


"" wrote bytes "e99a6bda8a" to virtual address "0x756DCF41" wrote bytes "e9a703da8a" to virtual address "0x756E374D" Hook Detection relevance 10/10 "" wrote bytes "e9befdd98a" to virtual address "0x756E3C26" wrote bytes "8bff558bece9790d3175" to virtual address "0x003D2EA8" "" wrote bytes "d4c6c075" to virtual address "0圆AB51FDC" (part of module "MSCORWKS.DLL") "" monitors "\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinSock2\Parameters\NameSpace_Catalog5" (Filter: 1 Subtree: 2147483648)įound potential IP address in binary/memory

"" monitors "\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinSock2\Parameters\Protocol_Catalog9" (Filter: 1 Subtree: 2147483648) "" monitors "\REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings" (Filter: 4 Subtree: 1) "" monitors "\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections" (Filter: 4 Subtree: 1) "" monitors "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections" (Filter: 4 Subtree: 1) "" monitors "\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\wada_RASMANCS" (Filter: 14) "" monitors "\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinSock2\Parameters\NameSpace_Catalog5" (Filter: 1) "" monitors "\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinSock2\Parameters\Protocol_Catalog9" (Filter: 1) "" monitors "\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\wada_RASAPI32" (Filter: 14)
