signalapp / Signal-Desktop

A private messenger for Windows, macOS, and Linux.
https://signal.org/download
GNU Affero General Public License v3.0
14.7k stars 2.69k forks source link

Not send from PC with number on phone but was not downloaded to PC.(phone Contact not being downloaded #4129

Closed wesleytt closed 4 years ago

wesleytt commented 4 years ago

Bug Description

start PC app and input a contact that is in Contact on phone but has not been downloaded into PC. One of the main issues is the contact do not all come down on PC. Now, When I manually input number and try to send TXT but the message errored and did not send.

Steps to Reproduce

  1. step one Manually paste a number in contact on phone to PC
  2. step two Put in txt message
  3. step three Hit send

Actual Result:

Expected Result: The message should have sent. Like it does with other contact that were downloaded.

It should have sent the message (all contact should have been downloaded, when imported)

Screenshots

signalsendMessage

Platform Info

Signal Version:

Operating System:

``` Summary Operating System Windows 10 Home 64-bit CPU Intel Core i7 7700HQ @ 2.80GHz 52 °C Kaby Lake 14nm Technology RAM 16.0GB Dual-Channel Unknown @ 1196MHz (17-17-17-39) Motherboard Clevo 1710 (U3E1) Graphics Generic PnP Monitor (1920x1080@60Hz) ASUS PB278 (2560x1440@59Hz) Intel HD Graphics 630 (CLEVO/KAPOK Computer) 4095MB NVIDIA GeForce GTX 1070 (CLEVO/KAPOK Computer) 44 °C ForceWare version: 442.19 SLI Disabled Storage 931GB Hitachi HGST HTS721010A9E630 (SATA ) 33 °C 232GB Samsung SSD 960 EVO 250GB (Unknown (SSD)) Optical Drives No optical disk drives detected Audio Realtek High Definition Audio Operating System Windows 10 Home 64-bit Computer type: Notebook Installation Date: 10/11/2019 11:38:13 AM Windows Security Center User Account Control (UAC) Enabled Notify level 2 - Default Firewall Enabled Windows Update AutoUpdate Not configured Windows Defender Windows Defender Enabled Antivirus Sophos Home Antivirus Enabled Virus Signature Database Up to date Windows Defender Antivirus Disabled Virus Signature Database Up to date .NET Frameworks installed v4.8 Full v4.8 Client v3.5 SP1 v3.0 SP2 v2.0 SP2 Internet Explorer Version 11.719.18362.0 PowerShell Version 5.1.18362.1 Java Java Runtime Environment Path C:\Program Files\Java\jdk1.8.0_161\bin\java.exe Version 8.0 Update 161 Build 12 Java Runtime Environment Path C:\Program Files\Java\jre1.8.0_161\bin\java.exe Version 8.0 Update 161 Build 12 Environment Variables USERPROFILE C:\Users\Wes Tarpley SystemRoot C:\WINDOWS User Variables IntelliJ IDEA C:\Program Files\JetBrains\IntelliJ IDEA 201.6668.13\bin; OneDrive C:\Users\Wes Tarpley\OneDrive OneDriveConsumer C:\Users\Wes Tarpley\OneDrive Path C:\Users\Wes Tarpley\AppData\Local\Programs\Python\Python38-32\Scripts\ C:\Users\Wes Tarpley\AppData\Local\Programs\Python\Python38-32\ C:\Users\Wes Tarpley\AppData\Local\Microsoft\WindowsApps C:\Users\Wes Tarpley\AppData\Roaming\npm C:\Program Files (x86)\Nmap %PyCharm Community Edition% C:\Users\Wes Tarpley\AppData\Local\Programs\Microsoft VS Code\bin %IntelliJ IDEA% C:\Program Files (x86)\FAHClient PyCharm Community Edition C:\Program Files\JetBrains\PyCharm Community Edition 2018.3.4\bin; TEMP C:\Users\Wes Tarpley\AppData\Local\Temp TMP C:\Users\Wes Tarpley\AppData\Local\Temp Machine Variables AGSDESKTOPJAVA C:\Program Files (x86)\ArcGIS\Desktop10.3\ asl.log Destination=file ComSpec C:\WINDOWS\system32\cmd.exe configsetroot C:\WINDOWS\ConfigSetRoot DriverData C:\Windows\System32\Drivers\DriverData NUMBER_OF_PROCESSORS 8 OS Windows_NT Path C:\Program Files\Python38\Scripts\ C:\Program Files\Python38\ C:\Program Files (x86)\Python37-32\Scripts\ C:\Program Files (x86)\Python37-32\ C:\ProgramData\Oracle\Java\javapath C:\Program Files (x86)\Intel\iCLS Client\ C:\Program Files\Intel\iCLS Client\ C:\Windows\system32 C:\Windows C:\Windows\System32\Wbem C:\Windows\System32\WindowsPowerShell\v1.0\ C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common C:\Program Files (x86)\Intel\Intel Management Engine Components\DAL C:\Program Files\Intel\Intel Management Engine Components\DAL C:\Program Files (x86)\Intel\Intel Management Engine Components\IPT C:\Program Files\Intel\Intel Management Engine Components\IPT C:\Program Files\nodejs\ C:\WINDOWS\system32 C:\WINDOWS C:\WINDOWS\System32\Wbem C:\WINDOWS\System32\WindowsPowerShell\v1.0\ C:\WINDOWS\System32\OpenSSH\ C:\Users\Wes Tarpley\.dnx\bin C:\Program Files\Microsoft DNX\Dnvm\ C:\Program Files\Microsoft SQL Server\120\Tools\Binn\ C:\Program Files (x86)\MySQL\MySQL Server 5.5\bin PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.PY;.PYW PROCESSOR_ARCHITECTURE AMD64 PROCESSOR_IDENTIFIER Intel64 Family 6 Model 158 Stepping 9, GenuineIntel PROCESSOR_LEVEL 6 PROCESSOR_REVISION 9e09 PSModulePath %ProgramFiles%\WindowsPowerShell\Modules C:\WINDOWS\system32\WindowsPowerShell\v1.0\Modules TEMP C:\WINDOWS\TEMP TMP C:\WINDOWS\TEMP USERNAME SYSTEM VS140COMNTOOLS C:\Program Files (x86)\Microsoft Visual Studio 14.0\Common7\Tools\ windir C:\WINDOWS Battery AC Line Online Battery Charge % 100 % Battery State High Remaining Battery Time Unknown Power Profile Active power scheme High performance Hibernation Enabled Turn Off Monitor after: (On AC Power) 15 min Turn Off Monitor after: (On Battery Power) 10 min Turn Off Hard Disk after: (On AC Power) 1 min Turn Off Hard Disk after: (On Battery Power) 20 min Suspend after: (On AC Power) Never Suspend after: (On Battery Power) Never Screen saver Disabled Uptime Current Session Current Time 4/5/2020 5:11:27 AM Current Uptime 334,531 sec (3 d, 20 h, 55 m, 31 s) Last Boot Time 4/1/2020 8:15:56 AM Services Running Adobe Genuine Monitor Service Running Adobe Genuine Software Integrity Service Running Apache2.4 Running Apple Mobile Device Service Running Application Information Running AppX Deployment Service (AppXSVC) Running Audio Position Service Running AVCTP service Running Background Intelligent Transfer Service Running Background Tasks Infrastructure Service Running Base Filtering Engine Running Bluetooth Audio Gateway Service Running Bluetooth Support Service Running Bluetooth User Support Service_108db5 Running Bonjour Service Running Capability Access Manager Service Running Certificate Propagation Running Chrome Remote Desktop Service Running Client License Service (ClipSVC) Running Clipboard User Service_108db5 Running CNG Key Isolation Running COM+ Event System Running Connected Devices Platform Service Running Connected Devices Platform User Service_108db5 Running Connected User Experiences and Telemetry Running Contact Data_108db5 Running CoreMessaging Running Credential Manager Running Cryptographic Services Running Data Sharing Service Running Data Usage Running DCOM Server Process Launcher Running Delivery Optimization Running Device Association Service Running DevQuery Background Discovery Broker Running DHCP Client Running Diagnostic Policy Service Running Diagnostic Service Host Running Diagnostic System Host Running Display Enhancement Service Running Display Policy Service Running Distributed Link Tracking Client Running DNS Client Running Encrypting File System (EFS) Running FileZilla Server FTP server Running Geolocation Service Running HitmanPro.Alert service Running HotKey Clipboard Service Running Human Interface Device Service Running Intel Bluetooth Service Running Intel Content Protection HDCP Service Running Intel Content Protection HECI Service Running Intel Dynamic Application Loader Host Interface Service Running Intel Extreme Tuning Utility Service Running Intel HD Graphics Control Panel Service Running Intel Management and Security Application Local Management Service Running Intel Rapid Storage Technology Running Intel Storage Middleware Service Running IP Helper Running Local Session Manager Running Malwarebytes Service Running Message Queuing Running Microsoft Account Sign-in Assistant Running Microsoft Office Click-to-Run Service Running Microsoft Passport Running Microsoft Passport Container Running Microsoft Store Install Service Running MySQL Running Network Connection Broker Running Network Connections Running Network List Service Running Network Location Awareness Running Network Store Interface Service Running NVIDIA Display Container LS Running NVIDIA LocalSystem Container Running NVIDIA Telemetry Container Running Payments and NFC/SE Manager Running PDFescape Desktop Running PDFescape Desktop Update Service Running Peer Networking Identity Manager Running Phone Service Running Plug and Play Running Power Running PowerBiosServer Running Print Spooler Running Program Compatibility Assistant Service Running Quality Windows Audio Video Experience Running Radio Management Service Running Remote Access Connection Manager Running Remote Desktop Configuration Running Remote Desktop Services Running Remote Procedure Call (RPC) Running RPC Endpoint Mapper Running SAMSUNG Mobile Connectivity Service Running SAMSUNG Mobile Connectivity Service V2 Running Secure Socket Tunneling Protocol Service Running Security Accounts Manager Running Security Center Running Server Running Shell Hardware Detection Running Sophos Anti-Virus Running Sophos Anti-Virus status reporter Running Sophos AutoUpdate Service Running Sophos Clean Running Sophos Endpoint Defense Service Running Sophos File Scanner Service Running Sophos Health Service Running Sophos MCS Agent Running Sophos MCS Client Running Sophos Network Threat Protection Running Sophos Safestore Running Sophos System Protection Service Running Sophos Web Control Service Running Sophos Web Filter Running Sophos Web Intelligence Service Running SQL Server VSS Writer Running SSDP Discovery Running State Repository Service Running Storage Service Running Sync Host_108db5 Running SynTPEnhService Running SysMain Running System Event Notification Service Running System Events Broker Running System Guard Runtime Monitor Broker Running Task Scheduler Running TCP/IP NetBIOS Helper Running Telephony Running Themes Running Time Broker Running Touch Keyboard and Handwriting Panel Service Running Update Orchestrator Service Running User Data Access_108db5 Running User Data Storage_108db5 Running User Manager Running User Profile Service Running UWP RPC Service Running Web Account Manager Running Windows Audio Running Windows Audio Endpoint Builder Running Windows Backup Running Windows Biometric Service Running Windows Connection Manager Running Windows Defender Antivirus Service Running Windows Defender Firewall Running Windows Event Log Running Windows Font Cache Service Running Windows Image Acquisition (WIA) Running Windows License Manager Service Running Windows Management Instrumentation Running Windows Presentation Foundation Font Cache 3.0.0.0 Running Windows Push Notifications System Service Running Windows Push Notifications User Service_108db5 Running Windows Search Running Windows Security Service Running Windows Time Running WinHTTP Web Proxy Auto-Discovery Service Running WLAN AutoConfig Running WMI Performance Adapter Running Workstation Stopped ActiveX Installer (AxInstSV) Stopped Agent Activation Runtime_108db5 Stopped AllJoyn Router Service Stopped Apache Tomcat Tomcat7 Stopped App Readiness Stopped Application Identity Stopped Application Layer Gateway Service Stopped ASP.NET State Service Stopped Auto Time Zone Updater Stopped BitLocker Drive Encryption Service Stopped Block Level Backup Engine Service Stopped CaptureService_108db5 Stopped Cellular Time Stopped COM+ System Application Stopped ConsentUX_108db5 Stopped CredentialEnrollmentManagerUserSvc_108db5 Stopped Device Install Service Stopped Device Management Enrollment Service Stopped Device Management Wireless Application Protocol (WAP) Push message Routing Service Stopped Device Setup Manager Stopped DeviceAssociationBroker_108db5 Stopped DevicePicker_108db5 Stopped DevicesFlow_108db5 Stopped Diagnostic Execution Service Stopped Distributed Transaction Coordinator Stopped Downloaded Maps Manager Stopped Embedded Mode Stopped Enterprise App Management Service Stopped Extensible Authentication Protocol Stopped Fax Stopped File History Service Stopped FlexNet Licensing Service Stopped Function Discovery Provider Host Stopped Function Discovery Resource Publication Stopped GameDVR and Broadcast User Service_108db5 Stopped Google Chrome Elevation Service Stopped Google Update Service (gupdate) Stopped Google Update Service (gupdatem) Stopped GraphicsPerfSvc Stopped Group Policy Client Stopped HV Host Service Stopped Hyper-V Data Exchange Service Stopped Hyper-V Guest Service Interface Stopped Hyper-V Guest Shutdown Service Stopped Hyper-V Heartbeat Service Stopped Hyper-V PowerShell Direct Service Stopped Hyper-V Remote Desktop Virtualization Service Stopped Hyper-V Time Synchronization Service Stopped Hyper-V Volume Shadow Copy Requestor Stopped IKE and AuthIP IPsec Keying Modules Stopped Intel Capability Licensing Service TCP IP Interface Stopped Intel TPM Provisioning Service Stopped Internet Connection Sharing (ICS) Stopped IP Translation Configuration Service Stopped IPsec Policy Agent Stopped KtmRm for Distributed Transaction Coordinator Stopped Language Experience Service Stopped Link-Layer Topology Discovery Mapper Stopped Local Profile Assistant Service Stopped MessagingService_108db5 Stopped Microsoft Diagnostics Hub Standard Collector Service Stopped Microsoft iSCSI Initiator Service Stopped Microsoft Software Shadow Copy Provider Stopped Microsoft Storage Spaces SMP Stopped Microsoft Windows SMS Router Service. Stopped Mozilla Maintenance Service Stopped Natural Authentication Stopped Net.Tcp Port Sharing Service Stopped Netlogon Stopped Network Connected Devices Auto-Setup Stopped Network Connectivity Assistant Stopped Network Setup Service Stopped NVIDIA NetworkService Container Stopped Office Source Engine Stopped OpenSSH Authentication Agent Stopped Optimize drives Stopped Parental Controls Stopped PDFescape Desktop Creator Stopped Peer Name Resolution Protocol Stopped Peer Networking Grouping Stopped Performance Counter DLL Host Stopped Performance Logs & Alerts Stopped PNRP Machine Name Publication Service Stopped Portable Device Enumerator Service Stopped Printer Extensions and Notifications Stopped PrintWorkflow_108db5 Stopped Problem Reports and Solutions Control Panel Support Stopped Recommended Troubleshooting Service Stopped Remote Access Auto Connection Manager Stopped Remote Desktop Services UserMode Port Redirector Stopped Remote Packet Capture Protocol v.0 (experimental) Stopped Remote Procedure Call (RPC) Locator Stopped Remote Registry Stopped Retail Demo Service Stopped Routing and Remote Access Stopped SAMSUNG Mobile USB Connectivity Launcher Stopped Secondary Logon Stopped Sensor Data Service Stopped Sensor Monitoring Service Stopped Sensor Service Stopped Shared PC Account Manager Stopped Smart Card Stopped Smart Card Device Enumeration Service Stopped Smart Card Removal Policy Stopped SNMP Trap Stopped Software Protection Stopped Spatial Data Service Stopped Spot Verifier Stopped Still Image Acquisition Events Stopped Storage Tiers Management Stopped Thunderbolt Service Stopped UPnP Device Host Stopped Virtual Disk Stopped Volume Shadow Copy Stopped Volumetric Audio Compositor Service Stopped WalletService Stopped WarpJITSvc Stopped WebClient Stopped Wi-Fi Direct Services Connection Manager Service Stopped Windows Camera Frame Server Stopped Windows Connect Now - Config Registrar Stopped Windows Defender Antivirus Network Inspection Service Stopped Windows Encryption Provider Host Service Stopped Windows Error Reporting Service Stopped Windows Event Collector Stopped Windows Insider Service Stopped Windows Installer Stopped Windows Management Service Stopped Windows Media Player Network Sharing Service Stopped Windows Mobile Hotspot Service Stopped Windows Modules Installer Stopped Windows Perception Service Stopped Windows Perception Simulation Service Stopped Windows PushToInstall Service Stopped Windows Remote Management (WS-Management) Stopped Windows Update Stopped Windows Update Medic Service Stopped Wired AutoConfig Stopped Work Folders Stopped WWAN AutoConfig Stopped Xbox Accessory Management Service Stopped Xbox Live Auth Manager Stopped Xbox Live Game Save Stopped Xbox Live Networking Service TimeZone TimeZone GMT -5:00 Hours Language English (United States) Location United States Format English (United States) Currency $ Date Format M/d/yyyy Time Format h:mm:ss tt Scheduler 4/5/2020 5:14 AM; AMHelper 4/5/2020 5:15 AM; G2MUploadTask-S-1-5-21-4069724343-2222276012-2846162663-1003 4/5/2020 5:32 AM; GoogleUpdateTaskUserS-1-5-21-4069724343-2222276012-2846162663-1003UA 4/5/2020 5:40 AM; GoogleUpdateTaskMachineUA 4/5/2020 5:46 AM; G2MUpdateTask-S-1-5-21-4069724343-2222276012-2846162663-1003 4/5/2020 7:32 AM; AdobeGCInvoker-1.0 4/5/2020 5:26 PM; OneDrive Standalone Update Task-S-1-5-21-4069724343-2222276012-2846162663-1003 4/5/2020 8:32 PM; GoogleUpdateTaskUserS-1-5-21-4069724343-2222276012-2846162663-1003Core 4/5/2020 8:40 PM; GoogleUpdateTaskMachineCore 4/20/2020 10:29 PM; Driver Easy Scheduled Scan AMSkipUAC Driver Booster Scheduler Driver Booster SkipUAC (Wes Tarpley) Driver Booster Update HWiNFO JavaUpdateSched SamsungMagician Hotfixes Installed 4/5/2020 Realtek - Net - 10.38.117.2020 Realtek Net driver update released in September 2015 4/4/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.753.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 4/3/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.680.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 4/2/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.628.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 4/2/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.609.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 4/1/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.540.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 4/1/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.530.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 4/1/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.526.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/31/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.462.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/31/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.459.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/30/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.431.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/30/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.411.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/30/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.382.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/30/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.370.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/29/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.328.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/28/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.296.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/28/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.271.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/28/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.242.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/27/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.177.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/26/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.117.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/26/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.99.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/25/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.37.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/25/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.26.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/25/2020 2020-03 Cumulative Update for Windows 10 Version 1909 for x64-based Systems (KB4541335) Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. 3/25/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.24.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/25/2020 Update for Windows Defender Antivirus antimalware platform - KB4052623 (Version 4.18.2003.8) This package will update Windows Defender Antivirus antimalware platform’s components on the user machine. 3/25/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.313.8.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/23/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1843.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/23/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1827.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/23/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1811.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/23/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1800.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/22/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1767.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/22/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1752.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/21/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1686.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/21/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1644.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/20/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1622.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/20/2020 Update for Windows Defender Antivirus antimalware platform - KB4052623 (Version 4.18.2003.6) This package will update Windows Defender Antivirus antimalware platform’s components on the user machine. 3/19/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1556.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/19/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1530.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/19/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1527.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/19/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1512.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/18/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1484.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/17/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1387.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/17/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1382.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/15/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1284.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/15/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1278.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/15/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1224.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/14/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1210.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/14/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1182.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/14/2020 2020-03 Cumulative Update for Windows 10 Version 1909 for x64-based Systems (KB4551762) Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. 3/13/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1138.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/13/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1115.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/13/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1101.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/11/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1003.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/11/2020 Windows Malicious Software Removal Tool x64 - March 2020 (KB890830) After the download, this tool runs one time to check your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps remove any infection that is found. If an infection is found, the tool will display a status report the next time that you start your computer. A new version of the tool will be offered every month. If you want to manually run the tool on your computer, you can download a copy from the Microsoft Download Center, or you can run an online version from microsoft.com. This tool is not a replacement for an antivirus product. To help protect your computer, you should use an antivirus product. 3/11/2020 2020-03 Cumulative Update for Windows 10 Version 1909 for x64-based Systems (KB4540673) Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. 3/11/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.918.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/10/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.889.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/9/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.858.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/8/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.804.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/7/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.730.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/7/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.701.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/7/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.695.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/6/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.635.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/5/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.609.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/5/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.560.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/4/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.525.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/4/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.519.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/3/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.446.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/3/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.443.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/3/2020 Update for Windows Defender Antivirus antimalware platform - KB4052623 (Version 4.18.2001.10) This package will update Windows Defender Antivirus antimalware platform’s components on the user machine. 3/3/2020 Update for Windows Defender Antivirus antimalware platform - KB4052623 (Version 4.18.1911.3) This package will update Windows Defender Antivirus antimalware platform’s components on the user machine. 2/29/2020 2020-02 Cumulative Update for Windows 10 Version 1909 for x64-based Systems (KB4535996) Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. 2/29/2020 Feature update to Windows 10, version 1909 Install the latest update for Windows 10: Windows 10, version 1909. 2/29/2020 2020-02 Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 1903 for x64 (KB4537572) Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. 2/29/2020 2020-02 Security Update for Adobe Flash Player for Windows 10 Version 1903 for x64-based Systems (KB4537759) A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 2/29/2020 Windows Malicious Software Removal Tool x64 - February 2020 (KB890830) After the download, this tool runs one time to check your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps remove any infection that is found. If an infection is found, the tool will display a status report the next time that you start your computer. A new version of the tool will be offered every month. If you want to manually run the tool on your computer, you can download a copy from the Microsoft Download Center, or you can run an online version from microsoft.com. This tool is not a replacement for an antivirus product. To help protect your computer, you should use an antivirus product. 2/29/2020 2020-02 Cumulative Update for Windows 10 Version 1903 for x64-based Systems (KB4532693) Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. 2/29/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.273.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/28/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.829.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/27/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.744.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/27/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.733.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/27/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.731.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/27/2019 2019-10 Cumulative Update for Windows 10 Version 1903 for x64-based Systems (KB4522355) Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. 10/27/2019 2019-10 Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 1903 for x64 (KB4522741) Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. 10/27/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.718.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/25/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.576.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/24/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.535.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/23/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.481.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/21/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.304.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/19/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.94.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/18/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.59.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/18/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.305.51.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/17/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.303.1939.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/15/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.303.1752.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/14/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.303.1684.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/14/2019 Update for Windows 10 Version 1903 for x64-based Systems (KB4516421) Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. 10/14/2019 Creative Technology Ltd. - Extension - 5/6/2019 12:00:00 AM - 2.0.0.36 Creative Technology Ltd. Extension driver update released in May 2019 10/14/2019 2019-10 Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 1903 for x64 (KB4524100) Install this update to resolve issues in Windows. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article for more information. After you install this item, you may have to restart your computer. 10/14/2019 Creative Technology Ltd. - SoftwareComponent - 4/8/2019 12:00:00 AM - 2.2.8.0 Creative Technology Ltd. SoftwareComponent driver update released in April 2019 10/14/2019 Creative Technology Ltd. - SoftwareComponent - 4/30/2019 12:00:00 AM - 2.0.0.36 Creative Technology Ltd. SoftwareComponent driver update released in April 2019 10/14/2019 2019-09 Security Update for Adobe Flash Player for Windows 10 Version 1903 for x64-based Systems (KB4516115) A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 10/11/2019 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.303.1474.0) Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 10/11/2019 Feature update to Windows 10, version 1903 Install the latest update for Windows 10: Windows 10, version 1903. Not Installed 3/20/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.1622.0) Installation Status Canceled Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/12/2020 9NCGJX5QLP9M-AppUp.IntelMediaSDKDFP Installation Status Failed 9NCGJX5QLP9M-1152921505688123293 3/11/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.918.0) Installation Status Canceled Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/11/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.918.0) Installation Status Canceled Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 3/3/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.443.0) Installation Status Canceled Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. 2/28/2020 Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.311.273.0) Installation Status Failed Install this update to revise the files that are used to detect viruses, spyware, and other potentially unwanted software. Once you have installed this item, it cannot be removed. System Folders Application Data C:\ProgramData Cookies C:\Users\Wes Tarpley\AppData\Local\Microsoft\Windows\INetCookies Desktop C:\Users\Wes Tarpley\OneDrive\Desktop Documents C:\Users\Public\Documents Fonts C:\WINDOWS\Fonts Global Favorites C:\Users\Wes Tarpley\Favorites Internet History C:\Users\Wes Tarpley\AppData\Local\Microsoft\Windows\History Local Application Data C:\Users\Wes Tarpley\AppData\Local Music C:\Users\Public\Music Path for burning CD C:\Users\Wes Tarpley\AppData\Local\Microsoft\Windows\Burn\Burn Physical Desktop C:\Users\Wes Tarpley\OneDrive\Desktop Pictures C:\Users\Public\Pictures Program Files C:\Program Files Public Desktop C:\Users\Public\Desktop Start Menu C:\ProgramData\Microsoft\Windows\Start Menu Start Menu Programs C:\ProgramData\Microsoft\Windows\Start Menu\Programs Startup C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup Templates C:\ProgramData\Microsoft\Windows\Templates Temporary Internet Files C:\Users\Wes Tarpley\AppData\Local\Microsoft\Windows\INetCache User Favorites C:\Users\Wes Tarpley\Favorites Videos C:\Users\Public\Videos Windows Directory C:\WINDOWS Windows/System C:\WINDOWS\system32 Process List AGMService.exe Process ID 4396 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Common Files\Adobe\AdobeGCClient\AGMService.exe Memory Usage 7.59 MB Peak Memory Usage 12 MB AGSService.exe Process ID 4372 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Common Files\Adobe\AdobeGCClient\AGSService.exe Memory Usage 11 MB Peak Memory Usage 21 MB ALsvc.exe Process ID 4640 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Sophos\AutoUpdate\ALsvc.exe Memory Usage 3.86 MB Peak Memory Usage 9.91 MB AntiMalware.exe Process ID 14184 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\Zemana\AntiMalware\AntiMalware.exe Memory Usage 22 MB Peak Memory Usage 87 MB AppleMobileDeviceService.exe Process ID 4208 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe Memory Usage 8.06 MB Peak Memory Usage 14 MB ApplicationFrameHost.exe Process ID 12072 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\ApplicationFrameHost.exe Memory Usage 59 MB Peak Memory Usage 62 MB audiodg.exe Process ID 31516 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\audiodg.exe Memory Usage 13 MB Peak Memory Usage 14 MB backgroundTaskHost.exe Process ID 26332 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\backgroundTaskHost.exe Memory Usage 21 MB Peak Memory Usage 24 MB Calculator.exe Process ID 21928 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1910.0.0_x64__8wekyb3d8bbwe\Calculator.exe Memory Usage 39 MB Peak Memory Usage 65 MB chrome.exe Process ID 12808 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 13 MB Peak Memory Usage 16 MB chrome.exe Process ID 20188 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 115 MB Peak Memory Usage 158 MB chrome.exe Process ID 29704 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 79 MB Peak Memory Usage 112 MB chrome.exe Process ID 19684 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 36 MB Peak Memory Usage 93 MB chrome.exe Process ID 26596 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 87 MB Peak Memory Usage 211 MB chrome.exe Process ID 26508 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 69 MB Peak Memory Usage 114 MB chrome.exe Process ID 25184 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 45 MB Peak Memory Usage 124 MB chrome.exe Process ID 8048 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 97 MB Peak Memory Usage 190 MB chrome.exe Process ID 28584 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 24 MB Peak Memory Usage 39 MB chrome.exe Process ID 28452 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 79 MB Peak Memory Usage 104 MB chrome.exe Process ID 16652 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 5.89 MB Peak Memory Usage 8.50 MB chrome.exe Process ID 24140 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 28 MB Peak Memory Usage 43 MB chrome.exe Process ID 29356 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 158 MB Peak Memory Usage 375 MB chrome.exe Process ID 27556 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 87 MB Peak Memory Usage 132 MB chrome.exe Process ID 24000 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 36 MB Peak Memory Usage 82 MB chrome.exe Process ID 25164 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 11 MB Peak Memory Usage 22 MB chrome.exe Process ID 22556 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 45 MB Peak Memory Usage 51 MB chrome.exe Process ID 20716 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 28 MB Peak Memory Usage 47 MB chrome.exe Process ID 17648 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 62 MB Peak Memory Usage 116 MB chrome.exe Process ID 18216 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 64 MB Peak Memory Usage 195 MB chrome.exe Process ID 25444 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 279 MB Peak Memory Usage 533 MB chrome.exe Process ID 13908 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 33 MB Peak Memory Usage 100 MB chrome.exe Process ID 15844 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 48 MB Peak Memory Usage 199 MB chrome.exe Process ID 25232 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 38 MB Peak Memory Usage 230 MB chrome.exe Process ID 15460 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 37 MB Peak Memory Usage 99 MB chrome.exe Process ID 13656 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 31 MB Peak Memory Usage 86 MB chrome.exe Process ID 28272 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 97 MB Peak Memory Usage 105 MB chrome.exe Process ID 13060 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 489 MB Peak Memory Usage 602 MB chrome.exe Process ID 17528 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 94 MB Peak Memory Usage 145 MB chrome.exe Process ID 19472 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 88 MB Peak Memory Usage 190 MB chrome.exe Process ID 23848 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 53 MB Peak Memory Usage 377 MB chrome.exe Process ID 23860 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 30 MB Peak Memory Usage 84 MB chrome.exe Process ID 14276 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 32 MB Peak Memory Usage 60 MB chrome.exe Process ID 28412 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 99 MB Peak Memory Usage 170 MB chrome.exe Process ID 18252 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 174 MB Peak Memory Usage 365 MB chrome.exe Process ID 7236 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 62 MB Peak Memory Usage 79 MB chrome.exe Process ID 5668 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 403 MB Peak Memory Usage 474 MB chrome.exe Process ID 15668 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 150 MB Peak Memory Usage 394 MB chrome.exe Process ID 27380 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 30 MB Peak Memory Usage 87 MB chrome.exe Process ID 23636 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 76 MB Peak Memory Usage 144 MB chrome.exe Process ID 16516 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 25 MB Peak Memory Usage 56 MB chrome.exe Process ID 30008 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 45 MB Peak Memory Usage 118 MB chrome.exe Process ID 30156 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 53 MB Peak Memory Usage 67 MB chrome.exe Process ID 3276 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 92 MB Peak Memory Usage 322 MB chrome.exe Process ID 26976 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 212 MB Peak Memory Usage 271 MB chrome.exe Process ID 25788 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 47 MB Peak Memory Usage 99 MB chrome.exe Process ID 24688 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 55 MB Peak Memory Usage 86 MB chrome.exe Process ID 19328 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 54 MB Peak Memory Usage 100 MB chrome.exe Process ID 7884 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 47 MB Peak Memory Usage 150 MB chrome.exe Process ID 15500 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 72 MB Peak Memory Usage 110 MB chrome.exe Process ID 13132 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 36 MB Peak Memory Usage 79 MB chrome.exe Process ID 19712 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 99 MB Peak Memory Usage 125 MB chrome.exe Process ID 28688 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 16 MB Peak Memory Usage 20 MB chrome.exe Process ID 20252 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 32 MB Peak Memory Usage 97 MB chrome.exe Process ID 29548 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 59 MB Peak Memory Usage 123 MB chrome.exe Process ID 8104 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 30 MB Peak Memory Usage 52 MB chrome.exe Process ID 29996 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 153 MB Peak Memory Usage 167 MB chrome.exe Process ID 2500 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 25 MB Peak Memory Usage 91 MB chrome.exe Process ID 23960 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 66 MB Peak Memory Usage 91 MB chrome.exe Process ID 13788 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 35 MB Peak Memory Usage 67 MB chrome.exe Process ID 18952 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 22 MB Peak Memory Usage 44 MB chrome.exe Process ID 30224 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 45 MB Peak Memory Usage 69 MB chrome.exe Process ID 16200 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 186 MB Peak Memory Usage 309 MB chrome.exe Process ID 16440 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 757 MB Peak Memory Usage 839 MB chrome.exe Process ID 2508 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 32 MB Peak Memory Usage 51 MB chrome.exe Process ID 22560 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 44 MB Peak Memory Usage 58 MB chrome.exe Process ID 15832 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 20 MB Peak Memory Usage 36 MB chrome.exe Process ID 13940 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 48 MB Peak Memory Usage 174 MB chrome.exe Process ID 28832 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 37 MB Peak Memory Usage 166 MB chrome.exe Process ID 9960 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 28 MB Peak Memory Usage 57 MB chrome.exe Process ID 15720 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 37 MB Peak Memory Usage 83 MB chrome.exe Process ID 24588 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 33 MB Peak Memory Usage 56 MB chrome.exe Process ID 26520 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 29 MB Peak Memory Usage 47 MB chrome.exe Process ID 4188 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 72 MB Peak Memory Usage 78 MB chrome.exe Process ID 29040 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 39 MB Peak Memory Usage 78 MB chrome.exe Process ID 25044 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 48 MB Peak Memory Usage 102 MB chrome.exe Process ID 20560 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe Memory Usage 439 MB Peak Memory Usage 867 MB CompPkgSrv.exe Process ID 21032 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\CompPkgSrv.exe Memory Usage 7.58 MB Peak Memory Usage 9.94 MB conhost.exe Process ID 13104 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\conhost.exe Memory Usage 1.02 MB Peak Memory Usage 12 MB conhost.exe Process ID 3672 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\conhost.exe Memory Usage 4.19 MB Peak Memory Usage 12 MB Creative.AudPosService.exe Process ID 4216 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Creative\Connection Service\Creative.AudPosService.exe Memory Usage 6.56 MB Peak Memory Usage 12 MB Creative.UWPRPCService.exe Process ID 4652 User SYSTEM Domain NT AUTHORITY Path C:\Windows\SysWOW64\Creative.UWPRPCService.exe Memory Usage 3.99 MB Peak Memory Usage 6.37 MB csrss.exe Process ID 744 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\csrss.exe Memory Usage 3.93 MB Peak Memory Usage 5.74 MB csrss.exe Process ID 852 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\csrss.exe Memory Usage 5.36 MB Peak Memory Usage 45 MB ctfmon.exe Process ID 10456 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\ctfmon.exe Memory Usage 13 MB Peak Memory Usage 16 MB dasHost.exe Process ID 4260 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\dasHost.exe Memory Usage 3.01 MB Peak Memory Usage 5.46 MB dasHost.exe Process ID 9604 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\dasHost.exe Memory Usage 7.30 MB Peak Memory Usage 11 MB DiskMonitor.exe Process ID 13696 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\Hotkey\DiskMonitor.exe Memory Usage 40 MB Peak Memory Usage 44 MB Ditto.exe Process ID 16244 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\Ditto\Ditto.exe Memory Usage 15 MB Peak Memory Usage 28 MB dllhost.exe Process ID 17428 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\dllhost.exe Memory Usage 9.96 MB Peak Memory Usage 12 MB dllhost.exe Process ID 10688 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\dllhost.exe Memory Usage 6.89 MB Peak Memory Usage 11 MB dllhost.exe Process ID 11984 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\dllhost.exe Memory Usage 23 MB Peak Memory Usage 29 MB dwm.exe Process ID 1252 User DWM-1 Domain Window Manager Path C:\Windows\System32\dwm.exe Memory Usage 449 MB Peak Memory Usage 943 MB explorer.exe Process ID 10924 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\explorer.exe Memory Usage 162 MB Peak Memory Usage 211 MB FileCoAuth.exe Process ID 976 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Microsoft\OneDrive\19.232.1124.0010\FileCoAuth.exe Memory Usage 20 MB Peak Memory Usage 21 MB FileZillaServer.exe Process ID 4324 User SYSTEM Domain NT AUTHORITY Path C:\xampp\FileZillaFTP\FileZillaServer.exe Memory Usage 4.50 MB Peak Memory Usage 6.81 MB fontdrvhost.exe Process ID 1180 User UMFD-1 Domain Font Driver Host Path C:\Windows\System32\fontdrvhost.exe Memory Usage 9.59 MB Peak Memory Usage 22 MB fontdrvhost.exe Process ID 676 User UMFD-0 Domain Font Driver Host Path C:\Windows\System32\fontdrvhost.exe Memory Usage 2.46 MB Peak Memory Usage 6.25 MB GoogleCrashHandler.exe Process ID 10956 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Google\Update\1.3.35.452\GoogleCrashHandler.exe Memory Usage 1.10 MB Peak Memory Usage 7.92 MB GoogleCrashHandler.exe Process ID 11036 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Update\1.3.35.452\GoogleCrashHandler.exe Memory Usage 1.31 MB Peak Memory Usage 7.87 MB GoogleCrashHandler64.exe Process ID 13412 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Google\Update\1.3.35.452\GoogleCrashHandler64.exe Memory Usage 1.07 MB Peak Memory Usage 7.96 MB GoogleCrashHandler64.exe Process ID 24904 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Google\Update\1.3.35.452\GoogleCrashHandler64.exe Memory Usage 1.06 MB Peak Memory Usage 7.96 MB HKClipSvc.exe Process ID 4332 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Hotkey\Driver\x64\HKClipSvc.exe Memory Usage 2.96 MB Peak Memory Usage 5.15 MB HkeyTray.exe Process ID 16708 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\Hotkey\HkeyTray.exe Memory Usage 30 MB Peak Memory Usage 55 MB hkysound.exe Process ID 16056 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\Hotkey\hkysound.exe Memory Usage 21 MB Peak Memory Usage 27 MB hmpalert.exe Process ID 9948 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\HitmanPro.Alert\hmpalert.exe Memory Usage 8.06 MB Peak Memory Usage 10 MB hmpalert.exe Process ID 2568 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\HitmanPro.Alert\hmpalert.exe Memory Usage 17 MB Peak Memory Usage 39 MB HotkeyService.exe Process ID 4452 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Hotkey\HotkeyService.exe Memory Usage 18 MB Peak Memory Usage 27 MB httpd.exe Process ID 8156 User SYSTEM Domain NT AUTHORITY Path C:\xampp\apache\bin\httpd.exe Memory Usage 7.63 MB Peak Memory Usage 23 MB httpd.exe Process ID 4360 User SYSTEM Domain NT AUTHORITY Path C:\xampp\apache\bin\httpd.exe Memory Usage 7.98 MB Peak Memory Usage 19 MB HWiNFO64.EXE Process ID 12192 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\HWiNFO64\HWiNFO64.EXE Memory Usage 3.69 MB Peak Memory Usage 54 MB HxOutlook.exe Process ID 25892 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12624.20368.0_x64__8wekyb3d8bbwe\HxOutlook.exe Memory Usage 42 MB Peak Memory Usage 148 MB HxTsr.exe Process ID 5908 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12624.20368.0_x64__8wekyb3d8bbwe\HxTsr.exe Memory Usage 10 MB Peak Memory Usage 104 MB IAStorDataMgrSvc.exe Process ID 13392 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Intel\Intel Rapid Storage Technology\IAStorDataMgrSvc.exe Memory Usage 38 MB Peak Memory Usage 79 MB ibtsiva.exe Process ID 4276 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\ibtsiva.exe Memory Usage 3.39 MB Peak Memory Usage 5.91 MB igfxCUIService.exe Process ID 2216 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_a7428663aca90897\igfxCUIService.exe Memory Usage 5.70 MB Peak Memory Usage 11 MB igfxEM.exe Process ID 10948 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_a7428663aca90897\igfxEM.exe Memory Usage 20 MB Peak Memory Usage 27 MB IntelCpHDCPSvc.exe Process ID 4388 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_9918a671ea92062c\IntelCpHDCPSvc.exe Memory Usage 5.08 MB Peak Memory Usage 8.61 MB IntelCpHeciSvc.exe Process ID 5880 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_9918a671ea92062c\IntelCpHeciSvc.exe Memory Usage 4.80 MB Peak Memory Usage 8.25 MB jhi_service.exe Process ID 18764 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Intel\Intel Management Engine Components\DAL\jhi_service.exe Memory Usage 4.66 MB Peak Memory Usage 7.47 MB jucheck.exe Process ID 20316 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe Memory Usage 9.62 MB Peak Memory Usage 17 MB jusched.exe Process ID 16720 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe Memory Usage 13 MB Peak Memory Usage 20 MB LMS.exe Process ID 18804 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Intel\Intel Management Engine Components\LMS\LMS.exe Memory Usage 7.84 MB Peak Memory Usage 15 MB lsass.exe Process ID 936 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\lsass.exe Memory Usage 19 MB Peak Memory Usage 24 MB MBAMService.exe Process ID 4624 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe Memory Usage 31 MB Peak Memory Usage 240 MB mbamtray.exe Process ID 8380 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe Memory Usage 22 MB Peak Memory Usage 43 MB McsAgent.exe Process ID 4532 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Sophos\Management Communications System\Endpoint\McsAgent.exe Memory Usage 19 MB Peak Memory Usage 24 MB McsClient.exe Process ID 4736 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Program Files (x86)\Sophos\Management Communications System\Endpoint\McsClient.exe Memory Usage 11 MB Peak Memory Usage 15 MB mDNSResponder.exe Process ID 4252 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Bonjour\mDNSResponder.exe Memory Usage 4.97 MB Peak Memory Usage 7.96 MB Memory Compression Process ID 3040 User SYSTEM Domain NT AUTHORITY Memory Usage 1.77 GB Peak Memory Usage 1.93 GB Microsoft.Msn.Weather.exe Process ID 23728 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\WindowsApps\Microsoft.BingWeather_4.36.20714.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe Memory Usage 105 MB Peak Memory Usage 117 MB Microsoft.Notes.exe Process ID 12264 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.7.124.0_x64__8wekyb3d8bbwe\Microsoft.Notes.exe Memory Usage 103 MB Peak Memory Usage 130 MB Microsoft.Photos.exe Process ID 15688 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2020.19081.28230.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe Memory Usage 1.35 MB Peak Memory Usage 118 MB mqsvc.exe Process ID 4680 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\mqsvc.exe Memory Usage 7.45 MB Peak Memory Usage 15 MB msinfo32.exe Process ID 22828 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\msinfo32.exe Memory Usage 113 MB Peak Memory Usage 113 MB MsMpEng.exe Process ID 4744 User SYSTEM Domain NT AUTHORITY Path C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2003.8-0\MsMpEng.exe Memory Usage 33 MB Peak Memory Usage 475 MB mysqld.exe Process ID 4600 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\MySQL\MySQL Server 5.5\bin\mysqld.exe Memory Usage 9.08 MB Peak Memory Usage 24 MB nvcontainer.exe Process ID 6732 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\NVIDIA Corporation\NvContainer\nvcontainer.exe Memory Usage 22 MB Peak Memory Usage 114 MB nvcontainer.exe Process ID 4440 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\NVIDIA Corporation\NvContainer\nvcontainer.exe Memory Usage 14 MB Peak Memory Usage 30 MB nvcontainer.exe Process ID 2024 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\NVIDIA Corporation\NvContainer\nvcontainer.exe Memory Usage 15 MB Peak Memory Usage 27 MB NVDisplay.Container.exe Process ID 2884 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\NVIDIA Corporation\Display.NvContainer\NVDisplay.Container.exe Memory Usage 11 MB Peak Memory Usage 17 MB NVDisplay.Container.exe Process ID 1232 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\NVIDIA Corporation\Display.NvContainer\NVDisplay.Container.exe Memory Usage 24 MB Peak Memory Usage 76 MB NVIDIA Share.exe Process ID 14392 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\NVIDIA Corporation\NVIDIA GeForce Experience\NVIDIA Share.exe Memory Usage 32 MB Peak Memory Usage 60 MB NVIDIA Share.exe Process ID 27568 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\NVIDIA Corporation\NVIDIA GeForce Experience\NVIDIA Share.exe Memory Usage 13 MB Peak Memory Usage 104 MB NVIDIA Share.exe Process ID 23180 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\NVIDIA Corporation\NVIDIA GeForce Experience\NVIDIA Share.exe Memory Usage 28 MB Peak Memory Usage 57 MB NVIDIA Web Helper.exe Process ID 13544 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\NVIDIA Corporation\NvNode\NVIDIA Web Helper.exe Memory Usage 12 MB Peak Memory Usage 60 MB nvsphelper64.exe Process ID 1860 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\NVIDIA Corporation\ShadowPlay\nvsphelper64.exe Memory Usage 8.52 MB Peak Memory Usage 14 MB NvTelemetryContainer.exe Process ID 4468 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Program Files (x86)\NVIDIA Corporation\NvTelemetry\NvTelemetryContainer.exe Memory Usage 10 MB Peak Memory Usage 21 MB OfficeClickToRun.exe Process ID 4768 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe Memory Usage 30 MB Peak Memory Usage 86 MB OneDrive.exe Process ID 16044 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Microsoft\OneDrive\OneDrive.exe Memory Usage 226 MB Peak Memory Usage 300 MB OUTLOOK.EXE Process ID 10892 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Memory Usage 157 MB Peak Memory Usage 284 MB PDFXEdit.exe Process ID 28208 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\Tracker Software\PDF Editor\PDFXEdit.exe Memory Usage 49 MB Peak Memory Usage 439 MB PresentationFontCache.exe Process ID 2948 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe Memory Usage 8.99 MB Peak Memory Usage 21 MB Registry Process ID 120 User SYSTEM Domain NT AUTHORITY Memory Usage 89 MB Peak Memory Usage 360 MB remoting_host.exe Process ID 6108 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Program Files (x86)\Google\Chrome Remote Desktop\82.0.4085.24\remoting_host.exe Memory Usage 18 MB Peak Memory Usage 21 MB remoting_host.exe Process ID 4264 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Google\Chrome Remote Desktop\82.0.4085.24\remoting_host.exe Memory Usage 7.51 MB Peak Memory Usage 12 MB RstMwService.exe Process ID 4504 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\iaahcic.inf_amd64_120314e52c04567c\RstMwService.exe Memory Usage 4.50 MB Peak Memory Usage 8.06 MB RuntimeBroker.exe Process ID 10280 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 19 MB Peak Memory Usage 27 MB RuntimeBroker.exe Process ID 13500 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 32 MB Peak Memory Usage 119 MB RuntimeBroker.exe Process ID 12416 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 24 MB Peak Memory Usage 33 MB RuntimeBroker.exe Process ID 14140 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 24 MB Peak Memory Usage 30 MB RuntimeBroker.exe Process ID 23240 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 20 MB Peak Memory Usage 24 MB RuntimeBroker.exe Process ID 25684 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 14 MB Peak Memory Usage 20 MB RuntimeBroker.exe Process ID 10968 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 15 MB Peak Memory Usage 22 MB RuntimeBroker.exe Process ID 14412 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 14 MB Peak Memory Usage 30 MB RuntimeBroker.exe Process ID 19316 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 15 MB Peak Memory Usage 30 MB RuntimeBroker.exe Process ID 13108 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 44 MB Peak Memory Usage 51 MB RuntimeBroker.exe Process ID 17280 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 25 MB Peak Memory Usage 35 MB RuntimeBroker.exe Process ID 17888 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 24 MB Peak Memory Usage 33 MB RuntimeBroker.exe Process ID 27884 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 39 MB Peak Memory Usage 51 MB SAVAdminService.exe Process ID 4752 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Sophos\Sophos Anti-Virus\SAVAdminService.exe Memory Usage 4.64 MB Peak Memory Usage 10 MB SavService.exe Process ID 3528 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Program Files (x86)\Sophos\Sophos Anti-Virus\SavService.exe Memory Usage 204 MB Peak Memory Usage 395 MB SearchIndexer.exe Process ID 12524 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SearchIndexer.exe Memory Usage 66 MB Peak Memory Usage 134 MB SearchUI.exe Process ID 12628 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe Memory Usage 84 MB Peak Memory Usage 234 MB SearchUI.exe Process ID 10444 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe Memory Usage 125 MB Peak Memory Usage 179 MB SecurityHealthService.exe Process ID 15924 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SecurityHealthService.exe Memory Usage 11 MB Peak Memory Usage 17 MB SecurityHealthSystray.exe Process ID 15808 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\SecurityHealthSystray.exe Memory Usage 6.76 MB Peak Memory Usage 10 MB SEDService.exe Process ID 1852 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Sophos\Endpoint Defense\SEDService.exe Memory Usage 8.21 MB Peak Memory Usage 15 MB services.exe Process ID 916 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\services.exe Memory Usage 8.89 MB Peak Memory Usage 43 MB SettingSyncHost.exe Process ID 13644 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\SettingSyncHost.exe Memory Usage 24 MB Peak Memory Usage 63 MB SgrmBroker.exe Process ID 18392 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SgrmBroker.exe Memory Usage 5.38 MB Peak Memory Usage 7.41 MB ShellExperienceHost.exe Process ID 14396 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe Memory Usage 50 MB Peak Memory Usage 104 MB Signal.exe Process ID 15760 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Programs\signal-desktop\Signal.exe Memory Usage 116 MB Peak Memory Usage 219 MB Signal.exe Process ID 15984 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Programs\signal-desktop\Signal.exe Memory Usage 125 MB Peak Memory Usage 242 MB Signal.exe Process ID 14208 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Programs\signal-desktop\Signal.exe Memory Usage 15 MB Peak Memory Usage 21 MB Signal.exe Process ID 30196 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Local\Programs\signal-desktop\Signal.exe Memory Usage 87 MB Peak Memory Usage 123 MB sihost.exe Process ID 9620 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\sihost.exe Memory Usage 35 MB Peak Memory Usage 39 MB SkypeApp.exe Process ID 13404 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.56.102.0_x64__kzf8qxf38zg5c\SkypeApp.exe Memory Usage 1.01 MB Peak Memory Usage 192 MB SkypeBackgroundHost.exe Process ID 13568 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.56.102.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe Memory Usage KB Peak Memory Usage 12 MB smartscreen.exe Process ID 30996 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\smartscreen.exe Memory Usage 24 MB Peak Memory Usage 25 MB smss.exe Process ID 472 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\smss.exe Memory Usage 820 KB Peak Memory Usage 2.07 MB SnippingTool.exe Process ID 29860 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\SnippingTool.exe Memory Usage 54 MB Peak Memory Usage 72 MB SophosCleanM.exe Process ID 4660 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Sophos\Clean\SophosCleanM.exe Memory Usage 5.88 MB Peak Memory Usage 9.56 MB SophosFileScanner.exe Process ID 10784 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Program Files\Sophos\Sophos File Scanner\SophosFileScanner.exe Memory Usage 106 MB Peak Memory Usage 222 MB SophosFileScanner.exe Process ID 29808 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Program Files\Sophos\Sophos File Scanner\SophosFileScanner.exe Memory Usage 7.53 MB Peak Memory Usage 11 MB SophosFS.exe Process ID 4548 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Program Files\Sophos\Sophos File Scanner\SophosFS.exe Memory Usage 5.17 MB Peak Memory Usage 11 MB SophosHealth.exe Process ID 4556 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Program Files (x86)\Sophos\Health\SophosHealth.exe Memory Usage 7.23 MB Peak Memory Usage 11 MB SophosNtpService.exe Process ID 4704 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Program Files\Sophos\Sophos Network Threat Protection\SophosNtpService.exe Memory Usage 15 MB Peak Memory Usage 29 MB SophosSafestore64.exe Process ID 4576 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Sophos\Safestore\SophosSafestore64.exe Memory Usage 6.18 MB Peak Memory Usage 11 MB SophosUI.exe Process ID 16744 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\Sophos\Sophos Home\SophosUI.exe Memory Usage 15 MB Peak Memory Usage 23 MB Speccy64.exe Process ID 640 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\Speccy\Speccy64.exe Memory Usage 34 MB Peak Memory Usage 35 MB spoolsv.exe Process ID 2584 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\spoolsv.exe Memory Usage 12 MB Peak Memory Usage 21 MB sqlwriter.exe Process ID 4696 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe Memory Usage 5.29 MB Peak Memory Usage 9.23 MB ss_conn_service.exe Process ID 4616 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Samsung\USB Drivers\27_ssconn\conn\ss_conn_service.exe Memory Usage 5.07 MB Peak Memory Usage 7.92 MB ss_conn_service2.exe Process ID 4588 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Samsung\USB Drivers\28_ssconn2\conn\ss_conn_service2.exe Memory Usage 5.80 MB Peak Memory Usage 7.97 MB SSPService.exe Process ID 4776 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Sophos\Endpoint Defense\SSPService.exe Memory Usage 31 MB Peak Memory Usage 40 MB StartMenuExperienceHost.exe Process ID 8348 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe Memory Usage 83 MB Peak Memory Usage 105 MB svchost.exe Process ID 18312 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 25 MB svchost.exe Process ID 16216 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 15 MB Peak Memory Usage 40 MB svchost.exe Process ID 15244 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 16 MB svchost.exe Process ID 928 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\svchost.exe Memory Usage 37 MB Peak Memory Usage 44 MB svchost.exe Process ID 8556 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 17 MB svchost.exe Process ID 92 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\svchost.exe Memory Usage 26 MB Peak Memory Usage 36 MB svchost.exe Process ID 9920 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 4.95 MB Peak Memory Usage 9.07 MB svchost.exe Process ID 6416 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 3.38 MB Peak Memory Usage 6.68 MB svchost.exe Process ID 5136 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.40 MB Peak Memory Usage 9.11 MB svchost.exe Process ID 17740 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 17 MB Peak Memory Usage 18 MB svchost.exe Process ID 19236 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.34 MB Peak Memory Usage 12 MB svchost.exe Process ID 25860 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.92 MB Peak Memory Usage 8.95 MB svchost.exe Process ID 4760 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 3.80 MB Peak Memory Usage 6.79 MB svchost.exe Process ID 20456 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.03 MB Peak Memory Usage 8.43 MB svchost.exe Process ID 17016 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 16 MB Peak Memory Usage 22 MB svchost.exe Process ID 9700 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.01 MB Peak Memory Usage 14 MB svchost.exe Process ID 4728 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 16 MB Peak Memory Usage 22 MB svchost.exe Process ID 2240 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.45 MB Peak Memory Usage 13 MB svchost.exe Process ID 22496 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.43 MB Peak Memory Usage 9.43 MB svchost.exe Process ID 20504 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.77 MB Peak Memory Usage 10 MB svchost.exe Process ID 16564 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.05 MB Peak Memory Usage 12 MB svchost.exe Process ID 4720 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.97 MB Peak Memory Usage 10 MB svchost.exe Process ID 4712 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 4.56 MB Peak Memory Usage 8.50 MB svchost.exe Process ID 31376 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 12 MB svchost.exe Process ID 31340 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.92 MB Peak Memory Usage 6.93 MB svchost.exe Process ID 18084 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 40 MB svchost.exe Process ID 30932 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.14 MB Peak Memory Usage 6.15 MB svchost.exe Process ID 4608 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.09 MB Peak Memory Usage 12 MB svchost.exe Process ID 4540 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.50 MB Peak Memory Usage 14 MB svchost.exe Process ID 4520 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 3.74 MB Peak Memory Usage 7.85 MB svchost.exe Process ID 28816 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.36 MB Peak Memory Usage 11 MB svchost.exe Process ID 4404 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 52 MB svchost.exe Process ID 4240 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 36 MB Peak Memory Usage 63 MB svchost.exe Process ID 3632 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 28 MB svchost.exe Process ID 3316 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.57 MB Peak Memory Usage 18 MB svchost.exe Process ID 3976 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 15 MB svchost.exe Process ID 3940 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 13 MB Peak Memory Usage 20 MB svchost.exe Process ID 3808 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.45 MB Peak Memory Usage 12 MB svchost.exe Process ID 3800 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 4.88 MB Peak Memory Usage 7.91 MB svchost.exe Process ID 3760 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.95 MB Peak Memory Usage 11 MB svchost.exe Process ID 3444 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 16 MB Peak Memory Usage 20 MB svchost.exe Process ID 3088 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.80 MB Peak Memory Usage 20 MB svchost.exe Process ID 3080 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.46 MB Peak Memory Usage 9.83 MB svchost.exe Process ID 2232 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 31 MB Peak Memory Usage 42 MB svchost.exe Process ID 1684 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.54 MB Peak Memory Usage 9.81 MB svchost.exe Process ID 2980 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.28 MB Peak Memory Usage 9.37 MB svchost.exe Process ID 2972 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 4.08 MB Peak Memory Usage 6.91 MB svchost.exe Process ID 2964 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 23 MB svchost.exe Process ID 2644 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.12 MB Peak Memory Usage 9.61 MB svchost.exe Process ID 2536 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.62 MB Peak Memory Usage 10 MB svchost.exe Process ID 2364 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 4.38 MB Peak Memory Usage 8.52 MB svchost.exe Process ID 2352 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.73 MB Peak Memory Usage 10 MB svchost.exe Process ID 2272 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.65 MB Peak Memory Usage 9.38 MB svchost.exe Process ID 2256 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 29 MB Peak Memory Usage 35 MB svchost.exe Process ID 208 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 16 MB Peak Memory Usage 16 MB svchost.exe Process ID 2064 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.71 MB Peak Memory Usage 8.84 MB svchost.exe Process ID 1972 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.53 MB Peak Memory Usage 13 MB svchost.exe Process ID 1704 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.45 MB Peak Memory Usage 10 MB svchost.exe Process ID 1644 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.52 MB Peak Memory Usage 11 MB svchost.exe Process ID 1088 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 4.53 MB Peak Memory Usage 7.85 MB svchost.exe Process ID 1964 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 18 MB Peak Memory Usage 23 MB svchost.exe Process ID 1920 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.04 MB Peak Memory Usage 8.91 MB svchost.exe Process ID 1912 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 4.48 MB Peak Memory Usage 7.13 MB svchost.exe Process ID 1820 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.58 MB Peak Memory Usage 10 MB svchost.exe Process ID 1752 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.08 MB Peak Memory Usage 12 MB svchost.exe Process ID 1728 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.01 MB Peak Memory Usage 11 MB svchost.exe Process ID 1636 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.91 MB Peak Memory Usage 8.83 MB svchost.exe Process ID 1608 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 4.03 MB Peak Memory Usage 7.19 MB svchost.exe Process ID 1580 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.99 MB Peak Memory Usage 13 MB svchost.exe Process ID 1552 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.88 MB Peak Memory Usage 9.84 MB svchost.exe Process ID 1532 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 43 MB svchost.exe Process ID 1424 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.47 MB Peak Memory Usage 13 MB svchost.exe Process ID 1416 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.95 MB Peak Memory Usage 12 MB svchost.exe Process ID 1352 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.49 MB Peak Memory Usage 13 MB svchost.exe Process ID 1344 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.26 MB Peak Memory Usage 13 MB svchost.exe Process ID 1336 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.21 MB Peak Memory Usage 10 MB svchost.exe Process ID 1320 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 4.33 MB Peak Memory Usage 6.78 MB svchost.exe Process ID 1292 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.03 MB Peak Memory Usage 12 MB svchost.exe Process ID 1080 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.87 MB Peak Memory Usage 12 MB svchost.exe Process ID 1044 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 21 MB Peak Memory Usage 23 MB svchost.exe Process ID 4340 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 44 MB Peak Memory Usage 179 MB svchost.exe Process ID 656 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 37 MB Peak Memory Usage 55 MB svchost.exe Process ID 88 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 2.85 MB Peak Memory Usage 5.06 MB svchost.exe Process ID 1328 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\svchost.exe Memory Usage 6.46 MB Peak Memory Usage 9.74 MB svchost.exe Process ID 2184 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.68 MB Peak Memory Usage 9.65 MB svchost.exe Process ID 13216 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 16 MB Peak Memory Usage 21 MB svchost.exe Process ID 11664 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\svchost.exe Memory Usage 19 MB Peak Memory Usage 63 MB svchost.exe Process ID 11540 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 18 MB svchost.exe Process ID 11492 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\svchost.exe Memory Usage 30 MB Peak Memory Usage 37 MB svchost.exe Process ID 10304 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.34 MB Peak Memory Usage 108 MB svchost.exe Process ID 10980 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 21 MB svchost.exe Process ID 10292 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 4.95 MB Peak Memory Usage 9.22 MB svchost.exe Process ID 9720 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 17 MB Peak Memory Usage 24 MB swc_service.exe Process ID 4568 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Sophos\Sophos Anti-Virus\Web Control\swc_service.exe Memory Usage 6.97 MB Peak Memory Usage 9.64 MB swi_fc.exe Process ID 5032 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Common Files\Sophos\Web Intelligence\swi_fc.exe Memory Usage 15 MB Peak Memory Usage 150 MB swi_filter.exe Process ID 4688 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Sophos\Sophos Anti-Virus\Web Intelligence\swi_filter.exe Memory Usage 4.52 MB Peak Memory Usage 9.99 MB swi_service.exe Process ID 4632 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Sophos\Sophos Anti-Virus\Web Intelligence\swi_service.exe Memory Usage 13 MB Peak Memory Usage 29 MB SynTPEnh.exe Process ID 10992 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\SynTPEnh.exe Memory Usage 14 MB Peak Memory Usage 22 MB SynTPEnhService.exe Process ID 2848 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SynTPEnhService.exe Memory Usage 6.09 MB Peak Memory Usage 15 MB SynTPHelper.exe Process ID 11520 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\SynTPHelper.exe Memory Usage 4.02 MB Peak Memory Usage 7.55 MB System Process ID 4 Memory Usage 20 MB Peak Memory Usage 34 MB System Idle Process Process ID 0 SystemSettings.exe Process ID 26016 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\ImmersiveControlPanel\SystemSettings.exe Memory Usage 444 KB Peak Memory Usage 96 MB SystemSettingsBroker.exe Process ID 11328 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\SystemSettingsBroker.exe Memory Usage 23 MB Peak Memory Usage 33 MB taskhostw.exe Process ID 4428 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\taskhostw.exe Memory Usage 17 MB Peak Memory Usage 20 MB Taskmgr.exe Process ID 21132 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\System32\Taskmgr.exe Memory Usage 55 MB Peak Memory Usage 110 MB unsecapp.exe Process ID 6504 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\wbem\unsecapp.exe Memory Usage 5.04 MB Peak Memory Usage 8.04 MB updater-ws.exe Process ID 4496 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\PDFescape Desktop\updater-ws.exe Memory Usage 12 MB Peak Memory Usage 19 MB WindowsInternal.ComposableShell.Experiences.TextInput.InputApp.exe Process ID 3372 User Wes Tarpley Domain CAPCOM14 Path C:\Windows\SystemApps\InputApp_cw5n1h2txyewy\WindowsInternal.ComposableShell.Experiences.TextInput.InputApp.exe Memory Usage 27 MB Peak Memory Usage 49 MB wininit.exe Process ID 844 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\wininit.exe Memory Usage 3.94 MB Peak Memory Usage 7.38 MB winlogon.exe Process ID 1128 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\winlogon.exe Memory Usage 8.24 MB Peak Memory Usage 37 MB WinStore.App.exe Process ID 19204 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\WindowsApps\Microsoft.WindowsStore_12003.1001.1.0_x64__8wekyb3d8bbwe\WinStore.App.exe Memory Usage 800 KB Peak Memory Usage 136 MB wlanext.exe Process ID 3464 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\wlanext.exe Memory Usage 4.04 MB Peak Memory Usage 6.80 MB WmiApSrv.exe Process ID 31028 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\wbem\WmiApSrv.exe Memory Usage 9.47 MB Peak Memory Usage 9.49 MB WmiPrvSE.exe Process ID 6764 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\System32\wbem\WmiPrvSE.exe Memory Usage 34 MB Peak Memory Usage 39 MB WmiPrvSE.exe Process ID 17320 User SYSTEM Domain NT AUTHORITY Path C:\Windows\SysWOW64\wbem\WmiPrvSE.exe Memory Usage 47 MB Peak Memory Usage 48 MB WmiPrvSE.exe Process ID 3408 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\wbem\WmiPrvSE.exe Memory Usage 10 MB Peak Memory Usage 12 MB WmiPrvSE.exe Process ID 18268 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\SysWOW64\wbem\WmiPrvSE.exe Memory Usage 8.55 MB Peak Memory Usage 14 MB ws.exe Process ID 6816 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\PDFescape Desktop\ws.exe Memory Usage 11 MB Peak Memory Usage 17 MB WUDFHost.exe Process ID 12536 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\WUDFHost.exe Memory Usage 6.57 MB Peak Memory Usage 9.71 MB WUDFHost.exe Process ID 688 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\WUDFHost.exe Memory Usage 6.75 MB Peak Memory Usage 11 MB wweb32.exe Process ID 6556 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files (x86)\WordWeb\wweb32.exe Memory Usage 9.84 MB Peak Memory Usage 16 MB XtuService.exe Process ID 18400 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Intel\Intel Extreme Tuning Utility\XtuService.exe Memory Usage 16 MB Peak Memory Usage 54 MB YourPhone.exe Process ID 13636 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\WindowsApps\Microsoft.YourPhone_1.20022.82.0_x64__8wekyb3d8bbwe\YourPhone.exe Memory Usage 440 KB Peak Memory Usage 43 MB YourPhoneServer.exe Process ID 23392 User Wes Tarpley Domain CAPCOM14 Path C:\Program Files\WindowsApps\Microsoft.YourPhone_1.20022.82.0_x64__8wekyb3d8bbwe\YourPhoneServer\YourPhoneServer.exe Memory Usage 9.43 MB Peak Memory Usage 16 MB Zoom.exe Process ID 23864 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Roaming\Zoom\bin\Zoom.exe Memory Usage 50 MB Peak Memory Usage 117 MB Zoom.exe Process ID 10504 User Wes Tarpley Domain CAPCOM14 Path C:\Users\Wes Tarpley\AppData\Roaming\Zoom\bin\Zoom.exe Memory Usage 47 MB Peak Memory Usage 81 MB Device Tree ACPI x64-based PC Microsoft ACPI-Compliant System ACPI Fixed Feature Button ACPI Lid ACPI Power Button ACPI Processor Aggregator ACPI Sleep Button ACPI Thermal Zone Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Extreme Tuning Utility Device Driver Microsoft AC Adapter Microsoft Surface ACPI-Compliant Control Method Battery Microsoft Windows Management Interface for ACPI Microsoft Windows Management Interface for ACPI Motherboard resources Motherboard resources Trusted Platform Module 2.0 Insyde Airplane Mode HID Mini-Driver HID-compliant wireless radio controls PCI Express Root Complex Intel 100 Series/C230 Series Chipset Family PMC - A121 Intel 100 Series/C230 Series Chipset Family Thermal subsystem - A131 Intel Host Bridge/DRAM Registers - 5910 Intel Management Engine Interface Microsoft Windows Management Interface for ACPI Microsoft Windows Management Interface for ACPI Motherboard resources Motherboard resources Motherboard resources Synaptics SMBus Driver Intel(R) PCIe Controller (x16) - 1901 NVIDIA GeForce GTX 1070 Generic PnP Monitor High Definition Audio Controller NVIDIA High Definition Audio ASUS PB278 (3- NVIDIA High Definition Audio) Intel(R) HD Graphics 630 Generic PnP Monitor Intel Graphics Control Panel Intel Media SDK binaries Intel(R) USB 3.0 eXtensible Host Controller - 1.0 (Microsoft) USB Root Hub (USB 3.0) USB Input Device Logitech USB TrackMan Wheel USB Composite Device U.are.U 4000B Fingerprint Reader (WBF) USB Input Device HID Keyboard Device USB Input Device HID-compliant consumer control device HID-compliant system controller USB Composite Device Chicony USB 2.0 Camera Intel(R) Wireless Bluetooth(R) Bluetooth Device (Personal Area Network) Microsoft Bluetooth LE Enumerator Bluetooth Device (RFCOMM Protocol TDI) Standard Serial over Bluetooth link (COM3) Standard Serial over Bluetooth link (COM4) Standard Serial over Bluetooth link (COM5) Standard Serial over Bluetooth link (COM6) Microsoft Bluetooth Enumerator 808 TLS 808 TLS Avrcp Transport 808 TLS Avrcp Transport 808 TLS Stereo Anker SoundCore Sport Anker SoundCore Sport Avrcp Transport Anker SoundCore Sport Avrcp Transport Anker SoundCore Sport Stereo Anker SoundCore Sport Hands-Free AG Anker SoundCore Sport Hands-Free AG Audio 808 TLS Hands-Free AG 808 TLS Hands-Free AG Audio Intel(R) 100 Series/C230 Chipset Family SATA AHCI Controller HGST HTS721010A9E630 Intel(R) 100 Series/C230 Series Chipset Family PCI Express Root Port #1 - A110 PCI-to-PCI Bridge PCI-to-PCI Bridge PCI-to-PCI Bridge PCI-to-PCI Bridge Intel(R) USB 3.1 eXtensible Host Controller - 1.10 (Microsoft) USB Root Hub (USB 3.0) Generic USB Hub Generic SuperSpeed USB Hub Realtek USB GbE Family Controller USB Mass Storage Device Generic STORAGE DEVICE USB Device Generic STORAGE DEVICE USB Device Intel(R) 100 Series/C230 Series Chipset Family PCI Express Root Port #5 - A114 Realtek PCIe GbE Family Controller Intel(R) 100 Series/C230 Series Chipset Family PCI Express Root Port #6 - A115 Realtek PCIE CardReader Intel(R) 100 Series/C230 Series Chipset Family PCI Express Root Port #7 - A116 Intel(R) Dual Band Wireless-AC 8265 Microsoft Wi-Fi Direct Virtual Adapter #3 Microsoft Wi-Fi Direct Virtual Adapter #4 Intel(R) 100 Series/C230 Series Chipset Family PCI Express Root Port #9 - A118 Samsung NVMe Controller Samsung SSD 960 EVO 250GB Intel(R) 100 Series/C230 Series Chipset Family LPC Controller (HM175) - A152 High precision event timer Intel Watchdog Timer Driver (Intel WDT) Legacy device Microsoft ACPI-Compliant Embedded Controller Motherboard resources Motherboard resources Numeric data processor Programmable interrupt controller Standard PS/2 Keyboard System CMOS/real time clock System timer Synaptics SMBus TouchPad SynTP_00 High Definition Audio Controller Intel Display Audio Realtek High Definition Audio Creative Audio Effects Component Microphone (Realtek High Definition Audio) Sound Blaster Connect Speakers (Realtek High Definition Audio) Microsoft UEFI-Compliant System System Firmware CPU Intel Core i7 7700HQ Cores 4 Threads 8 Name Intel Core i7 7700HQ Code Name Kaby Lake Package Socket 1440 FCBGA Technology 14nm Specification Intel Core i7-7700HQ CPU @ 2.80GHz Family 6 Extended Family 6 Model E Extended Model 9E Stepping 9 Revision B0 Instructions MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, Intel 64, NX, VMX, AES, AVX, AVX2, FMA3 Virtualization Supported, Enabled Hyperthreading Supported, Enabled Bus Speed 99.7 MHz Stock Core Speed 2800 MHz Stock Bus Speed 100 MHz Average Temperature 52 °C Caches L1 Data Cache Size 4 x 32 KBytes L1 Instructions Cache Size 4 x 32 KBytes L2 Unified Cache Size 4 x 256 KBytes L3 Unified Cache Size 6144 KBytes Cores Core 0 Core Speed 3588.6 MHz Multiplier x 36.0 Bus Speed 99.7 MHz Temperature 53 °C Threads APIC ID: 0, 1 Core 1 Core Speed 3588.6 MHz Multiplier x 36.0 Bus Speed 99.7 MHz Temperature 52 °C Threads APIC ID: 2, 3 Core 2 Core Speed 3389.2 MHz Multiplier x 34.0 Bus Speed 99.7 MHz Temperature 52 °C Threads APIC ID: 4, 5 Core 3 Core Speed 3488.9 MHz Multiplier x 35.0 Bus Speed 99.7 MHz Temperature 52 °C Threads APIC ID: 6, 7 RAM Memory slots Total memory slots 2 Used memory slots 2 Free memory slots 0 Memory Type Unknown Size 16384 MBytes Channels # Dual DRAM Frequency 1196.3 MHz CAS# Latency (CL) 17 clocks RAS# to CAS# Delay (tRCD) 17 clocks RAS# Precharge (tRP) 17 clocks Cycle Time (tRAS) 39 clocks Command Rate (CR) 2T Physical Memory Memory Usage 74 % Total Physical 16 GB Available Physical 4.10 GB Total Virtual 25 GB Available Virtual 4.19 GB SPD Number Of SPD Modules 2 Slot #1 Type Unknown Size 8192 MBytes Manufacturer Unknown Max Bandwidth DDR4-2400 (1200 MHz) Timing table JEDEC #1 Frequency 727.3 MHz CAS# Latency 10.0 RAS# To CAS# 10 RAS# Precharge 10 tRAS 24 tRC 34 Voltage 1.200 V JEDEC #2 Frequency 800.0 MHz CAS# Latency 11.0 RAS# To CAS# 11 RAS# Precharge 11 tRAS 26 tRC 37 Voltage 1.200 V JEDEC #3 Frequency 872.7 MHz CAS# Latency 12.0 RAS# To CAS# 12 RAS# Precharge 12 tRAS 28 tRC 40 Voltage 1.200 V JEDEC #4 Frequency 945.5 MHz CAS# Latency 13.0 RAS# To CAS# 13 RAS# Precharge 13 tRAS 31 tRC 44 Voltage 1.200 V JEDEC #5 Frequency 1018.2 MHz CAS# Latency 14.0 RAS# To CAS# 14 RAS# Precharge 14 tRAS 33 tRC 47 Voltage 1.200 V JEDEC #6 Frequency 1090.9 MHz CAS# Latency 15.0 RAS# To CAS# 15 RAS# Precharge 15 tRAS 35 tRC 50 Voltage 1.200 V JEDEC #7 Frequency 1163.6 MHz CAS# Latency 16.0 RAS# To CAS# 16 RAS# Precharge 16 tRAS 38 tRC 54 Voltage 1.200 V JEDEC #8 Frequency 1200.5 MHz CAS# Latency 17.0 RAS# To CAS# 17 RAS# Precharge 17 tRAS 39 tRC 55 Voltage 1.200 V JEDEC #9 Frequency 1200.5 MHz CAS# Latency 18.0 RAS# To CAS# 17 RAS# Precharge 17 tRAS 39 tRC 55 Voltage 1.200 V Slot #2 Type Unknown Size 8192 MBytes Manufacturer Unknown Max Bandwidth DDR4-2400 (1200 MHz) Timing table JEDEC #1 Frequency 727.3 MHz CAS# Latency 10.0 RAS# To CAS# 10 RAS# Precharge 10 tRAS 24 tRC 34 Voltage 1.200 V JEDEC #2 Frequency 800.0 MHz CAS# Latency 11.0 RAS# To CAS# 11 RAS# Precharge 11 tRAS 26 tRC 37 Voltage 1.200 V JEDEC #3 Frequency 872.7 MHz CAS# Latency 12.0 RAS# To CAS# 12 RAS# Precharge 12 tRAS 28 tRC 40 Voltage 1.200 V JEDEC #4 Frequency 945.5 MHz CAS# Latency 13.0 RAS# To CAS# 13 RAS# Precharge 13 tRAS 31 tRC 44 Voltage 1.200 V JEDEC #5 Frequency 1018.2 MHz CAS# Latency 14.0 RAS# To CAS# 14 RAS# Precharge 14 tRAS 33 tRC 47 Voltage 1.200 V JEDEC #6 Frequency 1090.9 MHz CAS# Latency 15.0 RAS# To CAS# 15 RAS# Precharge 15 tRAS 35 tRC 50 Voltage 1.200 V JEDEC #7 Frequency 1163.6 MHz CAS# Latency 16.0 RAS# To CAS# 16 RAS# Precharge 16 tRAS 38 tRC 54 Voltage 1.200 V JEDEC #8 Frequency 1200.5 MHz CAS# Latency 17.0 RAS# To CAS# 17 RAS# Precharge 17 tRAS 39 tRC 55 Voltage 1.200 V JEDEC #9 Frequency 1200.5 MHz CAS# Latency 18.0 RAS# To CAS# 17 RAS# Precharge 17 tRAS 39 tRC 55 Voltage 1.200 V JEDEC #10 Frequency 1200.5 MHz CAS# Latency 19.0 RAS# To CAS# 17 RAS# Precharge 17 tRAS 39 tRC 55 Voltage 1.200 V JEDEC #11 Frequency 1200.5 MHz CAS# Latency 20.0 RAS# To CAS# 17 RAS# Precharge 17 tRAS 39 tRC 55 Voltage 1.200 V JEDEC #12 Frequency 1200.5 MHz CAS# Latency 21.0 RAS# To CAS# 17 RAS# Precharge 17 tRAS 39 tRC 55 Voltage 1.200 V JEDEC #13 Frequency 1200.5 MHz CAS# Latency 22.0 RAS# To CAS# 17 RAS# Precharge 17 tRAS 39 tRC 55 Voltage 1.200 V Motherboard Manufacturer Clevo Model 1710 (U3E1) Version 1.0 Chipset Vendor Intel Chipset Model Kaby Lake Chipset Revision 05 Southbridge Vendor Intel Southbridge Model HM175 Southbridge Revision 31 BIOS Brand American Megatrends Inc. Version 1.05.05 Date 6/23/2017 PCI Data Slot PCI-E Slot Type PCI-E Slot Usage In Use Data lanes x16 Slot Designation U39A Characteristics 3.3V, Shared, PME Slot Number 0 Slot PCI-E x4 Slot Type PCI-E x4 Slot Usage In Use Data lanes x4 Slot Designation U55A Characteristics 3.3V, Shared, PME Slot Number 1 Slot PCI-E Slot Type PCI-E Slot Usage In Use Data lanes x1 Slot Designation KU3 Characteristics 3.3V, Shared, PME Slot Number 2 Slot PCI-E x4 Slot Type PCI-E x4 Slot Usage In Use Data lanes x4 Slot Designation J_SSD1 Characteristics 3.3V, Shared, PME Slot Number 3 Slot PCI-E Slot Type PCI-E Slot Usage In Use Data lanes x1 Slot Designation J_WLAN1 Characteristics 3.3V, Shared, PME Slot Number 4 Slot PCI-E Slot Type PCI-E Slot Usage In Use Data lanes x1 Slot Designation J_WLAN1 Characteristics 3.3V, Shared, PME Slot Number 5 Slot PCI-E x4 Slot Type PCI-E x4 Slot Usage In Use Data lanes x4 Slot Designation J_SSD2 Characteristics 3.3V, Shared, PME Slot Number 6 Graphics Monitor 1 Name Generic PnP Monitor on Intel HD Graphics 630 Current Resolution 1920x1080 pixels Work Resolution 1920x1080 pixels State Enabled Multiple displays Extended, Primary, Enabled Monitor Width 1920 Monitor Height 1080 Monitor BPP 32 bits per pixel Monitor Frequency 60 Hz Device \\.\DISPLAY1\Monitor0 Monitor 2 Name ASUS PB278 on NVIDIA GeForce GTX 1070 Current Resolution 2560x1440 pixels Work Resolution 2560x1440 pixels State Enabled Multiple displays Extended, Secondary, Enabled Monitor Width 2560 Monitor Height 1440 Monitor BPP 32 bits per pixel Monitor Frequency 59 Hz Device \\.\DISPLAY8\Monitor0 Intel HD Graphics 630 Manufacturer Intel Model HD Graphics 630 Device ID 8086-591B Revision 5 Subvendor CLEVO/KAPOK Computer (1558) Current Performance Level Level 0 Driver version 25.20.100.6577 Count of performance levels : 1 Level 1 - "Perf Level 0" NVIDIA GeForce GTX 1070 Manufacturer NVIDIA Model GeForce GTX 1070 Device ID 10DE-1BA1 Revision A2 Subvendor CLEVO/KAPOK Computer (1558) Current Performance Level Level 0 Bus Interface PCI Express x16 Temperature 44 °C Driver version 26.21.14.4219 BIOS Version 86.04.6e.00.0a Memory 4095 MB Count of performance levels : 1 Level 1 - "Perf Level 0" Storage Hard drives HGST HTS721010A9E630 Manufacturer Hitachi Product Family Unknown Series Prefix Standard Model Capacity For This Specific Drive S70GB Heads 16 Cylinders 121,601 Tracks 31,008,255 Sectors 1,953,520,065 SATA type SATA-III 6.0Gb/s Device type Fixed ATA Standard ATA8-ACS Serial Number JS1007620SK94W Firmware Version Number JB0OA3U0 LBA Size 48-bit LBA Power On Count 609 times Power On Time 69.4 days Speed 7200 RPM Features S.M.A.R.T., APM, NCQ Max. Transfer Mode SATA III 6.0Gb/s Used Transfer Mode SATA III 6.0Gb/s Interface SATA Capacity 931 GB Real size 1,000,204,886,016 bytes RAID Type None S.M.A.R.T Status Good Temperature 33 °C Temperature Range OK (less than 50 °C) S.M.A.R.T attributes 01 Attribute name Read Error Rate Real value 0 Current 100 Worst 100 Threshold 62 Raw Value 0000000000 Status Good 02 Attribute name Throughput Performance Real value 0 Current 100 Worst 100 Threshold 40 Raw Value 0000000000 Status Good 03 Attribute name Spin-Up Time Real value 2 ms Current 122 Worst 122 Threshold 33 Raw Value 0000000002 Status Good 04 Attribute name Start/Stop Count Real value 3,922 Current 98 Worst 98 Threshold 0 Raw Value 0000000F52 Status Good 05 Attribute name Reallocated Sectors Count Real value 0 Current 100 Worst 100 Threshold 5 Raw Value 0000000000 Status Good 07 Attribute name Seek Error Rate Real value 0 Current 100 Worst 100 Threshold 67 Raw Value 0000000000 Status Good 08 Attribute name Seek Time Performance Real value 0 Current 100 Worst 100 Threshold 40 Raw Value 0000000000 Status Good 09 Attribute name Power-On Hours (POH) Real value 69d 9h Current 97 Worst 97 Threshold 0 Raw Value 0000000681 Status Good 0A Attribute name Spin Retry Count Real value 0 Current 100 Worst 100 Threshold 60 Raw Value 0000000000 Status Good 0C Attribute name Device Power Cycle Count Real value 609 Current 100 Worst 100 Threshold 0 Raw Value 0000000261 Status Good BF Attribute name G-sense error rate Real value 1 Current 100 Worst 100 Threshold 0 Raw Value 0000000001 Status Good C0 Attribute name Power-off Retract Count Real value 6 Current 100 Worst 100 Threshold 0 Raw Value 0000000006 Status Good C1 Attribute name Load/Unload Cycle Count Real value 11,185 Current 99 Worst 99 Threshold 0 Raw Value 0000002BB1 Status Good C2 Attribute name Temperature Real value 33 °C Current 181 Worst 181 Threshold 0 Raw Value 00000E0021 Status Good C4 Attribute name Reallocation Event Count Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good C5 Attribute name Current Pending Sector Count Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good C6 Attribute name Uncorrectable Sector Count Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good C7 Attribute name UltraDMA CRC Error Count Real value 0 Current 200 Worst 200 Threshold 0 Raw Value 0000000000 Status Good DF Attribute name Load/Unload Retry Count Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good Partition 0 Partition ID Disk #0, Partition #0 Disk Letter D: File System NTFS Volume Serial Number 16AAFF23 Size 931 GB Used Space 87 GB (9%) Free Space 843 GB (91%) Samsung SSD 960 EVO 250GB (SSD) Manufacturer SAMSUNG Interface Unknown Capacity 232 GB Real size 250,059,350,016 bytes RAID Type None S.M.A.R.T S.M.A.R.T not supported Partition 0 Partition ID Disk #1, Partition #0 File System FAT32 Volume Serial Number DA40A836 Size 252 MB Used Space 26.4 MB (10%) Free Space 225 MB (90%) Partition 1 Partition ID Disk #1, Partition #1 Disk Letter C: File System NTFS Volume Serial Number CC412115 Size 208 GB Used Space 167 GB (80%) Free Space 40 GB (20%) Partition 2 Partition ID Disk #1, Partition #2 File System NTFS Volume Serial Number 4420C821 Size 873 MB Used Space 522 MB (59%) Free Space 351 MB (41%) Optical Drives No optical disk drives detected Audio Sound Cards Intel Display Audio NVIDIA High Definition Audio NVIDIA Virtual Audio Device (Wave Extensible) (WDM) Realtek High Definition Audio Playback Devices ASUS PB278 (3- NVIDIA High Definition Audio) Speakers (Realtek High Definition Audio) (default) Recording Device Microphone (Realtek High Definition Audio) Peripherals HID Keyboard Device Device Kind Keyboard Device Name HID Keyboard Device Vendor Unknown Location USB Input Device Driver Date 6-21-2006 Version 10.0.18362.1 File C:\WINDOWS\system32\DRIVERS\kbdhid.sys File C:\WINDOWS\system32\DRIVERS\kbdclass.sys Standard PS/2 Keyboard Device Kind Keyboard Device Name Standard PS/2 Keyboard Vendor MSFT Location Intel 100 Series/C230 Series Chipset Family LPC Controller (HM175) - A152 Driver Date 6-21-2006 Version 10.0.18362.1 File C:\WINDOWS\system32\DRIVERS\i8042prt.sys File C:\WINDOWS\system32\DRIVERS\kbdclass.sys Logitech USB TrackMan Wheel Device Kind Mouse Device Name Logitech USB TrackMan Wheel Vendor Logitech Location USB Input Device Driver Date 6-21-2006 Version 10.0.18362.1 File C:\WINDOWS\system32\DRIVERS\mouhid.sys File C:\WINDOWS\system32\DRIVERS\mouclass.sys Synaptics SMBus TouchPad Device Kind Mouse Device Name Synaptics SMBus TouchPad Vendor SYN Location Intel 100 Series/C230 Series Chipset Family LPC Controller (HM175) - A152 Driver Date 2-21-2017 Version 19.3.4.72 File C:\WINDOWS\system32\DRIVERS\SynTP.sys File C:\WINDOWS\system32\DRIVERS\Smb_driver_Intel_Aux.sys File C:\WINDOWS\system32\DRIVERS\Smb_driver_AMDASF_Aux.sys File C:\WINDOWS\system32\SynTPAPI.dll File C:\WINDOWS\system32\SynCOM.dll File C:\Program Files\Synaptics\SynTP\SynTPRes.dll File C:\Program Files\Synaptics\SynTP\SynTPCpl.dll File C:\Program Files\Synaptics\SynTP\SynCntxt.rtf File C:\Program Files\Synaptics\SynTP\SynZMetr.exe File C:\Program Files\Synaptics\SynTP\SynMood.exe File C:\Program Files\Synaptics\SynTP\SynTPEnh.exe File C:\Program Files\Synaptics\SynTP\Tutorial.exe File C:\Program Files\Synaptics\SynTP\InstNT.exe File C:\Program Files\Synaptics\SynTP\SynISDLL.dll File C:\Program Files\Synaptics\SynTP\SynUnst.ini File C:\Program Files\Synaptics\SynTP\SynRemoveUserSettings.dat File C:\Program Files\Synaptics\SynTP\SynTPHelper.exe File C:\Program Files\Synaptics\SynTP\SynTPEnhService.exe File C:\Program Files\Synaptics\SynTP\SynPivotRotate.mpg File C:\Program Files\Synaptics\SynTP\SynChiralRotate.mpg File C:\Program Files\Synaptics\SynTP\SynFlick.mpg File C:\Program Files\Synaptics\SynTP\SynPinch.mpg File C:\Program Files\Synaptics\SynTP\SynMomentum.mpg File C:\Program Files\Synaptics\SynTP\SynLinearVHScroll.mpg File C:\Program Files\Synaptics\SynTP\SynChiralVHScroll.mpg File C:\Program Files\Synaptics\SynTP\SynTwoFingerVHScroll.mpg File C:\Program Files\Synaptics\SynTP\SynPivotRotate_ChiralRotate.mpg File C:\Program Files\Synaptics\SynTP\SynThreeFingerFlick.mpg File C:\Program Files\Synaptics\SynTP\SynThreeFingersDown.mpg File C:\Program Files\Synaptics\SynTP\SynTwistRotate.mpg File C:\Program Files\Synaptics\SynTP\SynChiralTwistRotate.mpg File C:\Program Files\Synaptics\SynTP\Syn2FingerScrolling_win8.wmv File C:\Program Files\Synaptics\SynTP\Syn2FingerScrollingNB_win8.wmv File C:\Program Files\Synaptics\SynTP\SynTappingNB.wmv File C:\Program Files\Synaptics\SynTP\Syn2FingerRightClickNB.wmv File C:\Program Files\Synaptics\SynTP\SynVHCoastingNB.wmv File C:\Program Files\Synaptics\SynTP\SynEdgePullsNB.wmv File C:\Program Files\Synaptics\SynTP\SynPalmCheckNB.wmv File C:\Program Files\Synaptics\SynTP\SynLinearScrollingNB.wmv File C:\Program Files\Synaptics\SynTP\SynPinchZoomNB.wmv File C:\Program Files\Synaptics\SynTP\SynSensitivityNB.wmv File C:\Program Files\Synaptics\SynTP\SynMomentumNB.wmv File C:\Program Files\Synaptics\SynTP\SynTapZonesNB.wmv File C:\Program Files\Synaptics\SynTP\SynTapZonesNB_win8.wmv File C:\Program Files\Synaptics\SynTP\SynEdgeMotionNB.wmv File C:\Program Files\Synaptics\SynTP\SynSlowMotionNB.wmv File C:\Program Files\Synaptics\SynTP\SynConstrainedMotionNB.wmv File C:\Program Files\Synaptics\SynTP\SynWindowConstrainedNB.wmv File C:\Program Files\Synaptics\SynTP\Syn3FHSlide.wmv File C:\Program Files\Synaptics\SynTP\Syn3FHSlideNB.wmv File C:\Program Files\Synaptics\SynTP\Syn3FTapActionCenter.wmv File C:\Program Files\Synaptics\SynTP\Syn3FTapActionCenterNB.wmv File C:\Program Files\Synaptics\SynTP\Syn3FTapCortana.wmv File C:\Program Files\Synaptics\SynTP\Syn3FTapCortanaNB.wmv File C:\Program Files\Synaptics\SynTP\Syn4FTapActionCenter.wmv File C:\Program Files\Synaptics\SynTP\Syn4FTapActionCenterNB.wmv File C:\Program Files\Synaptics\SynTP\Syn4FTapCortana.wmv File C:\Program Files\Synaptics\SynTP\Syn4FTapCortanaNB.wmv File C:\Program Files\Synaptics\SynTP\Syn3FClickActionCenterNB.wmv File C:\Program Files\Synaptics\SynTP\Syn3FClickCortanaNB.wmv File C:\Program Files\Synaptics\SynTP\Syn4FClickActionCenterNB.wmv File C:\Program Files\Synaptics\SynTP\Syn4FClickCortanaNB.wmv File C:\Program Files\Synaptics\SynTP\Syn3FVSlide.wmv File C:\Program Files\Synaptics\SynTP\Syn3FVSlideNB.wmv File C:\Program Files\Synaptics\SynTP\dpinst.exe File C:\Program Files\Synaptics\SynTP\SynSmbDrv.ini File C:\Program Files\Synaptics\SynTP\SynHidMini.ini File C:\Program Files\Synaptics\SynTP\Syn3FingerFlick.wmv File C:\Program Files\Synaptics\SynTP\Syn4FingerFlick.wmv File C:\Program Files\Synaptics\SynTP\Syn4FingerFlick_win8.wmv File C:\Program Files\Synaptics\SynTP\SynTapHoldToDrag.wmv File C:\Program Files\Synaptics\SynTP\SynTapHoldToDragNB.wmv File C:\Program Files\Synaptics\SynTP\Syn2FingerHScrolling.wmv File C:\Program Files\Synaptics\SynTP\Syn2FingerHScrollingNB.wmv File C:\Program Files\Synaptics\SynTP\SynPinchZoom.wmv File C:\Program Files\Synaptics\SynTP\SynTapping.wmv File C:\Program Files\Synaptics\SynTP\SynVHCoasting.wmv File C:\Program Files\Synaptics\SynTP\SynEdgePulls.wmv File C:\Program Files\Synaptics\SynTP\SynPalmCheck.wmv File C:\Program Files\Synaptics\SynTP\SynLinearScrolling.wmv File C:\Program Files\Synaptics\SynTP\SynSensitivity.wmv File C:\Program Files\Synaptics\SynTP\SynMomentum.wmv File C:\Program Files\Synaptics\SynTP\SynTapZones.wmv File C:\Program Files\Synaptics\SynTP\SynEdgeMotion.wmv File C:\Program Files\Synaptics\SynTP\SynSlowMotion.wmv File C:\Program Files\Synaptics\SynTP\SynConstrainedMotion.wmv File C:\Program Files\Synaptics\SynTP\SynWindowConstrained.wmv File C:\Program Files\Synaptics\SynTP\SynTwistRotate.wmv File C:\WINDOWS\SysWOW64\SynCom.dll File C:\WINDOWS\system32\DRIVERS\mouclass.sys File C:\WINDOWS\system32\DRIVERS\i8042prt.sys File C:\WINDOWS\system32\SynTPCo50-8.dll File C:\WINDOWS\system32\WdfCoInstaller01011.dll HID-compliant mouse Device Kind Mouse Device Name HID-compliant mouse Vendor Synaptics Inc Location Synaptics HID-Compliant Touch pad Device Driver Date 6-21-2006 Version 10.0.18362.1 File C:\WINDOWS\system32\DRIVERS\mouhid.sys File C:\WINDOWS\system32\DRIVERS\mouclass.sys LGE LG AirDrive Device Device Kind Portable Device Device Name LGE LG AirDrive Device Vendor LG Electronics, Inc. Comment LG AirDrive Driver Date 6-17-2016 Version 18.11.52.969 File C:\WINDOWS\System32\drivers\WUDFRd.sys STORAGE DEVICE Device Kind Portable Device Device Name STORAGE DEVICE Vendor GENERIC Comment E:\ Location Volume Driver Date 6-21-2006 Version 10.0.18362.1 File C:\WINDOWS\system32\DRIVERS\WUDFRd.sys Printers Color 570 Printer Port WSD-ac243b03-6858-48ab-bcd8-3e430f6caa3c Print Processor winprint Availability Always Priority 1 Duplex Long-edge binding Print Quality 600 * 600 dpi Color Status The printer is offline Driver Driver Name Xerox Color 570 XC V4 PS (v6.03) Driver Path C:\WINDOWS\System32\DriverStore\FileRepository\ntprint.inf_amd64_829b03839496f36b\Amd64\mxdwdrv.dll Fax Printer Port SHRFAX: Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 200 * 200 dpi Monochrome Status Unknown Driver Driver Name Microsoft Shared Fax Driver (v4.00) Driver Path C:\WINDOWS\system32\spool\DRIVERS\x64\3\FXSDRV.DLL HP ENVY 5530 series (Default Printer) Printer Port USB001 Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 600 * 600 dpi Color Status Unknown Driver Driver Name HP ENVY 5530 Series Class Driver (v6.03) Driver Path C:\WINDOWS\System32\DriverStore\FileRepository\ntprint.inf_amd64_829b03839496f36b\Amd64\mxdwdrv.dll HPB4A5F2 (HP ENVY 5530 series) Printer Port WSD-245d6f78-8484-45a9-bb7f-46ac67d0fec5 Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 600 * 600 dpi Color Status The printer is offline Driver Driver Name HP ENVY 5530 Series Class Driver (v6.03) Driver Path C:\WINDOWS\System32\DriverStore\FileRepository\ntprint.inf_amd64_829b03839496f36b\Amd64\mxdwdrv.dll Microsoft Print to PDF Printer Port PORTPROMPT: Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 600 * 600 dpi Color Status Unknown Driver Driver Name Microsoft Print To PDF (v6.03) Driver Path C:\WINDOWS\System32\DriverStore\FileRepository\ntprint.inf_amd64_829b03839496f36b\Amd64\mxdwdrv.dll Microsoft XPS Document Writer Printer Port PORTPROMPT: Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 600 * 600 dpi Color Status Unknown Driver Driver Name Microsoft XPS Document Writer v4 (v6.03) Driver Path C:\WINDOWS\System32\DriverStore\FileRepository\ntprint.inf_amd64_829b03839496f36b\Amd64\mxdwdrv.dll PDF-XChange Standard Printer Port PXC Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 300 * 300 dpi Color Status Unknown Driver Driver Name PDF-XChange Standard Driver (v0.80) Driver Path C:\WINDOWS\system32\spool\DRIVERS\x64\3\pxcdrv.dll PDFescape Desktop Printer Port PDFescape_Desktop_Port: Print Processor winprint Availability Always Priority 1 Print Quality 4294967292 * 300 dpi Color Status Unknown Driver Driver Name PDFescape Desktop Driver (v13.00) Driver Path C:\WINDOWS\system32\spool\DRIVERS\x64\3\pdfescape desktop_pdfprn_v.4.12.26.3.dll OneNote Printer Port Microsoft.Office.OneNote_16001.12624.20042.0_x64__8wekyb3d8bbwe_microsoft.onenoteim_S-1-5-21-4069724343-2222276012-2846162663-1003 Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 300 * 300 dpi Color Status Unknown Driver Driver Name Microsoft Software Printer Driver (v6.03) Driver Path C:\WINDOWS\System32\DriverStore\FileRepository\ntprint.inf_amd64_829b03839496f36b\Amd64\mxdwdrv.dll Send To OneNote 2016 Printer Port nul: Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 600 * 600 dpi Color Status Unknown Driver Driver Name Send to Microsoft OneNote 16 Driver (v6.03) Driver Path C:\WINDOWS\System32\DriverStore\FileRepository\ntprint.inf_amd64_829b03839496f36b\Amd64\mxdwdrv.dll Xerox WorkCentre 6605DN Printer Port WSD-e0022a24-dc13-4c5b-b6bc-c0e588c1cd64 Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 600 * 600 dpi Color Status The printer is offline Driver Driver Name Xerox WorkCentre 6605DN V4 PCL6 (v6.03) Driver Path C:\WINDOWS\System32\DriverStore\FileRepository\ntprint.inf_amd64_829b03839496f36b\Amd64\mxdwdrv.dll Network You are connected to the internet Connected through Realtek PCIe GbE Family Controller IP Address 192.168.0.34 Subnet mask 255.255.255.0 Gateway server 192.168.0.1 Preferred DNS server 8.8.8.8 Alternate DNS server 8.8.4.4 DHCP Enabled DHCP server 192.168.0.1 External IP Address 75.118.98.42 Adapter Type Ethernet NetBIOS over TCP/IP Enabled via DHCP NETBIOS Node Type Hybrid node Link Speed 293 Bps Computer Name NetBIOS Name CAPCOM14 DNS Name CapCom14 Membership Part of workgroup Workgroup WORKGROUP Remote Desktop Disabled Console State Active Domain CAPCOM14 WinInet Info LAN Connection Local system uses a local area network to connect to the Internet Local system has RAS to connect to the Internet Wi-Fi Info Using native Wi-Fi API version 2 Available access points count 10 Wi-Fi () SSID Frequency 2417000 kHz Channel Number 2 Name No name Signal Strength/Quality 84 Security Enabled State The interface is not connected to any network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (9FE3AB-2.4) SSID 9FE3AB-2.4 Frequency 2462000 kHz Channel Number 11 Name 9FE3AB-2.4 Signal Strength/Quality 31 Security Enabled State The interface is not connected to any network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (ATT8K8KBP5) SSID ATT8K8KBP5 Frequency 5220000 kHz Channel Number 44 Name ATT8K8KBP5 Signal Strength/Quality 84 Security Enabled State The interface is not connected to any network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (MySpectrumWiFi10-2G) SSID MySpectrumWiFi10-2G Frequency 2412000 kHz Channel Number 1 Name MySpectrumWiFi10-2G Signal Strength/Quality 75 Security Enabled State The interface is not connected to any network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (TC8717TA2) SSID TC8717TA2 Frequency 2412000 kHz Channel Number 1 Name TC8717TA2 Signal Strength/Quality 33 Security Enabled State The interface is not connected to any network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (WOW!4975) SSID WOW!4975 Frequency 2462000 kHz Channel Number 11 Name WOW!4975 Signal Strength/Quality 80 Security Enabled State The interface is not connected to any network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (WOW!5746) SSID WOW!5746 Frequency 2412000 kHz Channel Number 1 Name WOW!5746 Signal Strength/Quality 85 Security Enabled State The interface is not connected to any network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (WOW!5746-5G) SSID WOW!5746-5G Frequency 5180000 kHz Channel Number 36 Name WOW!5746-5G Signal Strength/Quality 57 Security Enabled State The interface is not connected to any network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (WOW-Wes) SSID WOW-Wes Frequency 2462000 kHz Channel Number 11 Name WOW-Wes Signal Strength/Quality 99 Security Enabled State The interface is not connected to any network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (WOW-Wes-5G) SSID WOW-Wes-5G Frequency 5745000 kHz Channel Number 149 Name WOW-Wes-5G Signal Strength/Quality 99 Security Enabled State The interface is not connected to any network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK WinHTTPInfo WinHTTPSessionProxyType No proxy Session Proxy Session Proxy Bypass Connect Retries 5 Connect Timeout (ms) 60,000 HTTP Version HTTP 1.1 Max Connects Per 1.0 Servers INFINITE Max Connects Per Servers INFINITE Max HTTP automatic redirects 10 Max HTTP status continue 10 Send Timeout (ms) 30,000 IEProxy Auto Detect Yes IEProxy Auto Config IEProxy IEProxy Bypass Default Proxy Config Access Type No proxy Default Config Proxy Default Config Proxy Bypass Sharing and Discovery Network Discovery Disabled File and Printer Sharing Enabled File and printer sharing service Enabled Simple File Sharing Enabled Administrative Shares Enabled Network access: Sharing and security model for local accounts Classic - local users authenticate as themselves Adapters List Enabled Bluetooth Device (Personal Area Network) Connection Name Bluetooth Network Connection DHCP enabled Yes MAC Address 28-C6-3F-B2-33-C8 Intel(R) Dual Band Wireless-AC 8265 Connection Name Wi-Fi DHCP enabled Yes MAC Address BA-A2-5D-A8-31-80 Realtek PCIe GbE Family Controller Connection Name Ethernet NetBIOS over TCPIP Yes DHCP enabled Yes MAC Address 80-FA-5B-4E-DE-32 IP Address 192.168.0.34 Subnet mask 255.255.255.0 Gateway server 192.168.0.1 DHCP 192.168.0.1 DNS Server 8.8.8.8 8.8.4.4 Realtek USB GbE Family Controller Connection Name Ethernet 6 DHCP enabled Yes MAC Address 00-E0-4C-68-01-98 Network Shares No network shares Current TCP Connections AppleMobileDeviceService.exe (4208) Local 127.0.0.1:49674 ESTABLISHED Remote 127.0.0.1:5354 (Querying... ) Local 127.0.0.1:49677 ESTABLISHED Remote 127.0.0.1:5354 (Querying... ) Local 127.0.0.1:27015 LISTEN C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE (10892) Local 192.168.0.34:61378 ESTABLISHED Remote 40.97.112.66:443 (Querying... ) (HTTPS) Local 192.168.0.34:61510 ESTABLISHED Remote 40.97.128.226:443 (Querying... ) (HTTPS) C:\Program Files (x86)\NVIDIA Corporation\NVIDIA GeForce Experience\NVIDIA Share.exe (23180) Local 127.0.0.1:64641 ESTABLISHED Remote 127.0.0.1:49749 (Querying... ) C:\Program Files (x86)\NVIDIA Corporation\NvNode\NVIDIA Web Helper.exe (13544) Local 127.0.0.1:49749 ESTABLISHED Remote 127.0.0.1:64641 (Querying... ) Local 127.0.0.1:49749 LISTEN C:\Program Files\Ditto\Ditto.exe (16244) Local 0.0.0.0:23443 LISTEN C:\Program Files\WindowsApps\Microsoft.BingWeather_4.36.20714.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe (23728) Local 192.168.0.34:61468 CLOSE-WAIT Remote 23.67.114.110:443 (Querying... ) (HTTPS) Local 192.168.0.34:56537 CLOSE-WAIT Remote 23.35.77.157:443 (Querying... ) (HTTPS) Local 192.168.0.34:61631 ESTABLISHED Remote 204.79.197.203:443 (Querying... ) (HTTPS) Local 192.168.0.34:61469 CLOSE-WAIT Remote 23.67.114.110:443 (Querying... ) (HTTPS) Local 192.168.0.34:61627 ESTABLISHED Remote 13.92.225.245:443 (Querying... ) (HTTPS) C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.7.124.0_x64__8wekyb3d8bbwe\Microsoft.Notes.exe (12264) Local 192.168.0.34:53204 ESTABLISHED Remote 13.107.18.11:443 (Querying... ) (HTTPS) C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12624.20368.0_x64__8wekyb3d8bbwe\HxTsr.exe (5908) Local 192.168.0.34:61426 ESTABLISHED Remote 40.97.120.50:443 (Querying... ) (HTTPS) Local 192.168.0.34:61424 ESTABLISHED Remote 40.97.120.50:443 (Querying... ) (HTTPS) C:\Program Files\WindowsApps\Microsoft.WindowsStore_12003.1001.1.0_x64__8wekyb3d8bbwe\WinStore.App.exe (19204) Local 192.168.0.34:49861 CLOSE-WAIT Remote 23.203.41.190:80 (Querying... ) (HTTP) Local 192.168.0.34:49860 CLOSE-WAIT Remote 23.203.41.190:80 (Querying... ) (HTTP) Local 192.168.0.34:49859 CLOSE-WAIT Remote 23.203.41.190:80 (Querying... ) (HTTP) Local 192.168.0.34:49858 CLOSE-WAIT Remote 23.200.61.250:443 (Querying... ) (HTTPS) Local 192.168.0.34:49857 CLOSE-WAIT Remote 23.200.61.250:443 (Querying... ) (HTTPS) Local 192.168.0.34:49863 CLOSE-WAIT Remote 23.203.41.190:80 (Querying... ) (HTTP) Local 192.168.0.34:49856 CLOSE-WAIT Remote 23.200.61.250:443 (Querying... ) (HTTPS) Local 192.168.0.34:49864 CLOSE-WAIT Remote 23.203.41.190:80 (Querying... ) (HTTP) Local 192.168.0.34:49862 CLOSE-WAIT Remote 23.203.41.190:80 (Querying... ) (HTTP) C:\Users\Wes Tarpley\AppData\Local\Google\Chrome SxS\Application\chrome.exe (4188) Local 127.0.0.1:49973 ESTABLISHED Remote 127.0.0.1:12080 (Querying... ) Local 127.0.0.1:49975 ESTABLISHED Remote 127.0.0.1:12080 (Querying... ) Local 127.0.0.1:50062 ESTABLISHED Remote 127.0.0.1:12080 (Querying... ) Local 127.0.0.1:61367 ESTABLISHED Remote 127.0.0.1:12080 (Querying... ) Local 127.0.0.1:61614 ESTABLISHED Remote 127.0.0.1:12080 (Querying... ) Local 127.0.0.1:61632 ESTABLISHED Remote 127.0.0.1:12080 (Querying... ) Local 127.0.0.1:61640 ESTABLISHED Remote 127.0.0.1:12080 (Querying... ) Local 127.0.0.1:49924 ESTABLISHED Remote 127.0.0.1:12080 (Querying... ) Local 127.0.0.1:49965 ESTABLISHED Remote 127.0.0.1:12080 (Querying... ) Local 127.0.0.1:49967 ESTABLISHED Remote 127.0.0.1:12080 (Querying... ) C:\Users\Wes Tarpley\AppData\Local\Microsoft\OneDrive\19.232.1124.0010\FileCoAuth.exe (976) Local 192.168.0.34:61628 ESTABLISHED Remote 52.114.7.38:443 (Querying... ) (HTTPS) Local 192.168.0.34:61629 ESTABLISHED Remote 52.114.7.38:443 (Querying... ) (HTTPS) C:\Users\Wes Tarpley\AppData\Local\Microsoft\OneDrive\OneDrive.exe (16044) Local 192.168.0.34:61200 ESTABLISHED Remote 52.230.222.68:443 (Querying... ) (HTTPS) C:\Users\Wes Tarpley\AppData\Local\Programs\signal-desktop\Signal.exe (15984) Local 192.168.0.34:56485 ESTABLISHED Remote 76.223.92.165:443 (Querying... ) (HTTPS) C:\Users\Wes Tarpley\AppData\Roaming\Zoom\bin\Zoom.exe (23864) Local 192.168.0.34:53109 ESTABLISHED Remote 3.235.82.190:443 (Querying... ) (HTTPS) Local 192.168.0.34:57763 CLOSE-WAIT Remote 3.235.69.49:443 (Querying... ) (HTTPS) Local 192.168.0.34:55775 ESTABLISHED Remote 52.202.62.228:443 (Querying... ) (HTTPS) C:\Windows\System32\svchost.exe (92) Local 192.168.0.34:61559 ESTABLISHED Remote 20.36.219.28:443 (Querying... ) (HTTPS) C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe (12628) Local 192.168.0.34:61650 ESTABLISHED Remote 13.107.246.10:443 (Querying... ) (HTTPS) Local 192.168.0.34:61649 ESTABLISHED Remote 13.107.4.254:443 (Querying... ) (HTTPS) Local 192.168.0.34:61647 ESTABLISHED Remote 13.107.18.11:443 (Querying... ) (HTTPS) Local 192.168.0.34:61646 ESTABLISHED Remote 13.107.18.11:443 (Querying... ) (HTTPS) Local 192.168.0.34:61645 ESTABLISHED Remote 204.79.197.200:443 (Querying... ) (HTTPS) Local 192.168.0.34:61651 ESTABLISHED Remote 13.107.255.50:443 (Querying... ) (HTTPS) Local 192.168.0.34:61652 ESTABLISHED Remote 204.79.197.222:443 (Querying... ) (HTTPS) FileZillaServer.exe (4324) Local 0.0.0.0:21 (FTP-data) LISTEN Local 127.0.0.1:14147 LISTEN httpd.exe (4360) Local 0.0.0.0:443 (HTTPS) LISTEN Local 0.0.0.0:8081 LISTEN lsass.exe (936) Local 0.0.0.0:49664 LISTEN McsClient.exe (4736) Local 192.168.0.34:57512 ESTABLISHED Remote 54.208.94.197:443 (Querying... ) (HTTPS) mDNSResponder.exe (4252) Local 127.0.0.1:5354 ESTABLISHED Remote 127.0.0.1:49677 (Querying... ) Local 127.0.0.1:5354 LISTEN Local 127.0.0.1:5354 ESTABLISHED Remote 127.0.0.1:49674 (Querying... ) mqsvc.exe (4680) Local 0.0.0.0:1801 LISTEN Local 0.0.0.0:2103 LISTEN Local 0.0.0.0:2105 LISTEN Local 0.0.0.0:2107 LISTEN Local 0.0.0.0:49676 LISTEN mysqld.exe (4600) Local 0.0.0.0:3306 LISTEN nvcontainer.exe (4440) Local 127.0.0.1:65001 ESTABLISHED Remote 127.0.0.1:49737 (Querying... ) Local 127.0.0.1:49737 ESTABLISHED Remote 127.0.0.1:65001 (Querying... ) Local 127.0.0.1:65000 LISTEN Local 127.0.0.1:65001 LISTEN remoting_host.exe (6108) Local 192.168.0.34:60828 ESTABLISHED Remote 172.217.6.10:443 (Querying... ) (HTTPS) Local 192.168.0.34:61643 ESTABLISHED Remote 172.217.4.74:443 (Querying... ) (HTTPS) Local 192.168.0.34:61642 ESTABLISHED Remote 172.217.4.74:443 (Querying... ) (HTTPS) services.exe (916) Local 0.0.0.0:49692 LISTEN spoolsv.exe (2584) Local 0.0.0.0:49672 LISTEN ss_conn_service.exe (4616) Local 127.0.0.1:50911 LISTEN ss_conn_service2.exe (4588) Local 127.0.0.1:50912 LISTEN svchost.exe (1044) Local 0.0.0.0:135 (DCE) LISTEN svchost.exe (10980) Local 0.0.0.0:5040 LISTEN svchost.exe (1532) Local 0.0.0.0:49666 LISTEN svchost.exe (16216) Local 0.0.0.0:7680 LISTEN Local 192.168.0.34:61648 SYN-SENT Remote 165.225.60.83:7680 (Querying... ) svchost.exe (1964) Local 0.0.0.0:49668 LISTEN svchost.exe (2352) Local 0.0.0.0:49669 LISTEN svchost.exe (4728) Local 192.168.0.34:60181 ESTABLISHED Remote 52.230.222.68:443 (Querying... ) (HTTPS) swi_fc.exe (5032) Local 192.168.0.34:49976 ESTABLISHED Remote 199.127.194.93:443 (Querying... ) (HTTPS) Local 192.168.0.34:50063 ESTABLISHED Remote 199.60.116.45:443 (Querying... ) (HTTPS) Local 192.168.0.34:61368 ESTABLISHED Remote 140.82.113.26:443 (Querying... ) (HTTPS) Local 127.0.0.1:12080 LISTEN Local 127.0.0.1:12080 ESTABLISHED Remote 127.0.0.1:49924 (Querying... ) Local 127.0.0.1:12080 ESTABLISHED Remote 127.0.0.1:49965 (Querying... ) Local 127.0.0.1:12080 ESTABLISHED Remote 127.0.0.1:49967 (Querying... ) Local 127.0.0.1:12080 ESTABLISHED Remote 127.0.0.1:49973 (Querying... ) Local 127.0.0.1:12080 ESTABLISHED Remote 127.0.0.1:49975 (Querying... ) Local 127.0.0.1:12080 ESTABLISHED Remote 127.0.0.1:50062 (Querying... ) Local 127.0.0.1:12080 ESTABLISHED Remote 127.0.0.1:61367 (Querying... ) Local 192.168.0.34:61641 ESTABLISHED Remote 3.208.123.53:443 (Querying... ) (HTTPS) Local 192.168.0.34:61633 ESTABLISHED Remote 151.139.242.23:443 (Querying... ) (HTTPS) Local 127.0.0.1:12080 ESTABLISHED Remote 127.0.0.1:61614 (Querying... ) Local 127.0.0.1:12080 ESTABLISHED Remote 127.0.0.1:61632 (Querying... ) Local 127.0.0.1:12080 ESTABLISHED Remote 127.0.0.1:61640 (Querying... ) Local 192.168.0.34:61615 ESTABLISHED Remote 216.239.36.144:443 (Querying... ) (HTTPS) Local 192.168.0.34:49925 ESTABLISHED Remote 169.44.99.105:443 (Querying... ) (HTTPS) Local 192.168.0.34:49966 ESTABLISHED Remote 74.125.201.188:5228 (Querying... ) Local 192.168.0.34:49968 ESTABLISHED Remote 34.232.6.198:443 (Querying... ) (HTTPS) Local 192.168.0.34:49974 ESTABLISHED Remote 208.85.40.20:443 (Querying... ) (HTTPS) System Process Local 0.0.0.0:445 (Windows shares) LISTEN Local 192.168.0.34:139 (NetBIOS session service) LISTEN System Process Local 192.168.0.34:61630 TIME-WAIT Remote 40.90.137.126:443 (Querying... ) (HTTPS) Local 192.168.0.34:61599 TIME-WAIT Remote 3.227.84.245:443 (Querying... ) (HTTPS) Local 192.168.0.34:61598 TIME-WAIT Remote 3.227.84.245:443 (Querying... ) (HTTPS) Local 192.168.0.34:61618 TIME-WAIT Remote 40.97.112.66:443 (Querying... ) (HTTPS) wininit.exe (844) Local 0.0.0.0:49665 LISTEN ws.exe (6816) Local 192.168.0.34:63330 CLOSE-WAIT Remote 198.72.111.203:443 (Querying... ) (HTTPS) WUDFHost.exe (688) Local 127.0.0.1:14726 LISTEN Local 127.0.0.1:15937 LISTEN Generated with Speccy v1.32.740 ```

Linked Device Version:

Link to Debug Log

https://debuglogs.org/df1a5b2b60c83aa9d7f143e211803bb72679f7e12ef6962244e92bad26b3b425

scottnonnenberg-signal commented 4 years ago

If you go into the message details screen for that message that failed to send, you will see this error "Number is not registered." Because the person you're trying to message does not have Signal Account. If you're using Signal Android as your SMS app, you're able to message people both with and without Signal Accounts. Signal Desktop doesn't support that.