"iexplore.exe" wrote bytes "e9b34bcbf8" to virtual address "0x76B0EC7C" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e9b090c2f8" to virtual address "0x76B0ABE1" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e9fda4aaf8" to virtual address "0x76E54731" (part of module "OLEAUT32.DLL") "iexplore.exe" wrote bytes "e92e0ddbf8" to virtual address "0x76B4CF42" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e9efb977fb" to virtual address "0x7418388E" (part of module "COMCT元2.DLL") "iexplore.exe" wrote bytes "e9b296ddf8" to virtual address "0x769E9D0B" (part of module "OLE32.DLL") "iexplore.exe" wrote bytes "e99cf3d9f8" to virtual address "0x76B5E869" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e98b8eaaf8" to virtual address "0x76E55DEE" (part of module "OLEAUT32.DLL") "iexplore.exe" wrote bytes "e9e9f0d9f8" to virtual address "0x76B5E9ED" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e9c20adbf8" to virtual address "0x76B4D274" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e9ee7ef5f8" to virtual address "0x769A6143" (part of module "OLE32.DLL") "iexplore.exe" wrote bytes "e99ac368f8" to virtual address "0x77272694" (part of module "COMDLG32.DLL") "iexplore.exe" wrote bytes "e937f2d9f8" to virtual address "0x76B5E963" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e96ff1d9f8" to virtual address "0x76B5E9C9" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e955a598f8" to virtual address "0x76E53EAE" (part of module "OLEAUT32.DLL") "iexplore.exe" wrote bytes "e9652bcef8" to virtual address "0x76B0ADF9" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e9b943bdf8" to virtual address "0x76B23B9B" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "e9e89ac7f8" to virtual address "0x76B0E30C" (part of module "USER32.DLL") Installs hooks/patches the running process If your application is designed to w" (Indicator: "requestedExecutionLevel level="highestAvailable"")
#Pso2 gameguard error 114 windows
If your application is designed to work with Windows Vista, uncomment the following supportedOS node-> Windows will automatically select the most compatible environment.-> A list of all Windows versions that this application is designed to work with. "you want to utilize File and Registry Virtualization for backwardĬompatibility then delete the requestedExecutionLevel node. "" monitors "\REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings" (Filter: 4 Subtree: 1)įound potential IP address in binary/memory "" monitors "\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections" (Filter: 4 Subtree: 1) "" monitors "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections" (Filter: 4 Subtree: 1) "" monitors "\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS" (Filter: 14 Subtree: 0) "" monitors "\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinSock2\Parameters\NameSpace_Catalog5" (Filter: 1 Subtree: 0) "" monitors "\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinSock2\Parameters\Protocol_Catalog9" (Filter: 1 Subtree: 0) "" monitors "\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32" (Filter: 14 Subtree: 0) "" monitors "\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NetworkProvider\HwOrder" (Filter: 4 Subtree: 0) Tries to identify its external IP address Found malicious artifacts related to "108.61.123.162" (ASN:, Owner: ).