GMER 1.0.12.12011 -
http://www.gmer.netRootkit scan 2007-01-18 18:27:51
Windows 5.1.2600 Service Pack 2
---- System - GMER 1.0.12 ----
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwClose
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwCreateFile
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwCreateKey
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwCreateProcess
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwCreateProcessEx
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwCreateThread
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwDeleteFile
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwDeleteKey
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwDeleteValueKey
SSDT sptd.sys ZwEnumerateKey
SSDT sptd.sys ZwEnumerateValueKey
SSDT \SystemRoot\system32\drivers\khips.sys ZwLoadDriver
SSDT \SystemRoot\system32\drivers\khips.sys ZwMapViewOfSection
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwOpenFile
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwOpenKey
SSDT \??\D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.sys ZwOpenProcess
SSDT sptd.sys ZwQueryKey
SSDT sptd.sys ZwQueryValueKey
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwResumeThread
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwSetInformationFile
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwSetValueKey
SSDT \??\D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.sys ZwTerminateProcess
SSDT \SystemRoot\system32\drivers\fwdrv.sys ZwWriteFile
---- Kernel code sections - GMER 1.0.12 ----
.text ntkrnlpa.exe!ZwCallbackReturn + 23E8 805010EC 8 Bytes [ 20, AF, 1D, EF, 90, AD, 1D, ... ]
.text ntkrnlpa.exe!ZwCallbackReturn + 2424 80501128 8 Bytes [ 90, C1, 1D, EF, 20, 83, 1D, ... ]
PAGENDSM NDIS.sys!NdisMIndicateStatus F71E9A5F 6 Bytes [ FF, 25, 88, D5, 24, EF ]
.text USBPORT.SYS!DllUnload F19D362C 5 Bytes JMP 86A941B8
---- User code sections - GMER 1.0.12 ----
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 001301A8
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00130090
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00130694
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 001302C0
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00130234
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00130004
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0013011C
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 001304F0
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0013057C
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 001303D8
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0013034C
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00130464
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00130608
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 001307AC
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe[264] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00130720
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 000301A8
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00030090
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00030694
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 000302C0
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00030234
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00030004
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0003011C
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 000304F0
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0003057C
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 000303D8
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0003034C
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00030464
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00030608
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 000307AC
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00030720
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] WS2_32.dll!socket 71A93B91 5 Bytes JMP 000308C4
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] WS2_32.dll!bind 71A93E00 5 Bytes JMP 00030838
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] WS2_32.dll!connect 71A9406A 5 Bytes JMP 00030950
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] WININET.dll!InternetOpenW 771AAEFD 5 Bytes JMP 00030DB0
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] WININET.dll!InternetConnectA 771B30C3 5 Bytes JMP 00030F54
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] WININET.dll!InternetOpenA 771B58BA 5 Bytes JMP 00030D24
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] WININET.dll!InternetOpenUrlA 771B5B6D 5 Bytes JMP 00030E3C
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] WININET.dll!InternetConnectW 771BEE00 5 Bytes JMP 00030FE0
.text C:\PROGRAM FILES\SUNBELT SOFTWARE\PERSONAL FIREWALL\KPF4SS.EXE[320] WININET.dll!InternetOpenUrlW 771C5B52 5 Bytes JMP 00030EC8
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 001301A8
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00130090
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00130694
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 001302C0
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00130234
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00130004
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0013011C
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 001304F0
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0013057C
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 001303D8
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0013034C
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00130464
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00130608
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 001307AC
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00130720
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] WS2_32.dll!socket 71A93B91 5 Bytes JMP 001308C4
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] WS2_32.dll!bind 71A93E00 5 Bytes JMP 00130838
.text C:\PROGRAM FILES\ESET\NOD32KRN.EXE[532] WS2_32.dll!connect 71A9406A 5 Bytes JMP 00130950
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 001301A8
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00130090
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00130694
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 001302C0
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00130234
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00130004
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0013011C
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 001304F0
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0013057C
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 001303D8
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0013034C
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00130464
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00130608
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] WS2_32.dll!socket 71A93B91 5 Bytes JMP 001308C4
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] WS2_32.dll!bind 71A93E00 5 Bytes JMP 00130838
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] WS2_32.dll!connect 71A9406A 5 Bytes JMP 00130950
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 001307AC
.text C:\WINDOWS\SYSTEM32\OODAG.EXE[564] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00130720
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 000801A8
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00080090
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00080694
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 000802C0
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00080234
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00080004
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0008011C
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 000804F0
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0008057C
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 000803D8
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0008034C
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00080464
.text C:\WINDOWS\EXPLORER.EXE[808] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00080608
.text C:\WINDOWS\EXPLORER.EXE[808] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 000807AC
.text C:\WINDOWS\EXPLORER.EXE[808] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00080720
.text C:\WINDOWS\EXPLORER.EXE[808] WININET.dll!InternetOpenW 771AAEFD 5 Bytes JMP 00080DB0
.text C:\WINDOWS\EXPLORER.EXE[808] WININET.dll!InternetConnectA 771B30C3 5 Bytes JMP 00080F54
.text C:\WINDOWS\EXPLORER.EXE[808] WININET.dll!InternetOpenA 771B58BA 5 Bytes JMP 00080D24
.text C:\WINDOWS\EXPLORER.EXE[808] WININET.dll!InternetOpenUrlA 771B5B6D 5 Bytes JMP 00080E3C
.text C:\WINDOWS\EXPLORER.EXE[808] WININET.dll!InternetConnectW 771BEE00 5 Bytes JMP 00080FE0
.text C:\WINDOWS\EXPLORER.EXE[808] WININET.dll!InternetOpenUrlW 771C5B52 5 Bytes JMP 00080EC8
.text C:\WINDOWS\EXPLORER.EXE[808] WS2_32.dll!socket 71A93B91 5 Bytes JMP 000808C4
.text C:\WINDOWS\EXPLORER.EXE[808] WS2_32.dll!bind 71A93E00 5 Bytes JMP 00080838
.text C:\WINDOWS\EXPLORER.EXE[808] WS2_32.dll!connect 71A9406A 5 Bytes JMP 00080950
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 000801A8
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00080090
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00080694
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 000802C0
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00080234
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00080004
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0008011C
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 000804F0
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0008057C
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 000803D8
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0008034C
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00080464
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00080608
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 000807AC
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00080720
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] WS2_32.dll!socket 71A93B91 5 Bytes JMP 000808C4
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] WS2_32.dll!bind 71A93E00 5 Bytes JMP 00080838
.text C:\WINDOWS\SYSTEM32\SPOOLSV.EXE[852] WS2_32.dll!connect 71A9406A 5 Bytes JMP 00080950
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 000801A8
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00080090
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00080694
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 000802C0
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00080234
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00080004
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0008011C
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 000804F0
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0008057C
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 000803D8
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0008034C
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00080464
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00080608
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 000807AC
.text C:\WINDOWS\SYSTEM32\CTFMON.EXE[896] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00080720
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 000801A8
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00080090
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00080694
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 000802C0
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00080234
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00080004
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0008011C
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 000804F0
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0008057C
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 000803D8
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0008034C
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00080464
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00080608
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 000807AC
.text C:\WINDOWS\SYSTEM32\SVCHOST.EXE[1012] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00080720
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 001401A8
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00140090
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00140694
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 001402C0
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00140234
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00140004
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0014011C
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 001404F0
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0014057C
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 001403D8
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0014034C
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00140464
.text D:\Program Files\DU Meter\DUMeter.exe[1164] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00140608
.text D:\Program Files\DU Meter\DUMeter.exe[1164] user32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 001407AC
.text D:\Program Files\DU Meter\DUMeter.exe[1164] user32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00140720
.text D:\Program Files\DU Meter\DUMeter.exe[1164] WS2_32.dll!socket 71A93B91 5 Bytes JMP 001408C4
.text D:\Program Files\DU Meter\DUMeter.exe[1164] WS2_32.dll!bind 71A93E00 5 Bytes JMP 00140838
.text D:\Program Files\DU Meter\DUMeter.exe[1164] WS2_32.dll!connect 71A9406A 5 Bytes JMP 00140950
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 001401A8
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00140090
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00140694
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 001402C0
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00140234
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00140004
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0014011C
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 001404F0
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0014057C
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 001403D8
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0014034C
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00140464
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00140608
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 001407AC
.text C:\PROGRAM FILES\ESET\NOD32KUI.EXE[1172] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00140720
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 000701A8
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00070090
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00070694
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 000702C0
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00070234
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00070004
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0007011C
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 000704F0
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0007057C
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 000703D8
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0007034C
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00070464
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00070608
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 000707AC
.text C:\WINDOWS\SYSTEM32\WDFMGR.EXE[1196] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00070720
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 001401A8
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00140090
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00140694
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 001402C0
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00140234
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00140004
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0014011C
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 001404F0
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0014057C
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 001403D8
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0014034C
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00140464
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00140608
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 001407AC
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00140720
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] WS2_32.dll!socket 71A93B91 5 Bytes JMP 001408C4
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] WS2_32.dll!bind 71A93E00 5 Bytes JMP 00140838
.text C:\WINDOWS\APS\SVCHOST.EXE[1212] WS2_32.dll!connect 71A9406A 5 Bytes JMP 00140950
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 001401A8
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00140090
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00140694
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 001402C0
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00140234
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00140004
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0014011C
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 001404F0
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0014057C
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 001403D8
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0014034C
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00140464
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00140608
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 001407AC
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00140720
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] WS2_32.dll!socket 71A93B91 5 Bytes JMP 001408C4
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] WS2_32.dll!bind 71A93E00 5 Bytes JMP 00140838
.text C:\WINDOWS\APS\SPOOLSV.EXE[1228] WS2_32.dll!connect 71A9406A 5 Bytes JMP 00140950
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 001401A8
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00140090
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00140694
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 001402C0
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00140234
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00140004
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0014011C
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 001404F0
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0014057C
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 001403D8
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0014034C
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00140464
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00140608
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 001407AC
.text C:\PROGRAM FILES\COMMON FILES\ACRONIS\SCHEDULE2\SCHEDHLP.EXE[1240] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00140720
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 001401A8
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00140090
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00140694
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 001402C0
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00140234
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00140004
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0014011C
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 001404F0
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0014057C
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 001403D8
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0014034C
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00140464
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00140608
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 001407AC
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00140720
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] WS2_32.dll!socket 71A93B91 5 Bytes JMP 001408C4
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] WS2_32.dll!bind 71A93E00 5 Bytes JMP 00140838
.text D:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe[1272] WS2_32.dll!connect 71A9406A 5 Bytes JMP 00140950
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 001601A8
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00160090
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00160694
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!CreateProcessW 7C802332 5 Bytes JMP 001602C0
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!CreateProcessA 7C802367 5 Bytes JMP 00160234
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00160004
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0016011C
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 001604F0
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!CreateThread 7C810637 5 Bytes JMP 0016057C
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 001603D8
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0016034C
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!WinExec 7C86136D 5 Bytes JMP 00160464
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] KERNEL32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00160608
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 001607AC
.text C:\WINDOWS\SYSTEM32\CSRSS.EXE[1284] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00160720
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 000701A8
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00070090
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00070694
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 000702C0
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00070234
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00070004
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0007011C
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 000704F0
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0007057C
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 000703D8
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 Bytes JMP 0007034C
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!WinExec 7C86136D 5 Bytes JMP 00070464
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] kernel32.dll!SetThreadContext 7C862AA5 5 Bytes JMP 00070608
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] USER32.dll!SetWindowsHookExW 77D4E4AF 5 Bytes JMP 000707AC
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] USER32.dll!SetWindowsHookExA 77D511E9 5 Bytes JMP 00070720
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] WS2_32.dll!socket 71A93B91 5 Bytes JMP 000708C4
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] WS2_32.dll!bind 71A93E00 5 Bytes JMP 00070838
.text C:\WINDOWS\SYSTEM32\WINLOGON.EXE[1324] WS2_32.dll!connect 71A9406A 5 Bytes JMP 00070950
.text C:\WINDOWS\SYSTEM32\SERVICES.EXE[1384] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes JMP 000801A8
.text C:\WINDOWS\SYSTEM32\SERVICES.EXE[1384] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes JMP 00080090
.text C:\WINDOWS\SYSTEM32\SERVICES.EXE[1384] kernel32.dll!WriteProcessMemory 7C80220F 5 Bytes JMP 00080694
.text C:\WINDOWS\SYSTEM32\SERVICES.EXE[1384] kernel32.dll!CreateProcessW 7C802332 5 Bytes JMP 000802C0
.text C:\WINDOWS\SYSTEM32\SERVICES.EXE[1384] kernel32.dll!CreateProcessA 7C802367 5 Bytes JMP 00080234
.text C:\WINDOWS\SYSTEM32\SERVICES.EXE[1384] kernel32.dll!VirtualAlloc 7C809A51 5 Bytes JMP 00080004
.text C:\WINDOWS\SYSTEM32\SERVICES.EXE[1384] kernel32.dll!VirtualAllocEx 7C809A72 5 Bytes JMP 0008011C
.text C:\WINDOWS\SYSTEM32\SERVICES.EXE[1384] kernel32.dll!CreateRemoteThread 7C81042C 5 Bytes JMP 000804F0
.text C:\WINDOWS\SYSTEM32\SERVICES.EXE[1384] kernel32.dll!CreateThread 7C810637 5 Bytes JMP 0008057C
.text C:\WINDOWS\SYSTEM32\SERVICES.EXE[1384] kernel32.dll!CreateProcessInternalW 7C819513 5 Bytes JMP 000803D8
.text C:\WINDOWS\SYSTEM32\SERVICES.EXE[1384] kernel32.dll!CreateProcessInternalA 7C81DDD6 5 By