==============================================
0x8EE02000 C:\Windows\system32\DRIVERS\igdkmd32.sys 6516736 bytes (Intel Corporation, Intel Graphics Kernel Mode Driver)
0x8264A000 C:\Windows\system32\ntkrnlpa.exe 3907584 bytes (Microsoft Corporation, NT Kernel & System)
0x8264A000 PnpManager 3907584 bytes
0x8264A000 RAW 3907584 bytes
0x8264A000 WMIxWDM 3907584 bytes
0x8F607000 C:\Windows\system32\DRIVERS\NETw4v32.sys 2260992 bytes (Intel Corporation, Intel® Wireless WiFi Link Driver)
0x98C10000 Win32k 2113536 bytes
0x98C10000 C:\Windows\System32\win32k.sys 2113536 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0x8AC03000 C:\Windows\System32\Drivers\Ntfs.sys 1114112 bytes (Microsoft Corporation, NT File System Driver)
0x8A802000 C:\Windows\system32\drivers\ndis.sys 1093632 bytes (Microsoft Corporation, NDIS 6.0 wrapper driver)
0x8FC95000 C:\Windows\system32\DRIVERS\HSX_DPV.sys 1060864 bytes (Conexant Systems, Inc., HSF_DP driver)
0x8AA09000 C:\Windows\System32\drivers\tcpip.sys 970752 bytes (Microsoft Corporation, TCP/IP Driver)
0x804DD000 C:\Windows\system32\CI.dll 917504 bytes (Microsoft Corporation, Code Integrity Module)
0xAB800000 C:\Windows\system32\drivers\peauth.sys 909312 bytes (Microsoft Corporation, Protected Environment Authentication and Authorization Export Driver)
0x90091000 C:\Windows\System32\Drivers\dump_iaStor.sys 815104 bytes
0x8A60A000 C:\Windows\system32\DRIVERS\iaStor.sys 815104 bytes (Intel Corporation, Intel Matrix Storage Manager driver - ia32)
0x8FE0A000 C:\Windows\system32\DRIVERS\HSX_CNXT.sys 741376 bytes (Conexant Systems, Inc., HSF_CNXT driver)
0x8AB11000 C:\Windows\system32\drivers\spsys.sys 720896 bytes (Microsoft Corporation, security processor)
0x8F439000 C:\Windows\System32\drivers\dxgkrnl.sys 655360 bytes (Microsoft Corporation, DirectX Graphics Kernel)
0x8F53D000 C:\Windows\system32\DRIVERS\HDAudBus.sys 577536 bytes (Microsoft Corporation, High Definition Audio Bus Driver)
0x8060D000 C:\Windows\system32\drivers\Wdf01000.sys 507904 bytes (Microsoft Corporation, WDF Dynamic)
0x8A743000 C:\Windows\System32\Drivers\ksecdd.sys 462848 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0x80413000 C:\Windows\system32\mcupdate_GenuineIntel.dll 458752 bytes (Microsoft Corporation, Intel Microcode Update Library)
0xAAC0E000 C:\Windows\system32\drivers\HTTP.sys 446464 bytes (Microsoft Corporation, HTTP Protocol Stack)
0x8F88C000 C:\Windows\system32\DRIVERS\rixdptsk.sys 335872 bytes (REDC, RICOH XD SM Driver)
0xAAD7F000 C:\Windows\System32\DRIVERS\srv.sys 323584 bytes (Microsoft Corporation, Server driver)
0x8073F000 C:\Windows\System32\drivers\volmgrx.sys 303104 bytes (Microsoft Corporation, Volume Manager Extension Driver)
0x8FFA6000 C:\Windows\system32\drivers\afd.sys 294912 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0x80696000 C:\Windows\system32\drivers\acpi.sys 286720 bytes (Microsoft Corporation, ACPI Driver for NT)
0x8A973000 C:\Windows\system32\DRIVERS\yk60x86.sys 286720 bytes (Marvell, NDIS6.0 Miniport Driver for Marvell Yukon Ethernet Controller)
0x8049C000 C:\Windows\system32\CLFS.SYS 266240 bytes (Microsoft Corporation, Common Log File System Driver)
0x8F986000 C:\Windows\system32\DRIVERS\storport.sys 266240 bytes (Microsoft Corporation, Microsoft Storage Port Driver)
0x8FC57000 C:\Windows\system32\DRIVERS\HSXHWAZL.sys 253952 bytes (Conexant Systems, Inc., HSF_HWAZL WDM driver)
0x8F4F0000 C:\Windows\system32\DRIVERS\USBPORT.SYS 253952 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0x90021000 C:\Windows\system32\DRIVERS\rdbss.sys 245760 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0x8A938000 C:\Windows\system32\drivers\NETIO.SYS 241664 bytes (Microsoft Corporation, Network I/O Subsystem)
0xAAD06000 C:\Windows\system32\DRIVERS\mrxsmb10.sys 233472 bytes (Microsoft Corporation, Longhorn SMB Downlevel SubRdr)
0x8AD13000 C:\Windows\system32\drivers\volsnap.sys 233472 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0x807AE000 C:\Windows\system32\DRIVERS\usbhub.sys 217088 bytes (Microsoft Corporation, Default Hub Driver for USB)
0x82617000 ACPI_HAL 208896 bytes
0x805BD000 C:\Windows\system32\drivers\CHDRT32.sys 208896 bytes (Conexant Systems Inc., High Definition Audio Function Driver)
0x82617000 C:\Windows\system32\hal.dll 208896 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0x8A701000 C:\Windows\system32\drivers\fltmgr.sys 204800 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0x8FD98000 C:\Windows\System32\DRIVERS\netbt.sys 204800 bytes (Microsoft Corporation, MBT Transport driver)
0x8F957000 C:\Windows\system32\DRIVERS\msiscsi.sys 192512 bytes (Microsoft Corporation, Microsoft iSCSI Initiator Driver)
0x8FC05000 C:\Windows\system32\drivers\portcls.sys 184320 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0x8A90D000 C:\Windows\system32\drivers\msrpc.sys 176128 bytes (Microsoft Corporation, Kernel Remote Procedure Call Provider)
0x8A7B4000 C:\Windows\system32\DRIVERS\ks.sys 172032 bytes (Microsoft Corporation, Kernel CSA Library)
0x9019C000 C:\Windows\system32\DRIVERS\nwifi.sys 172032 bytes (Microsoft Corporation, NativeWiFi Miniport Driver)
0x8F905000 C:\Windows\system32\DRIVERS\Apfiltr.sys 167936 bytes (Alps Electric Co., Ltd., Alps Touch Pad Driver)
0xAB8E8000 C:\Program Files\Roland\Virtual Sound Canvas DXi\RVIEg01.sys 163840 bytes (Roland, Roland VSC Synthesizer Engine)
0xAAD57000 C:\Windows\System32\DRIVERS\srv2.sys 163840 bytes (Microsoft Corporation, Smb 2.0 Server driver)
0x8AD63000 C:\Windows\System32\drivers\ecache.sys 159744 bytes (Microsoft Corporation, Special Memory Device Cache)
0x8FEDF000 C:\Windows\system32\DRIVERS\MpFilter.sys 159744 bytes (Microsoft Corporation, Microsoft antimalware file system filter driver)
0x806ED000 C:\Windows\system32\drivers\pci.sys 159744 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0x8FC32000 C:\Windows\system32\drivers\drmk.sys 151552 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0x8F5CA000 C:\Windows\system32\DRIVERS\ndiswan.sys 143360 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0x8AD9B000 C:\Windows\system32\drivers\CLASSPNP.SYS 135168 bytes (Microsoft Corporation, SCSI Class System Dll)
0xAACC6000 C:\Windows\system32\drivers\mrxdav.sys 135168 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0x90000000 C:\Windows\System32\Drivers\usbvideo.sys 135168 bytes (Microsoft Corporation, USB Video Class Driver)
0x8FF29000 C:\Windows\System32\drivers\VIDEOPRT.SYS 135168 bytes (Microsoft Corporation, Video Port Driver)
0xAACE7000 C:\Windows\system32\DRIVERS\mrxsmb.sys 126976 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0x8A6D9000 C:\Windows\system32\drivers\ataport.SYS 122880 bytes (Microsoft Corporation, ATAPI Driver Extension)
0xAAC7B000 C:\Windows\System32\DRIVERS\srvnet.sys 118784 bytes (Microsoft Corporation, Server Network driver)
0x8AAF6000 C:\Windows\System32\drivers\fwpkclnt.sys 110592 bytes (Microsoft Corporation, FWP/IPsec Kernel-Mode API)
0x90171000 C:\Windows\system32\drivers\luafv.sys 110592 bytes (Microsoft Corporation, LUA File Virtualization Filter Driver)
0x8F84D000 C:\Windows\system32\DRIVERS\sdbus.sys 106496 bytes (Microsoft Corporation, SecureDigital Bus Driver)
0xAAC98000 C:\Windows\system32\DRIVERS\bowser.sys 102400 bytes (Microsoft Corporation, NT Lan Manager Datagram Receiver Driver)
0x8F939000 C:\Windows\system32\DRIVERS\cdrom.sys 98304 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xAAD3F000 C:\Windows\system32\DRIVERS\mrxsmb20.sys 98304 bytes (Microsoft Corporation, Longhorn SMB 2.0 Redirector)
0x9006D000 C:\Windows\System32\Drivers\dfsc.sys 94208 bytes (Microsoft Corporation, DFS Namespace Client Driver)
0x8F9D2000 C:\Windows\system32\DRIVERS\rasl2tp.sys 94208 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0x8FDE0000 C:\Windows\system32\DRIVERS\usbccgp.sys 94208 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0xAB945000 C:\Windows\system32\DRIVERS\cdfs.sys 90112 bytes (Microsoft Corporation, CD-ROM File System Driver)
0x8FDCA000 C:\Windows\system32\DRIVERS\pacer.sys 90112 bytes (Microsoft Corporation, QoS Packet Scheduler)
0x8FF7C000 C:\Windows\system32\DRIVERS\tdx.sys 90112 bytes (Microsoft Corporation, TDI Translation Driver)
0xAACB1000 C:\Windows\System32\drivers\mpsdrv.sys 86016 bytes (Microsoft Corporation, Microsoft Protection Service Driver)
0x8A9CD000 C:\Windows\system32\DRIVERS\rassstp.sys 86016 bytes (Microsoft Corporation, RAS SSTP Miniport Call Manager)
0x8A9B9000 C:\Windows\system32\DRIVERS\raspptp.sys 81920 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0x8F878000 C:\Windows\system32\DRIVERS\rimsptsk.sys 81920 bytes (REDC, RICOH MS Driver)
0x8FF92000 C:\Windows\system32\DRIVERS\smb.sys 81920 bytes (Microsoft Corporation, SMB Transport driver)
0x8F8E2000 C:\Windows\system32\DRIVERS\i8042prt.sys 77824 bytes (Microsoft Corporation, i8042 Port Driver)
0x901D0000 C:\Windows\system32\DRIVERS\rspndr.sys 77824 bytes (Microsoft Corporation, Link-Layer Topology Responder Driver for NDIS 6)
0x807E3000 C:\Windows\system32\DRIVERS\wanarp.sys 77824 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0x8AD8A000 C:\Windows\system32\drivers\disk.sys 69632 bytes (Microsoft Corporation, PnP Disk Driver)
0x8A7DE000 C:\Windows\System32\Drivers\NDProxy.SYS 69632 bytes (Microsoft Corporation, NDIS Proxy)
0x80483000 C:\Windows\system32\PSHED.dll 69632 bytes (Microsoft Corporation, Platform Specific Hardware Error Driver)
0x8F867000 C:\Windows\system32\DRIVERS\rimmptsk.sys 69632 bytes (REDC, RICOH SD Driver)
0x8A733000 C:\Windows\system32\drivers\fileinfo.sys 65536 bytes (Microsoft Corporation, FileInfo Filter Driver)
0x8ABD8000 C:\Windows\system32\DRIVERS\HIDCLASS.SYS 65536 bytes (Microsoft Corporation, Hid Class Library)
0x9018C000 C:\Windows\system32\DRIVERS\lltdio.sys 65536 bytes (Microsoft Corporation, Link-Layer Topology Mapper I/O Driver)
0x8079E000 C:\Windows\System32\drivers\mountmgr.sys 65536 bytes (Microsoft Corporation, Mount Point Manager)
0x8F82F000 C:\Windows\system32\DRIVERS\ohci1394.sys 65536 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver)
0x8A9E2000 C:\Windows\system32\DRIVERS\termdd.sys 65536 bytes (Microsoft Corporation, Terminal Server Driver)
0x8ADE6000 C:\Windows\system32\DRIVERS\intelppm.sys 61440 bytes (Microsoft Corporation, Processor Device Driver)
0x90162000 C:\Windows\system32\DRIVERS\monitor.sys 61440 bytes (Microsoft Corporation, Monitor Driver)
0x8AD54000 C:\Windows\System32\Drivers\mup.sys 61440 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xAB934000 C:\Windows\system32\DRIVERS\NisDrvWFP.sys 61440 bytes (Microsoft Corporation, Microsoft Network Inspection System Driver)
0x80714000 C:\Windows\System32\drivers\partmgr.sys 61440 bytes (Microsoft Corporation, Partition Management Driver)
0x8F5ED000 C:\Windows\system32\DRIVERS\raspppoe.sys 61440 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0x8F52E000 C:\Windows\system32\DRIVERS\usbehci.sys 61440 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0x80730000 C:\Windows\system32\drivers\volmgr.sys 61440 bytes (Microsoft Corporation, Volume Manager Driver)
0x8F83F000 C:\Windows\system32\DRIVERS\1394BUS.SYS 57344 bytes (Microsoft Corporation, 1394 Bus Device Driver)
0x98E50000 C:\Windows\System32\cdd.dll 57344 bytes (Microsoft Corporation, Canonical Display Driver)
0x8FFEE000 C:\Windows\system32\DRIVERS\netbios.sys 57344 bytes (Microsoft Corporation, NetBIOS interface driver)
0x8FF65000 C:\Windows\System32\Drivers\Npfs.SYS 57344 bytes (Microsoft Corporation, NPFS Driver)
0x80790000 C:\Windows\system32\drivers\PCIIDEX.SYS 57344 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0x90084000 C:\Windows\System32\Drivers\crashdmp.sys 53248 bytes (Microsoft Corporation, Crash Dump Driver)
0x8FEBF000 C:\Windows\system32\drivers\modem.sys 53248 bytes (Microsoft Corporation, Modem Device Driver)
0x8ABF1000 C:\Windows\system32\DRIVERS\umbus.sys 53248 bytes (Microsoft Corporation, User-Mode Bus Enumerator)
0x80689000 C:\Windows\system32\drivers\WDFLDR.SYS 53248 bytes (Microsoft Corporation, WDFLDR)
0xAB91A000 C:\Windows\System32\drivers\tcpipreg.sys 49152 bytes (Microsoft Corporation, TCP/IP Registry Compatibility Driver)
0x8FF1D000 C:\Windows\System32\drivers\vga.sys 49152 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0x8F4D9000 C:\Windows\System32\drivers\watchdog.sys 49152 bytes (Microsoft Corporation, Watchdog Driver)
0xAB95F000 C:\Users\Ben\AppData\Local\Temp\aswMBR.sys 45056 bytes
0x8F8FA000 C:\Windows\system32\DRIVERS\kbdclass.sys 45056 bytes (Microsoft Corporation, Keyboard Class Driver)
0x8F92E000 C:\Windows\system32\DRIVERS\mouclass.sys 45056 bytes (Microsoft Corporation, Mouse Class Driver)
0x8FF5A000 C:\Windows\System32\Drivers\Msfs.SYS 45056 bytes (Microsoft Corporation, Mailslot driver)
0x8F9E9000 C:\Windows\system32\DRIVERS\ndistapi.sys 45056 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0x8F9C7000 C:\Windows\system32\DRIVERS\TDI.SYS 45056 bytes (Microsoft Corporation, TDI Wrapper)
0x8ADD2000 C:\Windows\system32\DRIVERS\tunnel.sys 45056 bytes (Microsoft Corporation, Microsoft Tunnel Interface Driver)
0x8F4E5000 C:\Windows\system32\DRIVERS\usbuhci.sys 45056 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0x80726000 C:\Windows\system32\DRIVERS\BATTC.SYS 40960 bytes (Microsoft Corporation, Battery Class Driver)
0x90158000 C:\Windows\System32\drivers\Dxapi.sys 40960 bytes (Microsoft Corporation, DirectX API Driver)
0xAB8DE000 C:\Windows\system32\DRIVERS\MpNWMon.sys 40960 bytes (Microsoft Corporation, Network monitor driver)
0x8A6F7000 C:\Windows\system32\drivers\msahci.sys 40960 bytes (Microsoft Corporation, MS AHCI 1.0 Standard Driver)
0x8F9F6000 C:\Windows\system32\DRIVERS\mssmbios.sys 40960 bytes (Microsoft Corporation, System Management BIOS Driver)
0x901C6000 C:\Windows\system32\DRIVERS\ndisuio.sys 40960 bytes (Microsoft Corporation, NDIS User mode I/O driver)
0x9005D000 C:\Windows\system32\drivers\nsiproxy.sys 40960 bytes (Microsoft Corporation, NSI Proxy)
0xAB910000 C:\Windows\System32\Drivers\secdrv.SYS 40960 bytes (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K., Macrovision SECURITY Driver)
0xAB96A000 C:\Windows\System32\Drivers\BlackBox.SYS 36864 bytes (RKU Driver)
0x8ADBC000 C:\Windows\system32\drivers\crcdisk.sys 36864 bytes (Microsoft Corporation, Disk Block Verification Filter Driver)
0x8FF06000 C:\Windows\System32\Drivers\Fs_Rec.SYS 36864 bytes (Microsoft Corporation, File System Recognizer Driver)
0x8FECC000 C:\Windows\system32\DRIVERS\hidusb.sys 36864 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0x8AA00000 C:\Windows\system32\DRIVERS\kbdhid.sys 36864 bytes (Microsoft Corporation, HID Keyboard Filter Driver)
0x8FF73000 C:\Windows\System32\DRIVERS\rasacd.sys 36864 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0x98E30000 C:\Windows\System32\TSDDD.dll 36864 bytes (Microsoft Corporation, Framebuffer Display Driver)
0x8ADDD000 C:\Windows\system32\DRIVERS\tunmp.sys 36864 bytes (Microsoft Corporation, Microsoft Tunnel Interface Driver)
0x8ABE8000 C:\Windows\system32\DRIVERS\wmiacpi.sys 36864 bytes (Microsoft Corporation, Windows Management Interface for ACPI)
0x806DC000 C:\Windows\system32\drivers\WMILIB.SYS 36864 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0x8A6D1000 C:\Windows\system32\drivers\atapi.sys 32768 bytes (Microsoft Corporation, ATAPI IDE Miniport Driver)
0x80494000 C:\Windows\system32\BOOTVID.dll 32768 bytes (Microsoft Corporation, VGA Boot Driver)
0x8FED7000 C:\Windows\system32\DRIVERS\mouhid.sys 32768 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0x806E5000 C:\Windows\system32\drivers\msisadrv.sys 32768 bytes (Microsoft Corporation, ISA Driver)
0x8FF4A000 C:\Windows\System32\DRIVERS\RDPCDD.sys 32768 bytes (Microsoft Corporation, RDP Miniport)
0x8FF52000 C:\Windows\system32\drivers\rdpencdd.sys 32768 bytes (Microsoft Corporation, RDP Miniport)
0x8AD4C000 C:\Windows\System32\Drivers\spldr.sys 32768 bytes (Microsoft Corporation, loader for security processor)
0xAB926000 C:\Windows\system32\DRIVERS\xaudio.sys 32768 bytes (Conexant Systems, Inc., Modem Audio Device Driver)
0x8FF16000 C:\Windows\System32\Drivers\Beep.SYS 28672 bytes (Microsoft Corporation, BEEP Driver)
0x8ADF7000 C:\Windows\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0x80789000 C:\Windows\system32\drivers\intelide.sys 28672 bytes (Microsoft Corporation, Intel PCI IDE Driver)
0x8040C000 C:\Windows\system32\kdcom.dll 28672 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0x8FF0F000 C:\Windows\System32\Drivers\Null.SYS 28672 bytes (Microsoft Corporation, NULL Driver)
0x8F951000 C:\Windows\system32\DRIVERS\GEARAspiWDM.sys 24576 bytes (GEAR Software Inc., CD DVD Filter)
0x90067000 c:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{63E50414-F1B3-4697-A182-8B9E5474C12C}\MpKsl574b470f.sys 24576 bytes (Microsoft Corporation, KSLDriver)
0xAB92E000 c:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{63E50414-F1B3-4697-A182-8B9E5474C12C}\MpKslcee497c8.sys 24576 bytes (Microsoft Corporation, KSLDriver)
0x8F8F5000 C:\Windows\system32\DRIVERS\HpqKbFiltr.sys 20480 bytes (Hewlett-Packard Development Company, L.P., HpqKbFiltr Keyboard Filter Driver)
0x8F8DE000 C:\Windows\system32\DRIVERS\CmBatt.sys 16384 bytes (Microsoft Corporation, Control Method Battery Driver)
0xAB95B000 C:\Windows\system32\drivers\mbam.sys 16384 bytes (Malwarebytes Corporation, Malwarebytes' Anti-Malware)
0xAADE6000 C:\Windows\system32\DRIVERS\mdmxsdk.sys 16384 bytes (Conexant, Diagnostic Interface x86 Driver)
0x80723000 C:\Windows\system32\DRIVERS\compbatt.sys 12288 bytes (Microsoft Corporation, Composite Battery Driver)
0x8ADF5000 C:\Windows\system32\DRIVERS\HpqRemHid.sys 8192 bytes (Hewlett-Packard Development Company, L.P., HP Remote Control HID Device)
0x8F9F4000 C:\Windows\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0x8FED5000 C:\Windows\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
==============================================
>Stealth
==============================================

#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:17 AM

Posted 31 July 2011 - 01:05 PM

Go Start>Run (Start search in Vista), type in:
cmd
Click OK (Vista and Windows 7 users: while holding CTRL, and SHIFT, press Enter).

In Command Prompt window, type in following commands, and hit Enter after each one:
ipconfig /flushdns
ipconfig /registerdns
ipconfig /release
ipconfig /renew
net stop "dns client"
net start "dns client"


Turn the computer off.

On your router, you'll find a pinhole marked "Reset".
Keep pushing the hole, using a pencil, or a paperclip until all lights briefly come off and on.
NOTE. Simple router disconnecting from a power source will NOT do.
Restart computer and check for redirections.

NOTE. You may need to re-check your router security settings, as described HERE

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#11 easymac

easymac
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:17 PM

Posted 31 July 2011 - 01:19 PM

Thanks, will do. Just curious - If I told you that no one else on my router was having redirect issues, would it change the course of action at all?

#12 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:17 AM

Posted 31 July 2011 - 01:27 PM

No.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#13 easymac

easymac
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:17 PM

Posted 31 July 2011 - 01:50 PM

still getting redirects. They are always to shady looking websites that are related to the search terms. Malwarebytes blocks about half of the connections.

#14 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,679 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:11:17 AM

Posted 31 July 2011 - 02:17 PM

Please click HERE to download Kaspersky Virus Removal Tool.

  • Double click on the file you just downloaded and let it install.
  • It will install to your desktop.
  • After that leave what is selected and put a check next to My Computer.
  • Click on the option that says Threat Detection and change it to Disinfect,delete if disinfection fails.
  • Then click on Start Scan.
  • Before it is done it may prompt for action regardless of the setting so choose delete if prompted.
  • When the scan is done no log will be produced.
  • Click on the bottom where it says Report to open the report.
  • Then highlight of of the items found by using ctrl + a on your keyboard to select all or use your mouse to select all then right click and choose copy.
  • This will copy the items that it found to the clipboard you can then open notepad (go to start then run then type in notepad) and choose paste to paste the contents into Notepad.
  • You can save this on the desktop.
  • Post the contents of the document in your next reply.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#15 easymac

easymac
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:17 PM

Posted 31 July 2011 - 05:41 PM

Kaspery crashed half way through the scan. Had found somewhere between 5 and 10 password protected files but no viruses as of the crash. Will re-run.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users