IOC Report
PdfConverters.exe

loading gif

Files

File Path
Type
Category
Malicious
PdfConverters.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\API-MS-Win-core-xstate-l2-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Accessibility.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\D3DCompiler_47_cor3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\DirectWriteForwarder.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.CSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.CodeAnalysis.CSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.CodeAnalysis.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.DiaSymReader.Native.x86.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Management.Infrastructure.Native.Unmanaged.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Management.Infrastructure.Native.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Management.Infrastructure.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.VisualBasic.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.VisualBasic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Web.WebView2.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Web.WebView2.WinForms.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Web.WebView2.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Win32.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Win32.Registry.AccessControl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Win32.Registry.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Win32.SystemEvents.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PenImc_cor3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationCore.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework-SystemCore.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework-SystemData.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework-SystemDrawing.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework-SystemXml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework-SystemXmlLinq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.Aero.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.Aero2.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.AeroLite.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.Classic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.Luna.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.Royale.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationNative_cor3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationUI.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ReachFramework.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\SOS_README.md
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.AppContext.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Buffers.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.CodeDom.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Collections.Concurrent.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Collections.Immutable.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Collections.NonGeneric.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Collections.Specialized.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Collections.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.Annotations.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.DataAnnotations.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.EventBasedAsync.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.TypeConverter.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Configuration.ConfigurationManager.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Configuration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Console.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Data.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Data.DataSetExtensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Data.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Design.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.Contracts.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.Debug.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.DiagnosticSource.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.EventLog.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.FileVersionInfo.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.PerformanceCounter.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.Process.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.StackTrace.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.TextWriterTraceListener.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.Tools.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.TraceSource.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.Tracing.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.DirectoryServices.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Drawing.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Drawing.Design.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Drawing.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Drawing.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Dynamic.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Globalization.Calendars.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Globalization.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Globalization.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Compression.Brotli.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Compression.FileSystem.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Compression.ZipFile.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Compression.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.FileSystem.AccessControl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.FileSystem.DriveInfo.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.FileSystem.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.FileSystem.Watcher.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.FileSystem.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.IsolatedStorage.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.MemoryMappedFiles.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Packaging.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Pipes.AccessControl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Pipes.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.UnmanagedMemoryStream.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Linq.Expressions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Linq.Parallel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Linq.Queryable.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Linq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Memory.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Http.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.HttpListener.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Mail.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.NameResolution.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.NetworkInformation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Ping.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Requests.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Security.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.ServicePoint.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Sockets.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.WebClient.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.WebHeaderCollection.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.WebProxy.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.WebSockets.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.WebSockets.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Numerics.Vectors.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Numerics.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ObjectModel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Printing.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Private.CoreLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Private.DataContractSerialization.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Private.Uri.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Private.Xml.Linq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Private.Xml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.DispatchProxy.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Emit.ILGeneration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Emit.Lightweight.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Emit.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Metadata.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.TypeExtensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Resources.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Resources.Reader.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Resources.ResourceManager.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Resources.Writer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.CompilerServices.VisualC.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Handles.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.InteropServices.RuntimeInformation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.InteropServices.WindowsRuntime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.InteropServices.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Intrinsics.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Loader.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Numerics.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Serialization.Formatters.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Serialization.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Serialization.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Serialization.Xml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Serialization.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.WindowsRuntime.UI.Xaml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.WindowsRuntime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.AccessControl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Claims.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Algorithms.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Cng.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Csp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Encoding.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.OpenSsl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Pkcs.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.ProtectedData.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.X509Certificates.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Xml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Permissions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Principal.Windows.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Principal.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.SecureString.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ServiceModel.Web.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ServiceProcess.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.Encoding.CodePages.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.Encoding.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.Encoding.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.Encodings.Web.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.RegularExpressions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.AccessControl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Channels.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Overlapped.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Tasks.Dataflow.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Tasks.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Tasks.Parallel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Tasks.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Thread.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.ThreadPool.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Timer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Transactions.Local.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Transactions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Web.HttpUtility.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Web.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Controls.Ribbon.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Forms.Design.Editors.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Forms.Design.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Forms.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Input.Manipulations.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Presentation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xaml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.Linq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.ReaderWriter.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.Serialization.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.XDocument.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.XPath.XDocument.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.XPath.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.XmlDocument.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.XmlSerializer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\UIAutomationClient.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\UIAutomationClientSideProviders.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\UIAutomationProvider.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\UIAutomationTypes.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\WebView2Loader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\WindowsBase.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\WindowsFormsIntegration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-console-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-datetime-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-debug-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-errorhandling-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-file-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-file-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-file-l2-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-handle-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-heap-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-interlocked-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-libraryloader-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-localization-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-memory-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-namedpipe-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-processenvironment-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-processthreads-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-processthreads-l1-1-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-profile-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-string-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-synch-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-synch-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-sysinfo-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-timezone-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-util-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-conio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-convert-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-environment-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-filesystem-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-heap-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-locale-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-math-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-multibyte-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-private-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-process-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-runtime-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-stdio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-string-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-time-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-utility-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\app.deps.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\app.dll
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\app.runtimeconfig.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\clrcompression.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\clretwrc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\clrjit.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\coreclr.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\dbgshim.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\hostfxr.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\hostpolicy.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mi.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\miutils.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscordaccore.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscordaccore_x86_x86_4.700.22.55902.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscordbi.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscorlib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscorrc.debug.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscorrc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\netstandard.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\runtimes\win-x86\native\WebView2Loader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ucrtbase.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\vcruntime140_cor3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\wpfgfx_cor3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\Microsoft.CodeAnalysis.CSharp.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\Microsoft.CodeAnalysis.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\PresentationCore.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\PresentationFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\PresentationUI.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\ReachFramework.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Windows.Controls.Ribbon.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Windows.Forms.Design.Editors.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Windows.Forms.Design.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Windows.Forms.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Windows.Input.Manipulations.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Xaml.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\UIAutomationClient.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\UIAutomationClientSideProviders.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\UIAutomationProvider.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\UIAutomationTypes.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\WindowsBase.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\WindowsFormsIntegration.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\916c403e-3d32-4a2d-98f3-6967827fd83f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\9a1c4e40-b877-475a-b813-1b46e8cc3140.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\BrowserMetrics\BrowserMetrics-662C3291-1E98.pma
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\42e14689-9a7c-4a33-9a47-5ff89d4a622b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\457563c2-6f3e-4e5c-8115-3cd0952523c5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Cache\Cache_Data\data_0
dBase IV DBT, blocks size 0, block length 1024, next free block index 3238316739, next free block 0, next used block 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie 0xc, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\405dac90-6ff2-4c06-82d6-c6c375c1af2d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\544b70cf-6a97-4a8c-8113-83395a9d5cee.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\5eaca105-4a3f-4920-9ae3-f319a7a83787.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\92d3c5a4-decb-4e01-abc0-31722efa005d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Network Persistent State~RF41fcd2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports~RF41d46a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\eed64267-b6f7-4f6e-a83b-9627d5ff09f1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\README
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Session Storage\000003.log
data
modified
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Site Characteristics Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie 0x36, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Local State~RF41d12e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Local State~RF41d14d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Local State~RF41e6c9.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris_0
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\edgeSettings_2.0-0
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\local\uriCache
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\local\uriCache_
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\d6809c40-297c-46fb-82da-b57e2b0ae8f7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\e7a51b54-3476-4317-af5a-21568e6b3490.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 22:02:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 22:02:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 22:02:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 22:02:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 22:02:24 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 696
ASCII text, with very long lines (783)
downloaded
There are 649 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PdfConverters.exe
"C:\Users\user\Desktop\PdfConverters.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 --field-trial-handle=2328,i,16201944400505639363,503574586948334668,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=PdfConverters.exe --webview-exe-version=1.0 --user-data-dir="C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=0 --edge-webview-custom-scheme --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=3160.7800.5259682614117425049
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x15c,0x160,0x164,0x138,0x170,0x7ff899758e88,0x7ff899758e98,0x7ff899758ea8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView" --webview-exe-name=PdfConverters.exe --webview-exe-version=1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=0 --edge-webview-custom-scheme --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1828 --field-trial-handle=1832,i,9339170682265001696,394570848035688689,262144 --enable-features=MojoIpcz /prefetch:2
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView" --webview-exe-name=PdfConverters.exe --webview-exe-version=1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=0 --edge-webview-custom-scheme --mojo-platform-channel-handle=3100 --field-trial-handle=1832,i,9339170682265001696,394570848035688689,262144 --enable-features=MojoIpcz /prefetch:3
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView" --webview-exe-name=PdfConverters.exe --webview-exe-version=1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=0 --edge-webview-custom-scheme --mojo-platform-channel-handle=3340 --field-trial-handle=1832,i,9339170682265001696,394570848035688689,262144 --enable-features=MojoIpcz /prefetch:8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView" --webview-exe-name=PdfConverters.exe --webview-exe-version=1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=0 --edge-webview-custom-scheme --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1714168248658982 --launch-time-ticks=4314058757 --mojo-platform-channel-handle=3636 --field-trial-handle=1832,i,9339170682265001696,394570848035688689,262144 --enable-features=MojoIpcz /prefetch:1

URLs

Name
IP
Malicious
http://web.503188.com/?
unknown
https://hao.360.com/?installer
unknown
http://www.4399.com/flash/32979.htm
unknown
http://hao123.di178.com/?r916
unknown
https://www.4399.com/flash/180977_3.htm
unknown
https://tg.602.com
unknown
https://www.4399.com/flash/127539_4.htm
unknown
https://doh.familyshield.opendns.com/dns-query
unknown
http://anglebug.com/4633
unknown
https://dns.sb/privacy/Char
unknown
https://anglebug.com/7382
unknown
https://www.4399.com/flash/205462_4.htm
unknown
https://www.4399.com/flash/145991_4.htm
unknown
http://www.chambersign.org1
unknown
https://a.nel.cloudflare.com/report/v4?s=tUn9Jv1n4WdeAscGeNaNAlIueOTeBeiXfGWADZ9JuvZ%2FLCIajZe5krooR
unknown
https://ntp.msn.cn/edge/ntp
unknown
https://www.4399.com/flash/39379_2.htm
unknown
https://www.4399.com/flash/55146_4.htm
unknown
https://www.4399.com/flash/195673_4.htm
unknown
http://anglebug.com/8280ault
unknown
https://a.nel.cloudflare.com
unknown
https://www.microsoftnews.cn/
unknown
https://dns11.quad9.net/dns-query
unknown
https://kf.07073.com
unknown
http://unisolated.invalid/
unknown
https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/
unknown
http://www.pdfconvertercompare.com/mainnkn:100;0.010
unknown
https://www.4399.com/flash/18012.htm
unknown
https://www.4399.com/flash/zmhj.htm#search3-6407
unknown
https://www.pdfconvertercompare.com/maindg/117.0.2045.470
unknown
http://bd.gy912.com
unknown
https://www.91duba.com/?f=
unknown
http://anglebug.com/6929
unknown
https://permanently-removed.invalid/encryption/unlock/desktop?kdi=CAIaDgoKY2hyb21lc3luYxABP
unknown
https://login.windows.localP
unknown
https://www.4399.com/flash/217926_2.htm
unknown
https://www.4399.com/flash/218860_1.htm
unknown
https://nextdns.io/privacy
unknown
https://anglebug.com/7246
unknown
https://www.4399.com/flash/27924_2.htm
unknown
https://10.0.19045.2006.vb_releaseoft.c
unknown
https://int.msn.cn/
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
http://anglebug.com/3625F$
unknown
https://unitedstates1.ss.wd.microsoft.us/
unknown
https://www.4399.com/flash/18012_4.htm
unknown
https://www.newduba.cn/?
unknown
https://www.4399.com/flash/48504.htm
unknown
https://doh.opendns.com/dns-query
unknown
https://easyauth.edgebrowser.microsoft-staging-falcon.io/
unknown
https://nextdns.io/privacyr
unknown
http://df.edge.qhkj.baicana.com
unknown
https://issuetracker.google.com/161903006
unknown
http://anglebug.com/7724ancedG
unknown
https://tp.9377s.com
unknown
https://permanently-removed.invalid/v1/issuetoken
unknown
https://easyauth.edgebrowser.microsoft-testing-falcon.io/
unknown
http://anglebug.com/4722
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
http://permanently-removed.invalid/
unknown
http://r.emsoso.cn
unknown
https://permanently-removed.invalid/embedded/setup/chrome/usermenu
unknown
https://www.4399.com/flash/zmhj.htm
unknown
https://www.pdfconvertercompare.com/favicon.ico0.2045.47V
unknown
https://www.pdfconvertercompare.com/main/u
unknown
https://10.0.19045.2006.vb_release
unknown
https://www.4399.com/flash/69156_1.htm
unknown
https://www.4399.com/flash/776_1.htm
unknown
http://129fy.ie.chalai.net
unknown
https://www.4399.com/flash/198637_4.htm
unknown
https://www.4399.com/flash/133630_4.htm
unknown
https://www.pdfconvertercompare.com/maincom/
unknown
http://anglebug.com/5906hhK
unknown
http://anglebug.com/8280F$
unknown
http://sgcs.edge.ker58.com
unknown
https://permanently-removed.invalid/RotateBoundCookies
unknown
https://www.4399.com/flash/218717_2.htm
unknown
https://www.4399.com/flash/136516_3.htm
unknown
https://www.4399.com/flash/203215_3.htm
unknown
https://www.4399.com/flash/207195_4.htm
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://discovery.lenovo.com.cn/home062291
unknown
https://www.newduba.cn/?f=
unknown
https://hao.360.com/?src=jsqth
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5906F$
unknown
https://my.4399.com/yxmsdzls/
unknown
https://www.4399.com/flash/217855_4.htm
unknown
http://anglebug.com/3862
unknown
https://www.pdfconvertercompare.com/mainotify
unknown
https://yxtg.taojike.com.cn/tg/ttfc.html?sc=
unknown
https://dns.google/dns-query
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://www.4399.com/flash/21674_3.htm
unknown
https://www.4399.com/flash/204650_1.htm
unknown
https://localhost.msn.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3
a.nel.cloudflare.com
35.190.80.1
www.google.com
142.250.80.100
www.pdfconvertercompare.com
104.26.1.18

IPs

IP
Domain
Country
Malicious
142.250.80.100
www.google.com
United States
192.168.2.5
unknown
unknown
104.26.1.18
www.pdfconvertercompare.com
United States
162.159.61.3
chrome.cloudflare-dns.com
United States
239.255.255.250
unknown
Reserved
35.190.80.1
a.nel.cloudflare.com
United States
172.64.41.3
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
dr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
UsageStatsInSample
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
usagestats
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
urlstats
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
failed_count
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6ACF0000
unkown
page readonly
788C00288000
direct allocation
page read and write
6CBE0000
unkown
page readonly
2C0000656000
trusted library allocation
page read and write
66C0009EC000
trusted library allocation
page read and write
66C000718000
trusted library allocation
page read and write
4624000B8000
trusted library allocation
page read and write
1607D013000
heap
page read and write
8090000
heap
page read and write
6CC2F000
unkown
page readonly
2E17BFE000
unkown
page readonly
EB33DFD000
stack
page read and write
56B00011C000
trusted library allocation
page read and write
56B000164000
trusted library allocation
page read and write
2C0000364000
trusted library allocation
page read and write
C9D6DFE000
unkown
page readonly
2C000004F000
trusted library allocation
page read and write
C9F0DFE000
unkown
page readonly
2E0E3FC000
stack
page read and write
4D8800354000
direct allocation
page read and write
2F64000
heap
page read and write
6E382000
unkown
page execute read
6F801000
unkown
page read and write
2E62000
heap
page read and write
2E8A000
heap
page read and write
66C000614000
trusted library allocation
page read and write
86D0000
direct allocation
page read and write
244F4000
trusted library allocation
page read and write
2C0000D38000
trusted library allocation
page read and write
66C000834000
trusted library allocation
page read and write
2C0000DD8000
trusted library allocation
page read and write
66C00060C000
trusted library allocation
page read and write
340002D4000
trusted library allocation
page read and write
66C000718000
trusted library allocation
page read and write
2C00007AC000
trusted library allocation
page read and write
211E8424000
heap
page read and write
66C0002A0000
trusted library allocation
page read and write
6F720000
unkown
page readonly
624800264000
trusted library allocation
page read and write
788C002E8000
direct allocation
page read and write
260E2755000
heap
page read and write
260E2755000
heap
page read and write
56B000201000
trusted library allocation
page read and write
244A4000
trusted library allocation
page read and write
A42EFFE000
unkown
page readonly
260E2755000
heap
page read and write
67D000250000
direct allocation
page read and write
66C000284000
trusted library allocation
page read and write
260E0902000
heap
page read and write
462400264000
trusted library allocation
page read and write
2C00009D8000
trusted library allocation
page read and write
340002F0000
trusted library allocation
page read and write
B4F000
unkown
page write copy
1E2093D0000
heap
page read and write
1E209400000
heap
page read and write
2EF7000
heap
page read and write
2C0000650000
trusted library allocation
page read and write
2C0000760000
trusted library allocation
page read and write
4D8800329000
direct allocation
page read and write
247800240000
trusted library allocation
page read and write
438C00408000
direct allocation
page read and write
4D88002E0000
direct allocation
page read and write
6B159000
unkown
page readonly
2C0000730000
trusted library allocation
page read and write
2C0000E2C000
trusted library allocation
page read and write
66C000AFC000
trusted library allocation
page read and write
2C0000830000
trusted library allocation
page read and write
A42DFFE000
unkown
page readonly
2F64000
heap
page read and write
260E2700000
heap
page read and write
69A800201000
trusted library allocation
page read and write
2C0000C84000
trusted library allocation
page read and write
4D88002E8000
direct allocation
page read and write
6AC70000
unkown
page readonly
7B380020C000
trusted library allocation
page read and write
2C0000970000
trusted library allocation
page read and write
462400219000
trusted library allocation
page read and write
6F71B000
unkown
page readonly
2E46000
heap
page read and write
2C000016C000
trusted library allocation
page read and write
66C000404000
trusted library allocation
page read and write
67D0002E0000
direct allocation
page read and write
C9E3DFE000
unkown
page readonly
211E7F90000
heap
page read and write
2F50000
heap
page readonly
63B4002D8000
trusted library allocation
page read and write
5A480027C000
trusted library allocation
page read and write
462400134000
trusted library allocation
page read and write
211E845E000
heap
page read and write
2C0000B68000
trusted library allocation
page read and write
2C0000D04000
trusted library allocation
page read and write
6BE31000
unkown
page execute read
2C0000D70000
trusted library allocation
page read and write
6AFF0000
unkown
page readonly
5FE800220000
direct allocation
page read and write
2C0000290000
trusted library allocation
page read and write
62480020D000
trusted library allocation
page read and write
5A48002A0000
trusted library allocation
page read and write
2EAC000
heap
page read and write
462400228000
trusted library allocation
page read and write
7B38002B4000
trusted library allocation
page read and write
A437FFE000
unkown
page readonly
56B0001BC000
trusted library allocation
page read and write
7300000
direct allocation
page execute and read and write
3A0C00230000
trusted library allocation
page read and write
C9D85FA000
stack
page read and write
340002F8000
trusted library allocation
page read and write
4D8800278000
direct allocation
page read and write
2C0000001000
trusted library allocation
page read and write
260E2723000
heap
page read and write
2C00008F8000
trusted library allocation
page read and write
2C0000280000
trusted library allocation
page read and write
4D7F000
stack
page read and write
211E8456000
heap
page read and write
2E52000
heap
page read and write
C9DA5FA000
stack
page read and write
244E4000
trusted library allocation
page read and write
66C0003EC000
trusted library allocation
page read and write
2EAC000
heap
page read and write
56B000338000
trusted library allocation
page read and write
7E92000
unkown
page readonly
6B112000
unkown
page execute read
211E8400000
heap
page read and write
438C00210000
direct allocation
page read and write
6BF39000
unkown
page read and write
69A80040C000
trusted library allocation
page read and write
4B54DFB000
stack
page read and write
66C000334000
trusted library allocation
page read and write
C0D37FF000
stack
page read and write
C9EFDFE000
unkown
page readonly
2C00006D8000
trusted library allocation
page read and write
66C00032C000
trusted library allocation
page read and write
56B0000ED000
trusted library allocation
page read and write
66C00031B000
trusted library allocation
page read and write
7B3800280000
trusted library allocation
page read and write
2C0000A7D000
trusted library allocation
page read and write
624800288000
trusted library allocation
page read and write
66C0008E4000
trusted library allocation
page read and write
2E57000
heap
page read and write
2C0000655000
trusted library allocation
page read and write
603000120000
trusted library allocation
page read and write
211E8424000
heap
page read and write
2C0000CA4000
trusted library allocation
page read and write
438C00244000
direct allocation
page read and write
66C00077C000
trusted library allocation
page read and write
21A001C2000
trusted library allocation
page read and write
2C0000B04000
trusted library allocation
page read and write
FC00280000
direct allocation
page read and write
56B000088000
trusted library allocation
page read and write
2C00001E8000
trusted library allocation
page read and write
603000095000
trusted library allocation
page read and write
66C000908000
trusted library allocation
page read and write
2E59000
heap
page read and write
1E20DD30000
heap
page read and write
2444C000
trusted library allocation
page read and write
6B102000
unkown
page execute read
66C0009CC000
trusted library allocation
page read and write
66C00028C000
trusted library allocation
page read and write
B2E000
stack
page read and write
2C000042C000
trusted library allocation
page read and write
69A800404000
trusted library allocation
page read and write
A429FFE000
unkown
page readonly
EB34DFE000
stack
page read and write
6B1E2000
unkown
page execute read
6AC72000
unkown
page execute read
74BE000
unkown
page readonly
171454B0000
remote allocation
page read and write
6ACC0000
unkown
page readonly
2C0000B50000
trusted library allocation
page read and write
6B141000
unkown
page read and write
5FE800230000
direct allocation
page read and write
2478002B8000
trusted library allocation
page read and write
274AD340000
unclassified section
page readonly
4D880030C000
direct allocation
page read and write
2C0000BA4000
trusted library allocation
page read and write
1607CF10000
heap
page readonly
66C0009DC000
trusted library allocation
page read and write
2C00000F8000
trusted library allocation
page read and write
66C0006FC000
trusted library allocation
page read and write
1E2093F0000
trusted library allocation
page read and write
66C0003EC000
trusted library allocation
page read and write
66C000614000
trusted library allocation
page read and write
260E092A000
heap
page read and write
C9D45FE000
stack
page read and write
56B0000F8000
trusted library allocation
page read and write
1E209505000
heap
page read and write
66C00078C000
trusted library allocation
page read and write
2C0000590000
trusted library allocation
page read and write
7B3800334000
trusted library allocation
page read and write
788C002AC000
direct allocation
page read and write
C9DF5FD000
stack
page read and write
734B000
direct allocation
page read and write
4D8800323000
direct allocation
page read and write
66C000AA1000
trusted library allocation
page read and write
788C002B0000
direct allocation
page read and write
5FE800234000
direct allocation
page read and write
FC00264000
direct allocation
page read and write
32280010000
trusted library allocation
page read and write
67D0002AC000
direct allocation
page read and write
7B38002C4000
trusted library allocation
page read and write
5FE800250000
direct allocation
page read and write
274AD502000
heap
page read and write
274B0262000
heap
page read and write
7B380029C000
trusted library allocation
page read and write
2CC400201000
trusted library allocation
page read and write
EB2F5FE000
stack
page read and write
2CC4002A4000
trusted library allocation
page read and write
171800258000
trusted library allocation
page read and write
56B000114000
trusted library allocation
page read and write
74B2000
unkown
page readonly
171800201000
trusted library allocation
page read and write
603000054000
trusted library allocation
page read and write
66C00028C000
trusted library allocation
page read and write
66C0003A0000
trusted library allocation
page read and write
7CA0000
direct allocation
page read and write
66C000750000
trusted library allocation
page read and write
2445C000
trusted library allocation
page read and write
20DC001C1000
trusted library allocation
page read and write
244C0000
trusted library allocation
page read and write
603000001000
trusted library allocation
page read and write
2C000037C000
trusted library allocation
page read and write
2C0000DAC000
trusted library allocation
page read and write
211E8424000
heap
page read and write
C0DAFFE000
unkown
page readonly
2C0000D14000
trusted library allocation
page read and write
2C0000CC4000
trusted library allocation
page read and write
6E5AC000
unkown
page readonly
21A00082000
trusted library allocation
page read and write
624800238000
trusted library allocation
page read and write
C9F7DFE000
unkown
page readonly
4B5C5FE000
unkown
page readonly
4624000D0000
trusted library allocation
page read and write
69A8002C8000
trusted library allocation
page read and write
66C000824000
trusted library allocation
page read and write
9E20000
direct allocation
page execute and read and write
C9D7DFE000
unkown
page readonly
274B02C4000
heap
page read and write
2EBB000
heap
page read and write
24490000
trusted library allocation
page read and write
66C000AE4000
trusted library allocation
page read and write
2CC4002A4000
trusted library allocation
page read and write
B66000
unkown
page readonly
2C00006D8000
trusted library allocation
page read and write
67D000288000
direct allocation
page read and write
603000028000
trusted library allocation
page read and write
6B276000
unkown
page execute read
624800210000
trusted library allocation
page read and write
274AD320000
heap
page read and write
66C0002A0000
trusted library allocation
page read and write
274B02AA000
heap
page read and write
2C0000368000
trusted library allocation
page read and write
56B000134000
trusted library allocation
page read and write
2C0000880000
trusted library allocation
page read and write
2C0000AA8000
trusted library allocation
page read and write
6B002000
unkown
page execute read
2C0000E3C000
trusted library allocation
page read and write
66C000A58000
trusted library allocation
page read and write
247800364000
trusted library allocation
page read and write
2C0000A98000
trusted library allocation
page read and write
171800220000
trusted library allocation
page read and write
2E71000
heap
page read and write
C9E9DFC000
stack
page read and write
5A48002A0000
trusted library allocation
page read and write
6B253000
unkown
page readonly
C9D9DFE000
unkown
page readonly
C9D05FE000
stack
page read and write
274AD360000
heap
page readonly
4B595FE000
unkown
page readonly
63B400274000
trusted library allocation
page read and write
340002A0000
trusted library allocation
page read and write
7B38002D4000
trusted library allocation
page read and write
4624001CC000
trusted library allocation
page read and write
274AD3C0000
trusted library allocation
page read and write
6B020000
unkown
page readonly
7B3800274000
trusted library allocation
page read and write
603000070000
trusted library allocation
page read and write
69A80033C000
trusted library allocation
page read and write
2C0000DC8000
trusted library allocation
page read and write
C0DDFFE000
unkown
page readonly
211E7EF5000
remote allocation
page execute read
211E8413000
heap
page read and write
1E2092B0000
heap
page read and write
69A800328000
trusted library allocation
page read and write
4D880037C000
direct allocation
page read and write
34000404000
trusted library allocation
page read and write
1607CF70000
heap
page read and write
2C000021C000
trusted library allocation
page read and write
260E2755000
heap
page read and write
462400001000
trusted library allocation
page read and write
7E12000
unkown
page readonly
56B00022C000
trusted library allocation
page read and write
2C0000801000
trusted library allocation
page read and write
C9F5DFE000
unkown
page readonly
2C0000114000
trusted library allocation
page read and write
2E5C000
heap
page read and write
66C000408000
trusted library allocation
page read and write
66C000824000
trusted library allocation
page read and write
247800404000
trusted library allocation
page read and write
211E842B000
heap
page read and write
34000334000
trusted library allocation
page read and write
2CC400248000
trusted library allocation
page read and write
66C000818000
trusted library allocation
page read and write
2478002BC000
trusted library allocation
page read and write
34000334000
trusted library allocation
page read and write
66C0009A0000
trusted library allocation
page read and write
56B0003A4000
trusted library allocation
page read and write
66C000380000
trusted library allocation
page read and write
752E000
stack
page read and write
2C0000994000
trusted library allocation
page read and write
438C00404000
direct allocation
page read and write
211EB635000
trusted library allocation
page read and write
4D8800315000
direct allocation
page read and write
2E72000
heap
page read and write
211E8424000
heap
page read and write
2C0000678000
trusted library allocation
page read and write
260E2755000
heap
page read and write
733B000
direct allocation
page read and write
462400201000
trusted library allocation
page read and write
69A800258000
trusted library allocation
page read and write
2C000000C000
trusted library allocation
page read and write
2EAF000
heap
page read and write
56B000324000
trusted library allocation
page read and write
21A00040000
trusted library allocation
page read and write
2CC400258000
trusted library allocation
page read and write
2F64000
heap
page read and write
66C0006F0000
trusted library allocation
page read and write
2C00003C4000
trusted library allocation
page read and write
66C00021B000
trusted library allocation
page read and write
66C00032C000
trusted library allocation
page read and write
6248002A8000
trusted library allocation
page read and write
C0D27FC000
stack
page read and write
171454F0000
unclassified section
page readonly
66C000AA8000
trusted library allocation
page read and write
20DC00121000
trusted library allocation
page read and write
260E0958000
heap
page read and write
5A48002A0000
trusted library allocation
page read and write
46240005C000
trusted library allocation
page read and write
2C0000D1C000
trusted library allocation
page read and write
2C0000324000
trusted library allocation
page read and write
2C0000B8C000
trusted library allocation
page read and write
56B00020C000
trusted library allocation
page read and write
2478002D8000
trusted library allocation
page read and write
438C002C0000
direct allocation
page read and write
2F14000
direct allocation
page read and write
274AD790000
unclassified section
page read and write
6BDC3000
unkown
page readonly
C9DFDFE000
unkown
page readonly
56B000254000
trusted library allocation
page read and write
34000288000
trusted library allocation
page read and write
7B3800240000
trusted library allocation
page read and write
211E842B000
heap
page read and write
FC00238000
direct allocation
page read and write
6ACA1000
unkown
page readonly
21A00182000
trusted library allocation
page read and write
2C000004A000
trusted library allocation
page read and write
2EAC000
heap
page read and write
260E08F1000
heap
page read and write
6030000FC000
trusted library allocation
page read and write
788C00230000
direct allocation
page read and write
6B012000
unkown
page execute read
6E18E000
unkown
page readonly
C0DB7FE000
stack
page read and write
6E381000
unkown
page read and write
2CC4002A4000
trusted library allocation
page read and write
211E7FF7000
unclassified section
page read and write
2C00007D8000
trusted library allocation
page read and write
C9EADFC000
stack
page read and write
6F99000
stack
page read and write
76FE000
stack
page read and write
788C00234000
direct allocation
page read and write
1E20DC50000
trusted library section
page readonly
2C00001C8000
trusted library allocation
page read and write
80A0000
direct allocation
page read and write
5A4800210000
trusted library allocation
page read and write
66C000334000
trusted library allocation
page read and write
211E8370000
unclassified section
page readonly
4B40000
direct allocation
page read and write
2C0000B40000
trusted library allocation
page read and write
66C000237000
trusted library allocation
page read and write
6BF5D000
unkown
page read and write
69A80020C000
trusted library allocation
page read and write
2C00008C4000
trusted library allocation
page read and write
6B0EB000
unkown
page readonly
274B0221000
heap
page read and write
66C000724000
trusted library allocation
page read and write
3A0C00238000
trusted library allocation
page read and write
2C0000390000
trusted library allocation
page read and write
5DA5000
direct allocation
page read and write
4D88002B0000
direct allocation
page read and write
2C00008A0000
trusted library allocation
page read and write
66C000788000
trusted library allocation
page read and write
6030000B8000
trusted library allocation
page read and write
5A48002AC000
trusted library allocation
page read and write
C0DA7FC000
stack
page read and write
63B40028C000
trusted library allocation
page read and write
2C0000C0C000
trusted library allocation
page read and write
211E7F20000
unclassified section
page readonly
274B0110000
trusted library allocation
page read and write
2C0000A84000
trusted library allocation
page read and write
5A48002D0000
trusted library allocation
page read and write
624800220000
trusted library allocation
page read and write
211E7F40000
heap
page read and write
2C0000E5C000
trusted library allocation
page read and write
462400028000
trusted library allocation
page read and write
1E209453000
heap
page read and write
4D8800274000
direct allocation
page read and write
56B00039E000
trusted library allocation
page read and write
340002C8000
trusted library allocation
page read and write
5A48002FC000
trusted library allocation
page read and write
74B6000
unkown
page readonly
66C000A6D000
trusted library allocation
page read and write
EB2FDFE000
stack
page read and write
66C000794000
trusted library allocation
page read and write
788C00220000
direct allocation
page read and write
2EA6000
heap
page read and write
21A00000000
trusted library allocation
page readonly
73A1000
heap
page read and write
63B400210000
trusted library allocation
page read and write
4D880030F000
direct allocation
page read and write
66C000340000
trusted library allocation
page read and write
20DC00101000
trusted library allocation
page read and write
9F14000
heap
page execute and read and write
69A800248000
trusted library allocation
page read and write
2C0000948000
trusted library allocation
page read and write
FC002D4000
direct allocation
page read and write
5DEC000
direct allocation
page read and write
8840000
direct allocation
page read and write
3A0C002B4000
trusted library allocation
page read and write
260E0938000
heap
page read and write
66C000620000
trusted library allocation
page read and write
56B0003BC000
trusted library allocation
page read and write
2E99000
heap
page read and write
56B00027C000
trusted library allocation
page read and write
7B3800260000
trusted library allocation
page read and write
56B0001C8000
trusted library allocation
page read and write
438C00201000
direct allocation
page read and write
56B0001EC000
trusted library allocation
page read and write
2C0000658000
trusted library allocation
page read and write
C0DCFFE000
unkown
page readonly
5FE800284000
direct allocation
page read and write
66C000230000
trusted library allocation
page read and write
66C000618000
trusted library allocation
page read and write
66C0008BC000
trusted library allocation
page read and write
211E8042000
heap
page read and write
4B57DFD000
stack
page read and write
777E000
stack
page read and write
274B02C2000
heap
page read and write
6F80D000
unkown
page readonly
46240013F000
trusted library allocation
page read and write
6BE30000
unkown
page readonly
86F0000
direct allocation
page read and write
66C000918000
trusted library allocation
page read and write
2E59000
heap
page read and write
66C00061C000
trusted library allocation
page read and write
2EB4000
heap
page read and write
6CC1D000
unkown
page readonly
56B000138000
trusted library allocation
page read and write
5A4800244000
trusted library allocation
page read and write
FC002F4000
direct allocation
page read and write
2C000060D000
trusted library allocation
page read and write
6B201000
unkown
page read and write
EB325FE000
stack
page read and write
A42FFFE000
unkown
page readonly
EB345FF000
stack
page read and write
3A0C002B4000
trusted library allocation
page read and write
2C00003B8000
trusted library allocation
page read and write
C9E4DFE000
unkown
page readonly
66C00061C000
trusted library allocation
page read and write
2C0000AC4000
trusted library allocation
page read and write
1718002C4000
trusted library allocation
page read and write
260E08F6000
heap
page read and write
5A4800268000
trusted library allocation
page read and write
6B1F1000
unkown
page readonly
211E7FFD000
unclassified section
page read and write
260E08EB000
heap
page read and write
5A48002B4000
trusted library allocation
page read and write
69A800408000
trusted library allocation
page read and write
462400124000
trusted library allocation
page read and write
66C0006D4000
trusted library allocation
page read and write
5FE8002C4000
direct allocation
page read and write
2C0000830000
trusted library allocation
page read and write
63B400248000
trusted library allocation
page read and write
63B4002B0000
trusted library allocation
page read and write
2CC4002C4000
trusted library allocation
page read and write
66C000624000
trusted library allocation
page read and write
21A001C0000
trusted library allocation
page read and write
725F000
stack
page read and write
6B6A3000
unkown
page execute read
56B0000BC000
trusted library allocation
page read and write
7B3800237000
trusted library allocation
page read and write
2C0000828000
trusted library allocation
page read and write
247800310000
trusted library allocation
page read and write
2C00005B8000
trusted library allocation
page read and write
211E8424000
heap
page read and write
7B38002EC000
trusted library allocation
page read and write
2C0000590000
trusted library allocation
page read and write
2C00008F4000
trusted library allocation
page read and write
24780031C000
trusted library allocation
page read and write
69A800274000
trusted library allocation
page read and write
63B400201000
trusted library allocation
page read and write
67D000264000
direct allocation
page read and write
4624001B8000
trusted library allocation
page read and write
C9DD5FD000
stack
page read and write
2C0000714000
trusted library allocation
page read and write
74CB000
unkown
page readonly
2C00007BC000
trusted library allocation
page read and write
2C0000E64000
trusted library allocation
page read and write
73A0000
heap
page read and write
66C000708000
trusted library allocation
page read and write
63B40028C000
trusted library allocation
page read and write
5A4800230000
trusted library allocation
page read and write
274B023C000
heap
page read and write
56B000134000
trusted library allocation
page read and write
247800430000
trusted library allocation
page read and write
2C00003D8000
trusted library allocation
page read and write
7E10000
unkown
page readonly
C0DD7FE000
stack
page read and write
6B6B1000
unkown
page execute read
5FE800274000
direct allocation
page read and write
788C00284000
direct allocation
page read and write
63B4002C8000
trusted library allocation
page read and write
1E20942B000
heap
page read and write
2C0000DBC000
trusted library allocation
page read and write
244FC000
trusted library allocation
page read and write
6CC2C000
unkown
page read and write
6B110000
unkown
page readonly
80B5000
heap
page read and write
247800380000
trusted library allocation
page read and write
EB305FC000
stack
page read and write
274AD44C000
heap
page read and write
260E8020000
heap
page read and write
2C00001D0000
trusted library allocation
page read and write
66C0009E8000
trusted library allocation
page read and write
804C000
stack
page read and write
66C000848000
trusted library allocation
page read and write
274B026A000
heap
page read and write
2C0000684000
trusted library allocation
page read and write
247800334000
trusted library allocation
page read and write
6B261000
unkown
page read and write
2447C000
trusted library allocation
page read and write
244A4000
trusted library allocation
page read and write
2F1A000
direct allocation
page execute and read and write
260E2755000
heap
page read and write
17180020D000
trusted library allocation
page read and write
56B0003CC000
trusted library allocation
page read and write
72E0000
direct allocation
page read and write
69A800210000
trusted library allocation
page read and write
6AC40000
unkown
page readonly
274B0292000
heap
page read and write
A42CFFE000
unkown
page readonly
260E08CC000
heap
page read and write
2C0000A78000
trusted library allocation
page read and write
2CC400274000
trusted library allocation
page read and write
2C00009F0000
trusted library allocation
page read and write
171800244000
trusted library allocation
page read and write
2BCE000
stack
page read and write
FC00201000
direct allocation
page read and write
4B585FE000
unkown
page readonly
274AD43F000
heap
page read and write
2C0000920000
trusted library allocation
page read and write
C9E15FD000
stack
page read and write
274AD42F000
heap
page read and write
7D02000
direct allocation
page read and write
17145510000
heap
page read and write
2C0000124000
trusted library allocation
page read and write
34000230000
trusted library allocation
page read and write
17145A05000
heap
page read and write
34000244000
trusted library allocation
page read and write
56B0001A8000
trusted library allocation
page read and write
EB315FB000
stack
page read and write
C0DFFFE000
unkown
page readonly
2E4C000
heap
page read and write
66C0006A0000
trusted library allocation
page read and write
73A1000
heap
page read and write
4D8800288000
direct allocation
page read and write
5FE800244000
direct allocation
page read and write
2E87000
heap
page read and write
260E07C0000
heap
page read and write
260E06A0000
heap
page read and write
2C0000401000
trusted library allocation
page read and write
2C0000AF0000
trusted library allocation
page read and write
2C0000BC4000
trusted library allocation
page read and write
56B000054000
trusted library allocation
page read and write
2C0000990000
trusted library allocation
page read and write
2C000008C000
trusted library allocation
page read and write
3A0C00240000
trusted library allocation
page read and write
66C000638000
trusted library allocation
page read and write
6CB98000
unkown
page read and write
603000058000
trusted library allocation
page read and write
274B0286000
heap
page read and write
6B1E0000
unkown
page readonly
80C0000
heap
page read and write
C9F9DFE000
unkown
page readonly
2C0000930000
trusted library allocation
page read and write
438C002BC000
direct allocation
page read and write
4D8800304000
direct allocation
page read and write
2C0000770000
trusted library allocation
page read and write
260E2755000
heap
page read and write
2E0F3FE000
stack
page read and write
17145602000
heap
page read and write
2C00003B4000
trusted library allocation
page read and write
56B0001C0000
trusted library allocation
page read and write
4B58DFE000
stack
page read and write
2E63000
heap
page read and write
17145600000
heap
page read and write
260E0913000
heap
page read and write
340002E8000
trusted library allocation
page read and write
6CAF6000
unkown
page readonly
2C0000814000
trusted library allocation
page read and write
2C00000BC000
trusted library allocation
page read and write
1718002D4000
trusted library allocation
page read and write
69A800358000
trusted library allocation
page read and write
6B203000
unkown
page execute read
66C000A44000
trusted library allocation
page read and write
3A0C00270000
trusted library allocation
page read and write
66C000370000
trusted library allocation
page read and write
260E0846000
heap
page read and write
462400178000
trusted library allocation
page read and write
260E2717000
heap
page read and write
624800248000
trusted library allocation
page read and write
2C0000914000
trusted library allocation
page read and write
66C00035E000
trusted library allocation
page read and write
17145830000
heap
page read and write
24448000
trusted library allocation
page read and write
24780033C000
trusted library allocation
page read and write
6FA0000
heap
page read and write
2C000052C000
trusted library allocation
page read and write
247800201000
trusted library allocation
page read and write
462400234000
trusted library allocation
page read and write
5A48002A0000
trusted library allocation
page read and write
2C0000E01000
trusted library allocation
page read and write
C0DE7FE000
stack
page read and write
3A0C002A4000
trusted library allocation
page read and write
FC0027C000
direct allocation
page read and write
260E271E000
heap
page read and write
2CC4002A4000
trusted library allocation
page read and write
211EB3F0000
unclassified section
page read and write
340002A4000
trusted library allocation
page read and write
7E90000
unkown
page readonly
2E3C000
heap
page read and write
260E90A0000
heap
page read and write
56B000130000
trusted library allocation
page read and write
2C000082B000
trusted library allocation
page read and write
6F701000
unkown
page read and write
2C00003C8000
trusted library allocation
page read and write
EB335FF000
stack
page read and write
24424000
trusted library allocation
page read and write
66C0006DC000
trusted library allocation
page read and write
603000124000
trusted library allocation
page read and write
2C0000DF8000
trusted library allocation
page read and write
6030000D4000
trusted library allocation
page read and write
274AD300000
remote allocation
page read and write
2E47000
heap
page read and write
2C000045F000
trusted library allocation
page read and write
B66000
unkown
page readonly
462400074000
trusted library allocation
page read and write
24780040C000
trusted library allocation
page read and write
2C0000A50000
trusted library allocation
page read and write
260E07E0000
trusted library allocation
page read and write
624800278000
trusted library allocation
page read and write
462400158000
trusted library allocation
page read and write
4624001E0000
trusted library allocation
page read and write
2C0000A28000
trusted library allocation
page read and write
2CC4002C8000
trusted library allocation
page read and write
2C00002E8000
trusted library allocation
page read and write
6B1E1000
unkown
page read and write
6AC80000
unkown
page readonly
B30000
unkown
page readonly
2E43000
heap
page read and write
4D8800298000
direct allocation
page read and write
80B0000
heap
page read and write
32200010000
trusted library allocation
page read and write
5A48002D0000
trusted library allocation
page read and write
17145500000
unclassified section
page readonly
3A0C002CC000
trusted library allocation
page read and write
260E2756000
heap
page read and write
2C0000234000
trusted library allocation
page read and write
1718002B8000
trusted library allocation
page read and write
274AD350000
heap
page read and write
995C000
stack
page read and write
6C766000
unkown
page readonly
6C8BA000
unkown
page execute and read and write
260E092A000
heap
page read and write
5A4800254000
trusted library allocation
page read and write
56B0003AC000
trusted library allocation
page read and write
260E2755000
heap
page read and write
462400098000
trusted library allocation
page read and write
C9FB5FD000
stack
page read and write
6AC51000
unkown
page readonly
211E7EE0000
remote allocation
page read and write
274AD2A0000
heap
page read and write
69A800230000
trusted library allocation
page read and write
56B0000D8000
trusted library allocation
page read and write
1E2092D0000
heap
page read and write
4BA0000
direct allocation
page read and write
56B000198000
trusted library allocation
page read and write
6C8BB000
unkown
page execute read
73B0000
heap
page read and write
260E2755000
heap
page read and write
260E2755000
heap
page read and write
7D10000
heap
page read and write
FC002C4000
direct allocation
page read and write
2450C000
trusted library allocation
page read and write
211E8402000
heap
page read and write
438C00294000
direct allocation
page read and write
4D8800217000
direct allocation
page read and write
56B000060000
trusted library allocation
page read and write
462400244000
trusted library allocation
page read and write
4D8800210000
direct allocation
page read and write
66C000358000
trusted library allocation
page read and write
274AD457000
heap
page read and write
4624000A5000
trusted library allocation
page read and write
C9D75FE000
stack
page read and write
69A800334000
trusted library allocation
page read and write
C0E2FFE000
unkown
page readonly
EB2EDEF000
stack
page read and write
67D000230000
direct allocation
page read and write
211E8423000
heap
page read and write
56B00036F000
trusted library allocation
page read and write
69A8002A0000
trusted library allocation
page read and write
85C0000
heap
page read and write
56B00000C000
trusted library allocation
page read and write
6248002B8000
trusted library allocation
page read and write
274AD770000
trusted library allocation
page read and write
2CC40020C000
trusted library allocation
page read and write
6ACF1000
unkown
page read and write
1E2093B0000
heap
page readonly
66C000834000
trusted library allocation
page read and write
4D88002E0000
direct allocation
page read and write
438C00284000
direct allocation
page read and write
4B50000
heap
page execute and read and write
24434000
trusted library allocation
page read and write
2CC400230000
trusted library allocation
page read and write
5FE8002B4000
direct allocation
page read and write
7B380029C000
trusted library allocation
page read and write
86C7000
direct allocation
page read and write
2C0000CE8000
trusted library allocation
page read and write
2CC4002C4000
trusted library allocation
page read and write
274B02AD000
heap
page read and write
56B00021C000
trusted library allocation
page read and write
66C00097C000
trusted library allocation
page read and write
2CC4002B8000
trusted library allocation
page read and write
6ACED000
unkown
page readonly
B30000
unkown
page readonly
462400190000
trusted library allocation
page read and write
46240024C000
trusted library allocation
page read and write
2C000023A000
trusted library allocation
page read and write
438C002A8000
direct allocation
page read and write
C9F4DFE000
unkown
page readonly
56B0000E0000
trusted library allocation
page read and write
9A8E000
stack
page read and write
260E2731000
heap
page read and write
C9E1DFE000
unkown
page readonly
69A800284000
trusted library allocation
page read and write
6F702000
unkown
page execute read
7CE0000
unkown
page readonly
24780024C000
trusted library allocation
page read and write
2C0000B30000
trusted library allocation
page read and write
69A8002A4000
trusted library allocation
page read and write
2C0000DDC000
trusted library allocation
page read and write
56B000024000
trusted library allocation
page read and write
2C00007EC000
trusted library allocation
page read and write
2442C000
trusted library allocation
page read and write
260E9010000
heap
page read and write
211EB5F4000
trusted library allocation
page read and write
66C000610000
trusted library allocation
page read and write
C0DEFFE000
unkown
page readonly
2C00009B8000
trusted library allocation
page read and write
6AC62000
unkown
page execute read
3400033C000
trusted library allocation
page read and write
274B0273000
heap
page read and write
603000024000
trusted library allocation
page read and write
788C002C4000
direct allocation
page read and write
274B02A5000
heap
page read and write
2C0000394000
trusted library allocation
page read and write
6AC5D000
unkown
page readonly
66C00020C000
trusted library allocation
page read and write
4D880031E000
direct allocation
page read and write
56B000368000
trusted library allocation
page read and write
260E2755000
heap
page read and write
34000274000
trusted library allocation
page read and write
1E20DE02000
heap
page read and write
A4367FE000
stack
page read and write
2C00008E4000
trusted library allocation
page read and write
2C0000AA4000
trusted library allocation
page read and write
462400184000
trusted library allocation
page read and write
2C000020C000
trusted library allocation
page read and write
66C0002D8000
trusted library allocation
page read and write
211E8053000
heap
page read and write
2CC400294000
trusted library allocation
page read and write
2C0000890000
trusted library allocation
page read and write
7B3800324000
trusted library allocation
page read and write
7B38002F0000
trusted library allocation
page read and write
2F60000
heap
page read and write
260E2749000
heap
page read and write
C9CF5FE000
stack
page read and write
17148B80000
unclassified section
page read and write
260E082B000
heap
page read and write
A434FFE000
unkown
page readonly
2C0000D84000
trusted library allocation
page read and write
6B018000
unkown
page readonly
788C00244000
direct allocation
page read and write
56B000038000
trusted library allocation
page read and write
56B000178000
trusted library allocation
page read and write
72F0000
direct allocation
page read and write
69A800264000
trusted library allocation
page read and write
3A0C00220000
trusted library allocation
page read and write
C0DC7FC000
stack
page read and write
74E0000
direct allocation
page read and write
260E08C0000
heap
page read and write
C9DADFE000
unkown
page readonly
56B000138000
trusted library allocation
page read and write
24480000
trusted library allocation
page read and write
4D8800234000
direct allocation
page read and write
6B13C000
unkown
page readonly
3400040C000
trusted library allocation
page read and write
6B6DB000
unkown
page execute read
2CC400268000
trusted library allocation
page read and write
56B000328000
trusted library allocation
page read and write
24414000
trusted library allocation
page read and write
6BF65000
unkown
page execute read
56B00012C000
trusted library allocation
page read and write
C9F6DFE000
unkown
page readonly
2C00000D8000
trusted library allocation
page read and write
2C0000C94000
trusted library allocation
page read and write
274B0281000
heap
page read and write
438C00274000
direct allocation
page read and write
211E8409000
heap
page read and write
6B555000
unkown
page execute read
5A4800258000
trusted library allocation
page read and write
C9E55FC000
stack
page read and write
66C00094C000
trusted library allocation
page read and write
247800238000
trusted library allocation
page read and write
624800284000
trusted library allocation
page read and write
66C0009A4000
trusted library allocation
page read and write
438C00220000
direct allocation
page read and write
340002A0000
trusted library allocation
page read and write
5FE8002D0000
direct allocation
page read and write
67D000220000
direct allocation
page read and write
2C000033C000
trusted library allocation
page read and write
56B00036C000
trusted library allocation
page read and write
2C0000328000
trusted library allocation
page read and write
6AFF2000
unkown
page execute read
A432FFE000
unkown
page readonly
66C000694000
trusted library allocation
page read and write
2F2C000
direct allocation
page execute and read and write
B59000
unkown
page readonly
6B160000
unkown
page readonly
244C8000
trusted library allocation
page read and write
211E8460000
heap
page read and write
66C0008AC000
trusted library allocation
page read and write
66C000AAC000
trusted library allocation
page read and write
624800258000
trusted library allocation
page read and write
2C0000198000
trusted library allocation
page read and write
2F64000
heap
page read and write
260E2602000
heap
page read and write
C9F25FD000
stack
page read and write
2EA6000
heap
page read and write
274AD469000
heap
page read and write
2C0000300000
trusted library allocation
page read and write
260E07A0000
heap
page read and write
6F72B000
unkown
page readonly
66C0003D4000
trusted library allocation
page read and write
2C0000B0C000
trusted library allocation
page read and write
6ACB2000
unkown
page execute read
624800230000
trusted library allocation
page read and write
4AF0000
heap
page read and write
66C0006AC000
trusted library allocation
page read and write
171800230000
trusted library allocation
page read and write
34000328000
trusted library allocation
page read and write
5D81000
direct allocation
page read and write
66C0008A9000
trusted library allocation
page read and write
5A48002C0000
trusted library allocation
page read and write
C9F75FE000
stack
page read and write
247800418000
trusted library allocation
page read and write
2C0000728000
trusted library allocation
page read and write
7B3800210000
trusted library allocation
page read and write
211E7F62000
unclassified section
page read and write
244B8000
trusted library allocation
page read and write
6CB9E000
unkown
page read and write
56B0001B0000
trusted library allocation
page read and write
274B02B8000
heap
page read and write
A4287FE000
stack
page read and write
3A0C00244000
trusted library allocation
page read and write
462400108000
trusted library allocation
page read and write
2478002C4000
trusted library allocation
page read and write
17145440000
unclassified section
page readonly
A4347FE000
stack
page read and write
C9DB5FD000
stack
page read and write
260E0884000
heap
page read and write
5DE8000
direct allocation
page read and write
56B000399000
trusted library allocation
page read and write
2C0000854000
trusted library allocation
page read and write
2C0000C01000
trusted library allocation
page read and write
274B0200000
heap
page read and write
2C0000201000
trusted library allocation
page read and write
24780033C000
trusted library allocation
page read and write
7CE2000
unkown
page readonly
56B0000A0000
trusted library allocation
page read and write
7350000
direct allocation
page read and write
2C0000B80000
trusted library allocation
page read and write
66C000628000
trusted library allocation
page read and write
340002A4000
trusted library allocation
page read and write
2C0000A1C000
trusted library allocation
page read and write
34000418000
trusted library allocation
page read and write
2446C000
trusted library allocation
page read and write
86E0000
direct allocation
page execute and read and write
462400068000
trusted library allocation
page read and write
56B00019C000
trusted library allocation
page read and write
462400038000
trusted library allocation
page read and write
2478002F1000
trusted library allocation
page read and write
5A48002D0000
trusted library allocation
page read and write
244D8000
trusted library allocation
page read and write
66C000898000
trusted library allocation
page read and write
C9E35FD000
stack
page read and write
60300000C000
trusted library allocation
page read and write
3A0C00280000
trusted library allocation
page read and write
4BF8000
heap
page read and write
C9E85FE000
unkown
page readonly
66C00060C000
trusted library allocation
page read and write
5A4800238000
trusted library allocation
page read and write
7573000
heap
page read and write
A67000
stack
page read and write
7FF8C7010000
direct allocation
page execute read
438C002CC000
direct allocation
page read and write
66C00086D000
trusted library allocation
page read and write
1607CE10000
heap
page read and write
211E8424000
heap
page read and write
2C0000B30000
trusted library allocation
page read and write
6C7B1000
unkown
page execute read
5A4800220000
trusted library allocation
page read and write
A4377FE000
stack
page read and write
FC00254000
direct allocation
page read and write
4D88002BC000
direct allocation
page read and write
A42BFFE000
unkown
page readonly
2C0000BB0000
trusted library allocation
page read and write
5A48002C0000
trusted library allocation
page read and write
66C0006BC000
trusted library allocation
page read and write
66C000888000
trusted library allocation
page read and write
24510000
trusted library allocation
page read and write
3400033C000
trusted library allocation
page read and write
603000108000
trusted library allocation
page read and write
66C000829000
trusted library allocation
page read and write
66C0003AA000
trusted library allocation
page read and write
66C0003B4000
trusted library allocation
page read and write
3A0C002C0000
trusted library allocation
page read and write
C9D95FE000
stack
page read and write
8700000
direct allocation
page read and write
6B142000
unkown
page execute read
274AD41C000
heap
page read and write
C9F45FE000
stack
page read and write
24780029C000
trusted library allocation
page read and write
2CC400284000
trusted library allocation
page read and write
46240020C000
trusted library allocation
page read and write
69A800254000
trusted library allocation
page read and write
5A48002B4000
trusted library allocation
page read and write
2C0000D08000
trusted library allocation
page read and write
2E59000
heap
page read and write
6248002A0000
trusted library allocation
page read and write
C0E3FFE000
unkown
page readonly
260E5C00000
heap
page read and write
2C0000B74000
trusted library allocation
page read and write
34000284000
trusted library allocation
page read and write
2C0000A3C000
trusted library allocation
page read and write
66C000220000
trusted library allocation
page read and write
17145860000
trusted library allocation
page read and write
260E2755000
heap
page read and write
624800244000
trusted library allocation
page read and write
2F64000
heap
page read and write
2E77000
heap
page read and write
603000060000
trusted library allocation
page read and write
67D000201000
direct allocation
page read and write
66C000730000
trusted library allocation
page read and write
C0E0FFE000
unkown
page readonly
2C0000BF0000
trusted library allocation
page read and write
2C0000D74000
trusted library allocation
page read and write
63B400230000
trusted library allocation
page read and write
C9E65FE000
unkown
page readonly
4D880032C000
direct allocation
page read and write
C9F1DFE000
unkown
page readonly
56B000386000
trusted library allocation
page read and write
2F64000
heap
page read and write
4D8800304000
direct allocation
page read and write
2C00001B9000
trusted library allocation
page read and write
2C0000661000
trusted library allocation
page read and write
56B0001DC000
trusted library allocation
page read and write
2CC4002C4000
trusted library allocation
page read and write
4D880034F000
direct allocation
page read and write
B47000
unkown
page readonly
66C000A90000
trusted library allocation
page read and write
80D0000
heap
page read and write
462400084000
trusted library allocation
page read and write
2C00005A8000
trusted library allocation
page read and write
2C0000E64000
trusted library allocation
page read and write
6BF5F000
unkown
page read and write
2C0000DB0000
trusted library allocation
page read and write
4D8800294000
direct allocation
page read and write
2C0000624000
trusted library allocation
page read and write
66C0008AC000
trusted library allocation
page read and write
34000220000
trusted library allocation
page read and write
2E3C000
heap
page read and write
7360000
direct allocation
page read and write
247800310000
trusted library allocation
page read and write
67D000254000
direct allocation
page read and write
1718002A8000
trusted library allocation
page read and write
2CC400210000
trusted library allocation
page read and write
2E47000
heap
page read and write
1607D01C000
heap
page read and write
66C000A18000
trusted library allocation
page read and write
20DC001C6000
trusted library allocation
page read and write
A4297FE000
stack
page read and write
260E0813000
heap
page read and write
63B400298000
trusted library allocation
page read and write
66C000770000
trusted library allocation
page read and write
2C000071C000
trusted library allocation
page read and write
56B000114000
trusted library allocation
page read and write
211E8102000
heap
page read and write
2E3C000
heap
page read and write
603000114000
trusted library allocation
page read and write
2C0000054000
trusted library allocation
page read and write
247800230000
trusted library allocation
page read and write
624800254000
trusted library allocation
page read and write
2F64000
heap
page read and write
438C00250000
direct allocation
page read and write
1714562B000
heap
page read and write
2C00006F0000
trusted library allocation
page read and write
211E7E70000
unclassified section
page readonly
2C0000234000
trusted library allocation
page read and write
2C0000DA0000
trusted library allocation
page read and write
2C000085C000
trusted library allocation
page read and write
6BF50000
unkown
page readonly
56B000348000
trusted library allocation
page read and write
66C000375000
trusted library allocation
page read and write
69A800237000
trusted library allocation
page read and write
260E2754000
heap
page read and write
20DC001E1000
trusted library allocation
page read and write
2E50000
heap
page read and write
69A8002A0000
trusted library allocation
page read and write
66C00032C000
trusted library allocation
page read and write
20DC00181000
trusted library allocation
page read and write
C0E17FE000
stack
page read and write
6E151000
unkown
page execute read
3400020C000
trusted library allocation
page read and write
2C000015C000
trusted library allocation
page read and write
A4277F6000
stack
page read and write
2CC4002C4000
trusted library allocation
page read and write
66C000754000
trusted library allocation
page read and write
2C00009F0000
trusted library allocation
page read and write
69A800244000
trusted library allocation
page read and write
FC00220000
direct allocation
page read and write
260E279D000
heap
page read and write
2C00004D0000
trusted library allocation
page read and write
73A1000
heap
page read and write
1607CF30000
heap
page read and write
244A4000
trusted library allocation
page read and write
69A800310000
trusted library allocation
page read and write
56B00027C000
trusted library allocation
page read and write
C9FBDFE000
unkown
page readonly
66C000998000
trusted library allocation
page read and write
2F04000
direct allocation
page read and write
4624000C0000
trusted library allocation
page read and write
6B1A5000
unkown
page readonly
2F22000
direct allocation
page execute and read and write
66C00093C000
trusted library allocation
page read and write
2CC4002C8000
trusted library allocation
page read and write
211E7F30000
unclassified section
page readonly
2E7F000
heap
page read and write
56B0000AC000
trusted library allocation
page read and write
4B5B5FE000
unkown
page readonly
FC0029C000
direct allocation
page read and write
2C0000244000
trusted library allocation
page read and write
C9EA5FE000
unkown
page readonly
C9EB5FE000
unkown
page readonly
7380000
direct allocation
page read and write
438C00264000
direct allocation
page read and write
274AD7C0000
unclassified section
page read and write
56B000120000
trusted library allocation
page read and write
4D8800338000
direct allocation
page read and write
260E0927000
heap
page read and write
56B0000CC000
trusted library allocation
page read and write
171800254000
trusted library allocation
page read and write
69A8002E4000
trusted library allocation
page read and write
260E2765000
heap
page read and write
2C00002EC000
trusted library allocation
page read and write
5A48002B4000
trusted library allocation
page read and write
56B000070000
trusted library allocation
page read and write
4624000D8000
trusted library allocation
page read and write
C9D0DFE000
unkown
page readonly
A42C7FE000
stack
page read and write
4D88002FF000
direct allocation
page read and write
7CEA000
unkown
page readonly
2C0000648000
trusted library allocation
page read and write
171454E0000
heap
page read and write
66C0006AC000
trusted library allocation
page read and write
24780025C000
trusted library allocation
page read and write
A42D7FE000
stack
page read and write
788C002B4000
direct allocation
page read and write
2C000094C000
trusted library allocation
page read and write
7B3800300000
trusted library allocation
page read and write
7B3800220000
trusted library allocation
page read and write
2C0000E24000
trusted library allocation
page read and write
5FE8002A0000
direct allocation
page read and write
2C0000A60000
trusted library allocation
page read and write
66C0006E4000
trusted library allocation
page read and write
6B100000
unkown
page readonly
7B3800201000
trusted library allocation
page read and write
4AE0000
direct allocation
page read and write
2C0000940000
trusted library allocation
page read and write
17145819000
unclassified section
page read and write
66C000674000
trusted library allocation
page read and write
AE0000
heap
page read and write
438C00298000
direct allocation
page read and write
56B000130000
trusted library allocation
page read and write
2C0000A88000
trusted library allocation
page read and write
2C0000590000
trusted library allocation
page read and write
603000044000
trusted library allocation
page read and write
FC002C0000
direct allocation
page read and write
66C00069A000
trusted library allocation
page read and write
7008000
heap
page read and write
69A8002B8000
trusted library allocation
page read and write
66C000801000
trusted library allocation
page read and write
211E842B000
heap
page read and write
66C000624000
trusted library allocation
page read and write
2CC400238000
trusted library allocation
page read and write
2C0000E45000
trusted library allocation
page read and write
7DF4E03E1000
trusted library allocation
page execute read
211E8424000
heap
page read and write
260E2737000
heap
page read and write
274B02AF000
heap
page read and write
274B0241000
heap
page read and write
2C00009C8000
trusted library allocation
page read and write
2C0000B1C000
trusted library allocation
page read and write
2478002D0000
trusted library allocation
page read and write
4D88002C4000
direct allocation
page read and write
211E842B000
heap
page read and write
B31000
unkown
page execute read
6B1B1000
unkown
page read and write
66C000634000
trusted library allocation
page read and write
EB32DFD000
stack
page read and write
A42E7FE000
stack
page read and write
56B000138000
trusted library allocation
page read and write
2C0000840000
trusted library allocation
page read and write
56B00037C000
trusted library allocation
page read and write
66C0003D4000
trusted library allocation
page read and write
2C0000C74000
trusted library allocation
page read and write
2C0000CFD000
trusted library allocation
page read and write
260E085E000
heap
page read and write
260E272E000
heap
page read and write
244B0000
trusted library allocation
page read and write
247800348000
trusted library allocation
page read and write
1E209502000
heap
page read and write
211E8424000
heap
page read and write
5FE800254000
direct allocation
page read and write
46240001C000
trusted library allocation
page read and write
9E30000
unkown
page readonly
7037000
heap
page read and write
A4327FE000
stack
page read and write
211E8424000
heap
page read and write
247800328000
trusted library allocation
page read and write
274B0302000
heap
page read and write
260E0902000
heap
page read and write
438C002A4000
direct allocation
page read and write
2E86000
heap
page read and write
66C000320000
trusted library allocation
page read and write
C9E05FE000
stack
page read and write
56B000108000
trusted library allocation
page read and write
2C00009A8000
trusted library allocation
page read and write
2E0A000
heap
page read and write
21A00040000
trusted library allocation
page readonly
67D000284000
direct allocation
page read and write
5A48002D0000
trusted library allocation
page read and write
17145613000
heap
page read and write
A433FFE000
unkown
page readonly
2C0000CB4000
trusted library allocation
page read and write
66C0003C8000
trusted library allocation
page read and write
603000110000
trusted library allocation
page read and write
2C0000D34000
trusted library allocation
page read and write
274AD802000
heap
page read and write
462400148000
trusted library allocation
page read and write
2EA2000
heap
page read and write
274B027E000
heap
page read and write
247800284000
trusted library allocation
page read and write
244B0000
trusted library allocation
page read and write
8E9000
stack
page read and write
56B00035C000
trusted library allocation
page read and write
2440C000
trusted library allocation
page read and write
C0DBFFE000
unkown
page readonly
6FEA000
heap
page read and write
2C0000AF9000
trusted library allocation
page read and write
4D88002AC000
direct allocation
page read and write
2C0000B00000
trusted library allocation
page read and write
4D8800314000
direct allocation
page read and write
56B000120000
trusted library allocation
page read and write
2ED0000
heap
page read and write
2C0000A0C000
trusted library allocation
page read and write
1E20943F000
heap
page read and write
808E000
stack
page read and write
7570000
heap
page read and write
5A4800238000
trusted library allocation
page read and write
6AC59000
unkown
page read and write
FC0020C000
direct allocation
page read and write
C0D8FFE000
unkown
page readonly
2EA2000
heap
page read and write
56B000134000
trusted library allocation
page read and write
211EBD2D000
unclassified section
page read and write
2CC40028C000
trusted library allocation
page read and write
2E5C000
heap
page read and write
2C000099C000
trusted library allocation
page read and write
56B0000C8000
trusted library allocation
page read and write
66C0003E0000
trusted library allocation
page read and write
46240008A000
trusted library allocation
page read and write
2C000001C000
trusted library allocation
page read and write
66C000A0C000
trusted library allocation
page read and write
2C0000908000
trusted library allocation
page read and write
56B000394000
trusted library allocation
page read and write
2C0000A68000
trusted library allocation
page read and write
2C00000CC000
trusted library allocation
page read and write
2CC4002B8000
trusted library allocation
page read and write
4624000A8000
trusted library allocation
page read and write
66C0009D0000
trusted library allocation
page read and write
FC002FC000
direct allocation
page read and write
6248002B8000
trusted library allocation
page read and write
2C00005A0000
trusted library allocation
page read and write
171455F0000
heap
page readonly
244B0000
trusted library allocation
page read and write
4D880030C000
direct allocation
page read and write
732B000
direct allocation
page read and write
5A48002A0000
trusted library allocation
page read and write
56B000158000
trusted library allocation
page read and write
2C0000BB0000
trusted library allocation
page read and write
63B40027C000
trusted library allocation
page read and write
5A48002F0000
trusted library allocation
page read and write
66C0002C8000
trusted library allocation
page read and write
2C0000A54000
trusted library allocation
page read and write
6E5A2000
unkown
page execute read
2ED0000
heap
page read and write
2C0000D50000
trusted library allocation
page read and write
34000310000
trusted library allocation
page read and write
7354000
direct allocation
page read and write
2F64000
heap
page read and write
2C0000274000
trusted library allocation
page read and write
2C00007AC000
trusted library allocation
page read and write
2E3F000
heap
page read and write
6B260000
unkown
page readonly
274AD49A000
heap
page read and write
438C002E4000
direct allocation
page read and write
C0DF7FE000
stack
page read and write
66C000334000
trusted library allocation
page read and write
7390000
direct allocation
page read and write
9C46000
heap
page read and write
4B5ADFD000
stack
page read and write
66C00074C000
trusted library allocation
page read and write
C9F15FD000
stack
page read and write
247800284000
trusted library allocation
page read and write
2EE2000
heap
page read and write
66C000A78000
trusted library allocation
page read and write
56B000138000
trusted library allocation
page read and write
AD0000
heap
page read and write
67D0002A0000
direct allocation
page read and write
2C0000D78000
trusted library allocation
page read and write
78FF000
stack
page read and write
6B021000
unkown
page read and write
2C00006D8000
trusted library allocation
page read and write
6FDF000
heap
page read and write
69A8002E8000
trusted library allocation
page read and write
FC00270000
direct allocation
page read and write
2C00003B0000
trusted library allocation
page read and write
2C00005CC000
trusted library allocation
page read and write
2C0000D20000
trusted library allocation
page read and write
2C000095C000
trusted library allocation
page read and write
2C0000354000
trusted library allocation
page read and write
C0D7FFE000
unkown
page readonly
260E0935000
heap
page read and write
5A48002A0000
trusted library allocation
page read and write
66C000248000
trusted library allocation
page read and write
7392000
direct allocation
page read and write
66C000954000
trusted library allocation
page read and write
1714561B000
heap
page read and write
4D880030E000
direct allocation
page read and write
274B0243000
heap
page read and write
4624001CC000
trusted library allocation
page read and write
2C000017C000
trusted library allocation
page read and write
7700000
heap
page read and write
66C000620000
trusted library allocation
page read and write
66C000898000
trusted library allocation
page read and write
5A48002C0000
trusted library allocation
page read and write
24404000
trusted library allocation
page read and write
6F722000
unkown
page execute read
6B240000
unkown
page readonly
7B38002E0000
trusted library allocation
page read and write
C9F35FD000
stack
page read and write
6F800000
unkown
page readonly
2E0E000
heap
page read and write
C9E7DFD000
stack
page read and write
C9DDDFE000
unkown
page readonly
4D8800201000
direct allocation
page read and write
2C0000C54000
trusted library allocation
page read and write
260E08F8000
heap
page read and write
6248002C4000
trusted library allocation
page read and write
2E00000
heap
page read and write
7D04000
direct allocation
page read and write
7B3800418000
trusted library allocation
page read and write
66C000418000
trusted library allocation
page read and write
6AC92000
unkown
page execute read
340002AC000
trusted library allocation
page read and write
211E8424000
heap
page read and write
7B3800230000
trusted library allocation
page read and write
247800288000
trusted library allocation
page read and write
274B02B1000
heap
page read and write
2F10000
direct allocation
page read and write
7B3800250000
trusted library allocation
page read and write
66C0002EC000
trusted library allocation
page read and write
2C00009E8000
trusted library allocation
page read and write
4624000EC000
trusted library allocation
page read and write
260E25C0000
trusted library section
page readonly
211E840C000
heap
page read and write
260E2775000
heap
page read and write
2C0000868000
trusted library allocation
page read and write
34000408000
trusted library allocation
page read and write
63B400278000
trusted library allocation
page read and write
C9E9DFE000
stack
page read and write
7341000
direct allocation
page read and write
7B38002A0000
trusted library allocation
page read and write
63B40028C000
trusted library allocation
page read and write
2C0000020000
trusted library allocation
page read and write
247800288000
trusted library allocation
page read and write
2CC4002B8000
trusted library allocation
page read and write
C9CE5F6000
stack
page read and write
260E2723000
heap
page read and write
2C0000A01000
trusted library allocation
page read and write
EB355FE000
stack
page read and write
1607D102000
heap
page read and write
69A800278000
trusted library allocation
page read and write
9E60000
direct allocation
page read and write
C9DE5FD000
stack
page read and write
2C0000BE4000
trusted library allocation
page read and write
66C0002CC000
trusted library allocation
page read and write
2C000063C000
trusted library allocation
page read and write
788C00294000
direct allocation
page read and write
4D880031C000
direct allocation
page read and write
34000254000
trusted library allocation
page read and write
1607EA02000
heap
page read and write
2E42000
heap
page read and write
7AFE000
stack
page read and write
C9E5DFD000
stack
page read and write
A42AFFE000
unkown
page readonly
69A8002F0000
trusted library allocation
page read and write
69A8002A4000
trusted library allocation
page read and write
60300009B000
trusted library allocation
page read and write
247800424000
trusted library allocation
page read and write
B4F000
unkown
page read and write
2E57000
heap
page read and write
66C000684000
trusted library allocation
page read and write
A4337F9000
stack
page read and write
63B40028C000
trusted library allocation
page read and write
211E8424000
heap
page read and write
2C00000A8000
trusted library allocation
page read and write
5A48002D0000
trusted library allocation
page read and write
2EB4000
heap
page read and write
2C000040C000
trusted library allocation
page read and write
2C000080C000
trusted library allocation
page read and write
2BF0000
direct allocation
page read and write
67D000210000
direct allocation
page read and write
4D8800320000
direct allocation
page read and write
66C000614000
trusted library allocation
page read and write
260E273B000
heap
page read and write
274B0312000
heap
page read and write
4624000E8000
trusted library allocation
page read and write
5A48002A0000
trusted library allocation
page read and write
624800201000
trusted library allocation
page read and write
A431FFE000
unkown
page readonly
24434000
trusted library allocation
page read and write
274AD813000
heap
page read and write
260E08A5000
heap
page read and write
274AD3A0000
heap
page read and write
260E0928000
heap
page read and write
2EAC000
heap
page read and write
2C0000AD4000
trusted library allocation
page read and write
2C0000DE8000
trusted library allocation
page read and write
2C0000134000
trusted library allocation
page read and write
2C0000B30000
trusted library allocation
page read and write
260E08F7000
heap
page read and write
34000258000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
729D000
stack
page read and write
6ACC2000
unkown
page execute read
2F1D000
direct allocation
page execute and read and write
2C0000BE4000
trusted library allocation
page read and write
4ADE000
stack
page read and write
274B0300000
heap
page read and write
788C00254000
direct allocation
page read and write
66C0003C0000
trusted library allocation
page read and write
A4317FC000
stack
page read and write
2F64000
heap
page read and write
B31000
unkown
page execute read
2C000074C000
trusted library allocation
page read and write
56B0000C4000
trusted library allocation
page read and write
7B38002A8000
trusted library allocation
page read and write
2C0000590000
trusted library allocation
page read and write
17145450000
heap
page read and write
70DE000
stack
page read and write
260E092F000
heap
page read and write
6AF50000
unkown
page readonly
260E279A000
heap
page read and write
171454CA000
remote allocation
page execute read
6B140000
unkown
page readonly
244B8000
trusted library allocation
page read and write
4D8800250000
direct allocation
page read and write
211E8424000
heap
page read and write
66C000378000
trusted library allocation
page read and write
7370000
direct allocation
page read and write
7E84000
unkown
page readonly
2C00000B9000
trusted library allocation
page read and write
66C000201000
trusted library allocation
page read and write
171800288000
trusted library allocation
page read and write
1E209402000
heap
page read and write
66C000614000
trusted library allocation
page read and write
56B0001AC000
trusted library allocation
page read and write
66C0008DC000
trusted library allocation
page read and write
260E9000000
heap
page read and write
171800238000
trusted library allocation
page read and write
211E802A000
heap
page read and write
9F10000
heap
page execute and read and write
6B011000
unkown
page read and write
6CBA3000
unkown
page read and write
56B000354000
trusted library allocation
page read and write
66C000314000
trusted library allocation
page read and write
211E8013000
heap
page read and write
274AD42B000
heap
page read and write
C0D87FC000
stack
page read and write
2C00002A4000
trusted library allocation
page read and write
67D0002C4000
direct allocation
page read and write
2C0000C54000
trusted library allocation
page read and write
211E7F7A000
unclassified section
page read and write
2E58000
heap
page read and write
274AD372000
unclassified section
page read and write
260E2766000
heap
page read and write
2C0000AA0000
trusted library allocation
page read and write
34000248000
trusted library allocation
page read and write
6B010000
unkown
page readonly
66C0008A9000
trusted library allocation
page read and write
260E0883000
heap
page read and write
7335000
direct allocation
page read and write
2C00009CC000
trusted library allocation
page read and write
788C002A0000
direct allocation
page read and write
C9EDDFE000
unkown
page readonly
2C000044C000
trusted library allocation
page read and write
56B0001B8000
trusted library allocation
page read and write
B47000
unkown
page readonly
C9F95FC000
stack
page read and write
24780020C000
trusted library allocation
page read and write
2CC400264000
trusted library allocation
page read and write
63B400254000
trusted library allocation
page read and write
2C0000550000
trusted library allocation
page read and write
2EAC000
heap
page read and write
6ACC1000
unkown
page read and write
274AD413000
heap
page read and write
C9F65FE000
stack
page read and write
6E380000
unkown
page readonly
2CC400278000
trusted library allocation
page read and write
211E7F00000
remote allocation
page read and write
2C0000504000
trusted library allocation
page read and write
2C0000934000
trusted library allocation
page read and write
4D88002D0000
direct allocation
page read and write
7347000
direct allocation
page read and write
260E2755000
heap
page read and write
6AC90000
unkown
page readonly
6AC91000
unkown
page read and write
788C00210000
direct allocation
page read and write
C0E27FB000
stack
page read and write
788C00264000
direct allocation
page read and write
2478002F8000
trusted library allocation
page read and write
69A8002D4000
trusted library allocation
page read and write
260E33C0000
unkown
page read and write
66C000724000
trusted library allocation
page read and write
60300007C000
trusted library allocation
page read and write
5A480028C000
trusted library allocation
page read and write
56B000080000
trusted library allocation
page read and write
5A4800264000
trusted library allocation
page read and write
6E1A0000
unkown
page readonly
2C0000464000
trusted library allocation
page read and write
462400154000
trusted library allocation
page read and write
66C000A24000
trusted library allocation
page read and write
6B1D7000
unkown
page readonly
4624000F0000
trusted library allocation
page read and write
C9E45FC000
stack
page read and write
56B0000C1000
trusted library allocation
page read and write
17145802000
unclassified section
page read and write
66C00080C000
trusted library allocation
page read and write
56B000250000
trusted library allocation
page read and write
20DC001A1000
trusted library allocation
page read and write
66C000A6D000
trusted library allocation
page read and write
7B3800408000
trusted library allocation
page read and write
C9D5DFE000
unkown
page readonly
34000201000
trusted library allocation
page read and write
6BF1F000
unkown
page readonly
C0D47FF000
stack
page read and write
21A00202000
trusted library allocation
page read and write
63B400264000
trusted library allocation
page read and write
56B000160000
trusted library allocation
page read and write
733E000
direct allocation
page read and write
6248002D4000
trusted library allocation
page read and write
624800274000
trusted library allocation
page read and write
7083000
heap
page read and write
C0E37FE000
stack
page read and write
6B274000
unkown
page read and write
2CC400294000
trusted library allocation
page read and write
6B1B2000
unkown
page execute read
2C0000618000
trusted library allocation
page read and write
3400031C000
trusted library allocation
page read and write
69A80033C000
trusted library allocation
page read and write
56B0001A4000
trusted library allocation
page read and write
FC002C0000
direct allocation
page read and write
211E7F10000
heap
page read and write
788C002E0000
direct allocation
page read and write
260E2755000
heap
page read and write
4D8800230000
direct allocation
page read and write
66C000601000
trusted library allocation
page read and write
247800344000
trusted library allocation
page read and write
2C0000D94000
trusted library allocation
page read and write
438C002D4000
direct allocation
page read and write
A7FC4030000
trusted library allocation
page read and write
7CC0000
heap
page read and write
244A0000
trusted library allocation
page read and write
2C00002B0000
trusted library allocation
page read and write
2C0000074000
trusted library allocation
page read and write
7730000
heap
page read and write
60300010C000
trusted library allocation
page read and write
6CBE1000
unkown
page execute read
2C00001AC000
trusted library allocation
page read and write
7B3800404000
trusted library allocation
page read and write
4D8800364000
direct allocation
page read and write
56B000194000
trusted library allocation
page read and write
63B400258000
trusted library allocation
page read and write
274AD31B000
remote allocation
page execute read
C9DEDFE000
unkown
page readonly
17145A02000
heap
page read and write
66C000764000
trusted library allocation
page read and write
9E70000
direct allocation
page read and write
260E27A0000
heap
page read and write
438C00230000
direct allocation
page read and write
2C00006D8000
trusted library allocation
page read and write
211E8424000
heap
page read and write
66C000AB8000
trusted library allocation
page read and write
171800248000
trusted library allocation
page read and write
24401000
trusted library allocation
page read and write
6F700000
unkown
page readonly
5FE800294000
direct allocation
page read and write
2E123FC000
stack
page read and write
247800220000
trusted library allocation
page read and write
2443C000
trusted library allocation
page read and write
462400050000
trusted library allocation
page read and write
C9EEDFE000
unkown
page readonly
260E2755000
heap
page read and write
A4387FE000
stack
page read and write
66C0002A8000
trusted library allocation
page read and write
66C000304000
trusted library allocation
page read and write
6B200000
unkown
page readonly
171800284000
trusted library allocation
page read and write
2E12BFE000
unkown
page readonly
5A48002E4000
trusted library allocation
page read and write
274AD760000
trusted library allocation
page read and write
274AD389000
unclassified section
page read and write
603000090000
trusted library allocation
page read and write
9C20000
heap
page read and write
2C0000679000
trusted library allocation
page read and write
2E43000
heap
page read and write
4D8800254000
direct allocation
page read and write
6ACF2000
unkown
page execute read
2C0000B98000
trusted library allocation
page read and write
2C0000238000
trusted library allocation
page read and write
5A48002A0000
trusted library allocation
page read and write
274B02C9000
heap
page read and write
7C80000
direct allocation
page read and write
462400100000
trusted library allocation
page read and write
A428FFE000
unkown
page readonly
7324000
direct allocation
page read and write
A430FFE000
unkown
page readonly
603000038000
trusted library allocation
page read and write
66C000924000
trusted library allocation
page read and write
24460000
trusted library allocation
page read and write
56B00026C000
trusted library allocation
page read and write
FC00298000
direct allocation
page read and write
2CC4002C4000
trusted library allocation
page read and write
20DC00161000
trusted library allocation
page read and write
6030000EC000
trusted library allocation
page read and write
B59000
unkown
page readonly
3A0C00250000
trusted library allocation
page read and write
66C0002C8000
trusted library allocation
page read and write
6B1B0000
unkown
page readonly
2C0000AAC000
trusted library allocation
page read and write
20DC00221000
trusted library allocation
page read and write
1718002A0000
trusted library allocation
page read and write
2C0000B40000
trusted library allocation
page read and write
3A0C0020C000
trusted library allocation
page read and write
6B6DD000
unkown
page execute read
2E4A000
heap
page read and write
2C00004F4000
trusted library allocation
page read and write
260E2796000
heap
page read and write
C9E6DFD000
stack
page read and write
2C00004C0000
trusted library allocation
page read and write
66C0008EC000
trusted library allocation
page read and write
46240012C000
trusted library allocation
page read and write
260E2613000
heap
page read and write
4BC5000
direct allocation
page read and write
7042000
heap
page read and write
34000264000
trusted library allocation
page read and write
4D880031C000
direct allocation
page read and write
1607D002000
heap
page read and write
2C0000D08000
trusted library allocation
page read and write
2EAC000
heap
page read and write
C9F2DFE000
unkown
page readonly
6E5A1000
unkown
page read and write
462400220000
trusted library allocation
page read and write
5A4800201000
trusted library allocation
page read and write
4D880031A000
direct allocation
page read and write
6B163000
unkown
page execute read
A4307FE000
stack
page read and write
260E2755000
heap
page read and write
66C000624000
trusted library allocation
page read and write
2F0D000
direct allocation
page execute and read and write
4624001F0000
trusted library allocation
page read and write
66C00060C000
trusted library allocation
page read and write
24470000
trusted library allocation
page read and write
2C0000234000
trusted library allocation
page read and write
247800334000
trusted library allocation
page read and write
56B000106000
trusted library allocation
page read and write
171800278000
trusted library allocation
page read and write
67D0002B4000
direct allocation
page read and write
69A800220000
trusted library allocation
page read and write
878C000
stack
page read and write
2C0000744000
trusted library allocation
page read and write
6B242000
unkown
page execute read
462400268000
trusted library allocation
page read and write
340002C8000
trusted library allocation
page read and write
5A48002D4000
trusted library allocation
page read and write
20DC00201000
trusted library allocation
page read and write
211E7FE0000
unclassified section
page read and write
C9DBDFE000
unkown
page readonly
9C0F000
stack
page read and write
2C0000150000
trusted library allocation
page read and write
7EB0000
direct allocation
page read and write
FC00248000
direct allocation
page read and write
274AD902000
heap
page read and write
2C0000B5C000
trusted library allocation
page read and write
7ABF000
stack
page read and write
1607D000000
heap
page read and write
247800408000
trusted library allocation
page read and write
85BF000
stack
page read and write
6AF54000
unkown
page execute read
63B400240000
trusted library allocation
page read and write
4D880021C000
direct allocation
page read and write
260E0780000
heap
page readonly
2F64000
heap
page read and write
2C0000D40000
trusted library allocation
page read and write
7B380040C000
trusted library allocation
page read and write
FC00230000
direct allocation
page read and write
247800210000
trusted library allocation
page read and write
6B000000
unkown
page readonly
6E150000
unkown
page readonly
4D88002E0000
direct allocation
page read and write
31BF000
stack
page read and write
34000210000
trusted library allocation
page read and write
2C0000357000
trusted library allocation
page read and write
6B024000
unkown
page execute read
6AF40000
unkown
page readonly
C0D77FB000
stack
page read and write
4D8800220000
direct allocation
page read and write
6E385000
unkown
page readonly
6B161000
unkown
page read and write
20DC001C8000
trusted library allocation
page read and write
4D880020C000
direct allocation
page read and write
4B3E000
stack
page read and write
56B000164000
trusted library allocation
page read and write
2E51000
heap
page read and write
32240010000
trusted library allocation
page read and write
7B3800270000
trusted library allocation
page read and write
46240013C000
trusted library allocation
page read and write
FC002B4000
direct allocation
page read and write
3A0C00284000
trusted library allocation
page read and write
69A8002C8000
trusted library allocation
page read and write
247800274000
trusted library allocation
page read and write
211E845A000
heap
page read and write
6B6D8000
unkown
page execute read
24780026C000
trusted library allocation
page read and write
4D81000
direct allocation
page read and write
C9E75FE000
unkown
page readonly
17145702000
heap
page read and write
69A800344000
trusted library allocation
page read and write
6AC82000
unkown
page execute read
66C0002E4000
trusted library allocation
page read and write
211E8056000
heap
page read and write
4D8800212000
direct allocation
page read and write
56B000114000
trusted library allocation
page read and write
C9E25FB000
stack
page read and write
34000358000
trusted library allocation
page read and write
2C00007E4000
trusted library allocation
page read and write
2E74000
heap
page read and write
63B400238000
trusted library allocation
page read and write
3A0C00201000
trusted library allocation
page read and write
2C0000656000
trusted library allocation
page read and write
2C00007A8000
trusted library allocation
page read and write
FC00234000
direct allocation
page read and write
211E8002000
heap
page read and write
260E0680000
heap
page read and write
2CC400220000
trusted library allocation
page read and write
34000237000
trusted library allocation
page read and write
7B3800244000
trusted library allocation
page read and write
274AD400000
heap
page read and write
C9F3DFE000
unkown
page readonly
56B000170000
trusted library allocation
page read and write
C9D2DFE000
unkown
page readonly
6B69C000
unkown
page execute read
274AD290000
unclassified section
page readonly
2CC400294000
trusted library allocation
page read and write
5FE800288000
direct allocation
page read and write
274AD3F0000
heap
page read and write
66C0006AC000
trusted library allocation
page read and write
63B4002BC000
trusted library allocation
page read and write
2C0000283000
trusted library allocation
page read and write
2C0000238000
trusted library allocation
page read and write
7033000
heap
page read and write
211E8424000
heap
page read and write
6030000E4000
trusted library allocation
page read and write
2E173FE000
stack
page read and write
C9D65FE000
stack
page read and write
2C0000338000
trusted library allocation
page read and write
56B000280000
trusted library allocation
page read and write
2EF7000
heap
page read and write
247800370000
trusted library allocation
page read and write
63B400220000
trusted library allocation
page read and write
C9D25FC000
stack
page read and write
6E19E000
unkown
page read and write
340002B8000
trusted library allocation
page read and write
1E209413000
heap
page read and write
C0E1FFE000
unkown
page readonly
2C000045A000
trusted library allocation
page read and write
2C00006D8000
trusted library allocation
page read and write
260E0800000
heap
page read and write
67D0002B0000
direct allocation
page read and write
171800264000
trusted library allocation
page read and write
4D8800304000
direct allocation
page read and write
66C0006C4000
trusted library allocation
page read and write
56B000001000
trusted library allocation
page read and write
2C0000544000
trusted library allocation
page read and write
63B4002C8000
trusted library allocation
page read and write
2C000066D000
trusted library allocation
page read and write
6AF51000
unkown
page read and write
6030000A4000
trusted library allocation
page read and write
6AC41000
unkown
page execute read
66C0003B6000
trusted library allocation
page read and write
EB30DFD000
stack
page read and write
67D000294000
direct allocation
page read and write
462400118000
trusted library allocation
page read and write
69A800334000
trusted library allocation
page read and write
6F721000
unkown
page read and write
6ACB0000
unkown
page readonly
17148920000
unclassified section
page readonly
2E62000
heap
page read and write
66C00040C000
trusted library allocation
page read and write
2E44000
heap
page read and write
260E2739000
heap
page read and write
6BF62000
unkown
page read and write
211E7F50000
heap
page readonly
211E8454000
heap
page read and write
4D8800264000
direct allocation
page read and write
260E081D000
heap
page read and write
2CC4002B8000
trusted library allocation
page read and write
5FE800201000
direct allocation
page read and write
260E2755000
heap
page read and write
66C000AB4000
trusted library allocation
page read and write
5A480026C000
trusted library allocation
page read and write
B51000
unkown
page readonly
2E69000
heap
page read and write
2C00001DC000
trusted library allocation
page read and write
2F03000
direct allocation
page execute and read and write
5FE800264000
direct allocation
page read and write
2E99000
heap
page read and write
63B4002A0000
trusted library allocation
page read and write
211E7FC0000
trusted library allocation
page read and write
66C0006A0000
trusted library allocation
page read and write
260E5D02000
heap
page read and write
5FE8002B0000
direct allocation
page read and write
67D0002D0000
direct allocation
page read and write
FC002B0000
direct allocation
page read and write
2C0000C64000
trusted library allocation
page read and write
7CF1000
direct allocation
page read and write
4B9B000
stack
page read and write
72DE000
stack
page read and write
2C0000601000
trusted library allocation
page read and write
438C00254000
direct allocation
page read and write
2E4A000
heap
page read and write
5A48002B4000
trusted library allocation
page read and write
6C7B0000
unkown
page readonly
1607CF50000
trusted library allocation
page read and write
46240025C000
trusted library allocation
page read and write
211E842B000
heap
page read and write
462400260000
trusted library allocation
page read and write
66C000A01000
trusted library allocation
page read and write
7C7F000
stack
page read and write
9C10000
heap
page execute and read and write
66C00092C000
trusted library allocation
page read and write
56B000342000
trusted library allocation
page read and write
211E8000000
heap
page read and write
6030000AC000
trusted library allocation
page read and write
260E7AC2000
trusted library allocation
page read and write
6CBA7000
unkown
page readonly
2478002B8000
trusted library allocation
page read and write
3A0C0029C000
trusted library allocation
page read and write
C9CFDFE000
unkown
page readonly
247800308000
trusted library allocation
page read and write
2C0000768000
trusted library allocation
page read and write
2C0000378000
trusted library allocation
page read and write
793E000
stack
page read and write
2C0000080000
trusted library allocation
page read and write
C9D55FE000
stack
page read and write
788C00201000
direct allocation
page read and write
67D000244000
direct allocation
page read and write
86C0000
direct allocation
page read and write
438C00234000
direct allocation
page read and write
2C0000044000
trusted library allocation
page read and write
2C000038C000
trusted library allocation
page read and write
2C0000CF4000
trusted library allocation
page read and write
3A0C00260000
trusted library allocation
page read and write
2F64000
heap
page read and write
2E8B000
heap
page read and write
274AD330000
unclassified section
page readonly
260E0927000
heap
page read and write
2C0000689000
trusted library allocation
page read and write
56B00038C000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
1607CE30000
heap
page read and write
56B000381000
trusted library allocation
page read and write
56B0001C4000
trusted library allocation
page read and write
66C00028C000
trusted library allocation
page read and write
2C000001E000
trusted library allocation
page read and write
2C0000980000
trusted library allocation
page read and write
C9E0DFE000
unkown
page readonly
2C00000E8000
trusted library allocation
page read and write
74B0000
unkown
page readonly
6AFE3000
unkown
page readonly
2C0000700000
trusted library allocation
page read and write
211E7E80000
heap
page read and write
6BF51000
unkown
page read and write
20DC001CE000
trusted library allocation
page read and write
260E2744000
heap
page read and write
2C000026C000
trusted library allocation
page read and write
C9EE5FD000
stack
page read and write
2C0000CDC000
trusted library allocation
page read and write
2E75000
heap
page read and write
6B237000
unkown
page readonly
69A80031C000
trusted library allocation
page read and write
6B111000
unkown
page read and write
66C00073C000
trusted library allocation
page read and write
260E08C3000
heap
page read and write
56B0000DE000
trusted library allocation
page read and write
2C000081C000
trusted library allocation
page read and write
66C000944000
trusted library allocation
page read and write
2C0000984000
trusted library allocation
page read and write
6AD26000
unkown
page readonly
1718002B8000
trusted library allocation
page read and write
6BF3C000
unkown
page readonly
2C0000B68000
trusted library allocation
page read and write
C9D8DFE000
unkown
page readonly
69A800288000
trusted library allocation
page read and write
2C0000BD8000
trusted library allocation
page read and write
66C000910000
trusted library allocation
page read and write
34000344000
trusted library allocation
page read and write
FC00210000
direct allocation
page read and write
2CC4002A8000
trusted library allocation
page read and write
66C00074C000
trusted library allocation
page read and write
2F0B000
direct allocation
page read and write
C9F05FD000
stack
page read and write
6030000C4000
trusted library allocation
page read and write
3A0C00254000
trusted library allocation
page read and write
20DC00141000
trusted library allocation
page read and write
7CD0000
direct allocation
page execute and read and write
2C0000998000
trusted library allocation
page read and write
66C000730000
trusted library allocation
page read and write
66C00074C000
trusted library allocation
page read and write
A42B7FE000
stack
page read and write
56B00023C000
trusted library allocation
page read and write
6B241000
unkown
page read and write
66C000634000
trusted library allocation
page read and write
A42F7FD000
stack
page read and write
2C0000584000
trusted library allocation
page read and write
6AC60000
unkown
page readonly
2ED1000
heap
page read and write
74A0000
direct allocation
page read and write
2E103FE000
stack
page read and write
2C0000944000
trusted library allocation
page read and write
2478002F4000
trusted library allocation
page read and write
2E42000
heap
page read and write
7B3800284000
trusted library allocation
page read and write
2F64000
heap
page read and write
462400090000
trusted library allocation
page read and write
211E83CA000
unclassified section
page read and write
EB31DFE000
stack
page read and write
2E3F000
heap
page read and write
56B00025C000
trusted library allocation
page read and write
4D8800240000
direct allocation
page read and write
67D000234000
direct allocation
page read and write
2C0000960000
trusted library allocation
page read and write
260E2765000
heap
page read and write
66C0003B0000
trusted library allocation
page read and write
2C0000E28000
trusted library allocation
page read and write
56B0000E8000
trusted library allocation
page read and write
244A4000
trusted library allocation
page read and write
2C0000D60000
trusted library allocation
page read and write
85CE000
heap
page read and write
46240000C000
trusted library allocation
page read and write
69A800418000
trusted library allocation
page read and write
5FE8002AC000
direct allocation
page read and write
171800274000
trusted library allocation
page read and write
340002E4000
trusted library allocation
page read and write
1607D02B000
heap
page read and write
4D8800284000
direct allocation
page read and write
56B000190000
trusted library allocation
page read and write
66C000A30000
trusted library allocation
page read and write
756C000
stack
page read and write
260E08AA000
heap
page read and write
211EB612000
trusted library allocation
page read and write
56B000148000
trusted library allocation
page read and write
788C00250000
direct allocation
page read and write
1718002B8000
trusted library allocation
page read and write
2C0000661000
trusted library allocation
page read and write
2F64000
heap
page read and write
4B5BDFE000
stack
page read and write
247800401000
trusted library allocation
page read and write
260E092F000
heap
page read and write
C9E2DFE000
unkown
page readonly
788C002D0000
direct allocation
page read and write
274AD7A7000
unclassified section
page read and write
66C000314000
trusted library allocation
page read and write
6AF42000
unkown
page execute read
244C8000
trusted library allocation
page read and write
FC00284000
direct allocation
page read and write
5FE800210000
direct allocation
page read and write
56B000124000
trusted library allocation
page read and write
438C0023C000
direct allocation
page read and write
FC002E4000
direct allocation
page read and write
C0E07FE000
stack
page read and write
66C00039C000
trusted library allocation
page read and write
66C000264000
trusted library allocation
page read and write
2C0000DD4000
trusted library allocation
page read and write
7320000
direct allocation
page read and write
7B3800318000
trusted library allocation
page read and write
2F64000
heap
page read and write
462400092000
trusted library allocation
page read and write
C9D4DFE000
unkown
page readonly
2C00009EC000
trusted library allocation
page read and write
462400168000
trusted library allocation
page read and write
2C0000798000
trusted library allocation
page read and write
2C00007D0000
trusted library allocation
page read and write
A436FFE000
unkown
page readonly
788C00274000
direct allocation
page read and write
1E20945F000
heap
page read and write
2C0000E0C000
trusted library allocation
page read and write
2C000018C000
trusted library allocation
page read and write
6F802000
unkown
page execute read
C9F55FE000
stack
page read and write
1E20941C000
heap
page read and write
2ED0000
heap
page read and write
2C0000658000
trusted library allocation
page read and write
6FFF000
heap
page read and write
260E0928000
heap
page read and write
2CC400294000
trusted library allocation
page read and write
6E5A0000
unkown
page readonly
66C000AB0000
trusted library allocation
page read and write
2C0000A24000
trusted library allocation
page read and write
4BF0000
heap
page read and write
66C00061C000
trusted library allocation
page read and write
2C0000E40000
trusted library allocation
page read and write
3A0C00274000
trusted library allocation
page read and write
247800290000
trusted library allocation
page read and write
60300001C000
trusted library allocation
page read and write
2F64000
heap
page read and write
69A8002F8000
trusted library allocation
page read and write
274B029D000
heap
page read and write
56B000192000
trusted library allocation
page read and write
66C000326000
trusted library allocation
page read and write
6B699000
unkown
page execute read
274AD4F7000
heap
page read and write
A42A7FE000
stack
page read and write
69A8002AC000
trusted library allocation
page read and write
438C00288000
direct allocation
page read and write
7720000
trusted library section
page readonly
66C00033C000
trusted library allocation
page read and write
274AD46C000
heap
page read and write
34000278000
trusted library allocation
page read and write
260E2755000
heap
page read and write
2CC400294000
trusted library allocation
page read and write
260E0878000
heap
page read and write
7B3800254000
trusted library allocation
page read and write
4624001A4000
trusted library allocation
page read and write
67D000274000
direct allocation
page read and write
211E8458000
heap
page read and write
B51000
unkown
page readonly
274AD6D0000
unclassified section
page readonly
2C0000518000
trusted library allocation
page read and write
260E2719000
heap
page read and write
C9EF5FC000
stack
page read and write
There are 1992 hidden memdumps, click here to show them.