Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PdfConverters.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\API-MS-Win-core-xstate-l2-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Accessibility.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\D3DCompiler_47_cor3.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\DirectWriteForwarder.dll
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.CSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.CodeAnalysis.CSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.CodeAnalysis.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.DiaSymReader.Native.x86.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Management.Infrastructure.Native.Unmanaged.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Management.Infrastructure.Native.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Management.Infrastructure.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.VisualBasic.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.VisualBasic.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Web.WebView2.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Web.WebView2.WinForms.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Web.WebView2.Wpf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Win32.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Win32.Registry.AccessControl.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Win32.Registry.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Microsoft.Win32.SystemEvents.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PenImc_cor3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationCore.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework-SystemCore.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework-SystemData.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework-SystemDrawing.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework-SystemXml.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework-SystemXmlLinq.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.Aero.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.Aero2.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.AeroLite.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.Classic.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.Luna.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.Royale.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationFramework.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationNative_cor3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\PresentationUI.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ReachFramework.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\SOS_README.md
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.AppContext.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Buffers.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.CodeDom.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Collections.Concurrent.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Collections.Immutable.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Collections.NonGeneric.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Collections.Specialized.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Collections.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.Annotations.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.DataAnnotations.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.EventBasedAsync.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.TypeConverter.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ComponentModel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Configuration.ConfigurationManager.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Configuration.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Console.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Data.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Data.DataSetExtensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Data.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Design.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.Contracts.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.Debug.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.DiagnosticSource.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.EventLog.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.FileVersionInfo.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.PerformanceCounter.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.Process.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.StackTrace.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.TextWriterTraceListener.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.Tools.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.TraceSource.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Diagnostics.Tracing.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.DirectoryServices.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Drawing.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Drawing.Design.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Drawing.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Drawing.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Dynamic.Runtime.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Globalization.Calendars.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Globalization.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Globalization.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Compression.Brotli.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Compression.FileSystem.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Compression.ZipFile.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Compression.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.FileSystem.AccessControl.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.FileSystem.DriveInfo.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.FileSystem.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.FileSystem.Watcher.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.FileSystem.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.IsolatedStorage.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.MemoryMappedFiles.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Packaging.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Pipes.AccessControl.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.Pipes.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.UnmanagedMemoryStream.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.IO.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Linq.Expressions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Linq.Parallel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Linq.Queryable.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Linq.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Memory.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Http.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.HttpListener.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Mail.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.NameResolution.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.NetworkInformation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Ping.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Requests.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Security.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.ServicePoint.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.Sockets.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.WebClient.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.WebHeaderCollection.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.WebProxy.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.WebSockets.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.WebSockets.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Numerics.Vectors.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Numerics.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ObjectModel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Printing.dll
|
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Private.CoreLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Private.DataContractSerialization.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Private.Uri.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Private.Xml.Linq.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Private.Xml.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.DispatchProxy.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Emit.ILGeneration.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Emit.Lightweight.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Emit.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Metadata.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.TypeExtensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Reflection.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Resources.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Resources.Reader.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Resources.ResourceManager.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Resources.Writer.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.CompilerServices.Unsafe.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.CompilerServices.VisualC.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Handles.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.InteropServices.RuntimeInformation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.InteropServices.WindowsRuntime.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.InteropServices.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Intrinsics.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Loader.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Numerics.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Serialization.Formatters.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Serialization.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Serialization.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Serialization.Xml.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.Serialization.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.WindowsRuntime.UI.Xaml.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.WindowsRuntime.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Runtime.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.AccessControl.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Claims.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Algorithms.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Cng.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Csp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Encoding.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.OpenSsl.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Pkcs.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.ProtectedData.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.X509Certificates.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Cryptography.Xml.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Permissions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Principal.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.Principal.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.SecureString.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Security.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ServiceModel.Web.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ServiceProcess.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.Encoding.CodePages.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.Encoding.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.Encoding.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.Encodings.Web.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Text.RegularExpressions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.AccessControl.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Channels.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Overlapped.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Tasks.Dataflow.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Tasks.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Tasks.Parallel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Tasks.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Thread.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.ThreadPool.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.Timer.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Threading.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Transactions.Local.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Transactions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Web.HttpUtility.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Web.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Controls.Ribbon.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Forms.Design.Editors.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Forms.Design.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Forms.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Input.Manipulations.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.Presentation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Windows.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xaml.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.Linq.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.ReaderWriter.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.Serialization.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.XDocument.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.XPath.XDocument.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.XPath.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.XmlDocument.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.XmlSerializer.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.Xml.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\System.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\UIAutomationClient.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\UIAutomationClientSideProviders.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\UIAutomationProvider.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\UIAutomationTypes.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\WebView2Loader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\WindowsBase.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\WindowsFormsIntegration.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-console-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-datetime-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-debug-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-errorhandling-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-file-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-file-l1-2-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-file-l2-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-handle-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-heap-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-interlocked-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-libraryloader-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-localization-l1-2-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-memory-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-namedpipe-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-processenvironment-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-processthreads-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-processthreads-l1-1-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-profile-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-rtlsupport-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-string-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-synch-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-synch-l1-2-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-sysinfo-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-timezone-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-core-util-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-conio-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-convert-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-environment-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-filesystem-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-heap-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-locale-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-math-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-multibyte-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-private-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-process-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-runtime-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-stdio-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-string-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-time-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\api-ms-win-crt-utility-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\app.deps.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\app.dll
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\app.runtimeconfig.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\clrcompression.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\clretwrc.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\clrjit.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\coreclr.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\cs\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\dbgshim.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\de\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\es\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\fr\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\hostfxr.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\hostpolicy.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\it\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ja\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ko\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mi.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\miutils.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscordaccore.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscordaccore_x86_x86_4.700.22.55902.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscordbi.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscorlib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscorrc.debug.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\mscorrc.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\netstandard.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pl\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\pt-BR\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ru\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\runtimes\win-x86\native\WebView2Loader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\tr\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\ucrtbase.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\vcruntime140_cor3.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\wpfgfx_cor3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hans\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\Microsoft.CodeAnalysis.CSharp.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\Microsoft.CodeAnalysis.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\PresentationCore.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\PresentationFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\PresentationUI.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\ReachFramework.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Windows.Controls.Ribbon.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Windows.Forms.Design.Editors.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Windows.Forms.Design.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Windows.Forms.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Windows.Input.Manipulations.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\System.Xaml.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\UIAutomationClient.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\UIAutomationClientSideProviders.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\UIAutomationProvider.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\UIAutomationTypes.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\WindowsBase.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\.net\PdfConverters\c58\zh-Hant\WindowsFormsIntegration.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\916c403e-3d32-4a2d-98f3-6967827fd83f.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\9a1c4e40-b877-475a-b813-1b46e8cc3140.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\BrowserMetrics\BrowserMetrics-662C3291-1E98.pma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Crashpad\throttle_store.dat
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\42e14689-9a7c-4a33-9a47-5ff89d4a622b.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\457563c2-6f3e-4e5c-8115-3cd0952523c5.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Cache\Cache_Data\data_0
|
dBase IV DBT, blocks size 0, block length 1024, next free block index 3238316739, next free block 0, next used block 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Cache\Cache_Data\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Cache\Cache_Data\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Cache\Cache_Data\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Cache\Cache_Data\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\js\index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\js\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\wasm\index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\DawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\DawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\DawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\DawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\DawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Rules\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Rules\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Rules\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Rules\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Scripts\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Scripts\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Scripts\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Scripts\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension Scripts\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension State\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension State\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension State\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension State\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Extension State\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Favicons
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie
0x8, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\GPUCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\History
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Local Storage\leveldb\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Login Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie
0xc, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\405dac90-6ff2-4c06-82d6-c6c375c1af2d.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\544b70cf-6a97-4a8c-8113-83395a9d5cee.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\5eaca105-4a3f-4920-9ae3-f319a7a83787.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\92d3c5a4-decb-4e01-abc0-31722efa005d.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Cookies
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Network Persistent State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Network Persistent State~RF41fcd2.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Reporting and NEL
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 9, cookie 0x4, schema 4, UTF-8,
version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports~RF41d46a.TMP
(copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Sdch Dictionaries (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\Trust Tokens
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8,
version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Network\eed64267-b6f7-4f6e-a83b-9627d5ff09f1.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\README
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Secure Preferences (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Session Storage\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Session Storage\000003.log
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Session Storage\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Session Storage\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Session Storage\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Site Characteristics Database\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Site Characteristics Database\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Site Characteristics Database\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Sync Data\LevelDB\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Sync Data\LevelDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\Web Data
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie
0x36, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\metadata\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\metadata\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GrShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GrShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GrShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GrShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GrShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GraphiteDawnCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GraphiteDawnCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GraphiteDawnCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GraphiteDawnCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\GraphiteDawnCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Local State (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Local State~RF41d12e.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Local State~RF41d14d.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Local State~RF41e6c9.TMP (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\ShaderCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\ShaderCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\ShaderCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\ShaderCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\ShaderCache\index
|
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\customSettings
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris_0
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\edgeSettings
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\edgeSettings_2.0-0
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\synchronousLookupUris
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\topTraffic
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\local\uriCache
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\SmartScreen\local\uriCache_
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Variations
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\d6809c40-297c-46fb-82da-b57e2b0ae8f7.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\e7a51b54-3476-4317-af5a-21568e6b3490.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 22:02:24 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 22:02:24 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 22:02:24 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 22:02:24 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 22:02:24 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 696
|
ASCII text, with very long lines (783)
|
downloaded
|
There are 649 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PdfConverters.exe
|
"C:\Users\user\Desktop\PdfConverters.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2408 --field-trial-handle=2328,i,16201944400505639363,503574586948334668,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=PdfConverters.exe
--webview-exe-version=1.0 --user-data-dir="C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView" --noerrdialogs
--embedded-browser-webview-dpi-awareness=0 --edge-webview-custom-scheme --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=3160.7800.5259682614117425049
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView
/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView\Crashpad
--annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program
Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge
WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x15c,0x160,0x164,0x138,0x170,0x7ff899758e88,0x7ff899758e98,0x7ff899758ea8
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView" --webview-exe-name=PdfConverters.exe --webview-exe-version=1.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=0 --edge-webview-custom-scheme --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA==
--mojo-platform-channel-handle=1828 --field-trial-handle=1832,i,9339170682265001696,394570848035688689,262144 --enable-features=MojoIpcz
/prefetch:2
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView"
--webview-exe-name=PdfConverters.exe --webview-exe-version=1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=0
--edge-webview-custom-scheme --mojo-platform-channel-handle=3100 --field-trial-handle=1832,i,9339170682265001696,394570848035688689,262144
--enable-features=MojoIpcz /prefetch:3
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService
--lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView"
--webview-exe-name=PdfConverters.exe --webview-exe-version=1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=0
--edge-webview-custom-scheme --mojo-platform-channel-handle=3340 --field-trial-handle=1832,i,9339170682265001696,394570848035688689,262144
--enable-features=MojoIpcz /prefetch:8
|
||
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
|
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs
--user-data-dir="C:\Users\user\AppData\Local\Temp\PdfConverters.WebView2\EBWebView" --webview-exe-name=PdfConverters.exe --webview-exe-version=1.0
--embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=0 --edge-webview-custom-scheme --disable-nacl --first-renderer-process
--lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some
--expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1714168248658982 --launch-time-ticks=4314058757 --mojo-platform-channel-handle=3636
--field-trial-handle=1832,i,9339170682265001696,394570848035688689,262144 --enable-features=MojoIpcz /prefetch:1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://web.503188.com/?
|
unknown
|
||
https://hao.360.com/?installer
|
unknown
|
||
http://www.4399.com/flash/32979.htm
|
unknown
|
||
http://hao123.di178.com/?r916
|
unknown
|
||
https://www.4399.com/flash/180977_3.htm
|
unknown
|
||
https://tg.602.com
|
unknown
|
||
https://www.4399.com/flash/127539_4.htm
|
unknown
|
||
https://doh.familyshield.opendns.com/dns-query
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://dns.sb/privacy/Char
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://www.4399.com/flash/205462_4.htm
|
unknown
|
||
https://www.4399.com/flash/145991_4.htm
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
https://a.nel.cloudflare.com/report/v4?s=tUn9Jv1n4WdeAscGeNaNAlIueOTeBeiXfGWADZ9JuvZ%2FLCIajZe5krooR
|
unknown
|
||
https://ntp.msn.cn/edge/ntp
|
unknown
|
||
https://www.4399.com/flash/39379_2.htm
|
unknown
|
||
https://www.4399.com/flash/55146_4.htm
|
unknown
|
||
https://www.4399.com/flash/195673_4.htm
|
unknown
|
||
http://anglebug.com/8280ault
|
unknown
|
||
https://a.nel.cloudflare.com
|
unknown
|
||
https://www.microsoftnews.cn/
|
unknown
|
||
https://dns11.quad9.net/dns-query
|
unknown
|
||
https://kf.07073.com
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/
|
unknown
|
||
http://www.pdfconvertercompare.com/mainnkn:100;0.010
|
unknown
|
||
https://www.4399.com/flash/18012.htm
|
unknown
|
||
https://www.4399.com/flash/zmhj.htm#search3-6407
|
unknown
|
||
https://www.pdfconvertercompare.com/maindg/117.0.2045.470
|
unknown
|
||
http://bd.gy912.com
|
unknown
|
||
https://www.91duba.com/?f=
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
https://permanently-removed.invalid/encryption/unlock/desktop?kdi=CAIaDgoKY2hyb21lc3luYxABP
|
unknown
|
||
https://login.windows.localP
|
unknown
|
||
https://www.4399.com/flash/217926_2.htm
|
unknown
|
||
https://www.4399.com/flash/218860_1.htm
|
unknown
|
||
https://nextdns.io/privacy
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://www.4399.com/flash/27924_2.htm
|
unknown
|
||
https://10.0.19045.2006.vb_releaseoft.c
|
unknown
|
||
https://int.msn.cn/
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
http://anglebug.com/3625F$
|
unknown
|
||
https://unitedstates1.ss.wd.microsoft.us/
|
unknown
|
||
https://www.4399.com/flash/18012_4.htm
|
unknown
|
||
https://www.newduba.cn/?
|
unknown
|
||
https://www.4399.com/flash/48504.htm
|
unknown
|
||
https://doh.opendns.com/dns-query
|
unknown
|
||
https://easyauth.edgebrowser.microsoft-staging-falcon.io/
|
unknown
|
||
https://nextdns.io/privacyr
|
unknown
|
||
http://df.edge.qhkj.baicana.com
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
http://anglebug.com/7724ancedG
|
unknown
|
||
https://tp.9377s.com
|
unknown
|
||
https://permanently-removed.invalid/v1/issuetoken
|
unknown
|
||
https://easyauth.edgebrowser.microsoft-testing-falcon.io/
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://permanently-removed.invalid/reauth/v1beta/users/
|
unknown
|
||
http://permanently-removed.invalid/
|
unknown
|
||
http://r.emsoso.cn
|
unknown
|
||
https://permanently-removed.invalid/embedded/setup/chrome/usermenu
|
unknown
|
||
https://www.4399.com/flash/zmhj.htm
|
unknown
|
||
https://www.pdfconvertercompare.com/favicon.ico0.2045.47V
|
unknown
|
||
https://www.pdfconvertercompare.com/main/u
|
unknown
|
||
https://10.0.19045.2006.vb_release
|
unknown
|
||
https://www.4399.com/flash/69156_1.htm
|
unknown
|
||
https://www.4399.com/flash/776_1.htm
|
unknown
|
||
http://129fy.ie.chalai.net
|
unknown
|
||
https://www.4399.com/flash/198637_4.htm
|
unknown
|
||
https://www.4399.com/flash/133630_4.htm
|
unknown
|
||
https://www.pdfconvertercompare.com/maincom/
|
unknown
|
||
http://anglebug.com/5906hhK
|
unknown
|
||
http://anglebug.com/8280F$
|
unknown
|
||
http://sgcs.edge.ker58.com
|
unknown
|
||
https://permanently-removed.invalid/RotateBoundCookies
|
unknown
|
||
https://www.4399.com/flash/218717_2.htm
|
unknown
|
||
https://www.4399.com/flash/136516_3.htm
|
unknown
|
||
https://www.4399.com/flash/203215_3.htm
|
unknown
|
||
https://www.4399.com/flash/207195_4.htm
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
https://discovery.lenovo.com.cn/home062291
|
unknown
|
||
https://www.newduba.cn/?f=
|
unknown
|
||
https://hao.360.com/?src=jsqth
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
http://anglebug.com/5906F$
|
unknown
|
||
https://my.4399.com/yxmsdzls/
|
unknown
|
||
https://www.4399.com/flash/217855_4.htm
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://www.pdfconvertercompare.com/mainotify
|
unknown
|
||
https://yxtg.taojike.com.cn/tg/ttfc.html?sc=
|
unknown
|
||
https://dns.google/dns-query
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
https://www.4399.com/flash/21674_3.htm
|
unknown
|
||
https://www.4399.com/flash/204650_1.htm
|
unknown
|
||
https://localhost.msn.com/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
chrome.cloudflare-dns.com
|
162.159.61.3
|
||
a.nel.cloudflare.com
|
35.190.80.1
|
||
www.google.com
|
142.250.80.100
|
||
www.pdfconvertercompare.com
|
104.26.1.18
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.80.100
|
www.google.com
|
United States
|
||
192.168.2.5
|
unknown
|
unknown
|
||
104.26.1.18
|
www.pdfconvertercompare.com
|
United States
|
||
162.159.61.3
|
chrome.cloudflare-dns.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
35.190.80.1
|
a.nel.cloudflare.com
|
United States
|
||
172.64.41.3
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
dr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
|
UsageStatsInSample
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
usagestats
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
urlstats
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.last_username
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
edge.services.last_account_id
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
|
lastrun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
|
failed_count
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
|
dgiklkfkllikcanfonkcabmbdfmgleag
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
There are 24 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6ACF0000
|
unkown
|
page readonly
|
||
788C00288000
|
direct allocation
|
page read and write
|
||
6CBE0000
|
unkown
|
page readonly
|
||
2C0000656000
|
trusted library allocation
|
page read and write
|
||
66C0009EC000
|
trusted library allocation
|
page read and write
|
||
66C000718000
|
trusted library allocation
|
page read and write
|
||
4624000B8000
|
trusted library allocation
|
page read and write
|
||
1607D013000
|
heap
|
page read and write
|
||
8090000
|
heap
|
page read and write
|
||
6CC2F000
|
unkown
|
page readonly
|
||
2E17BFE000
|
unkown
|
page readonly
|
||
EB33DFD000
|
stack
|
page read and write
|
||
56B00011C000
|
trusted library allocation
|
page read and write
|
||
56B000164000
|
trusted library allocation
|
page read and write
|
||
2C0000364000
|
trusted library allocation
|
page read and write
|
||
C9D6DFE000
|
unkown
|
page readonly
|
||
2C000004F000
|
trusted library allocation
|
page read and write
|
||
C9F0DFE000
|
unkown
|
page readonly
|
||
2E0E3FC000
|
stack
|
page read and write
|
||
4D8800354000
|
direct allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
6E382000
|
unkown
|
page execute read
|
||
6F801000
|
unkown
|
page read and write
|
||
2E62000
|
heap
|
page read and write
|
||
2E8A000
|
heap
|
page read and write
|
||
66C000614000
|
trusted library allocation
|
page read and write
|
||
86D0000
|
direct allocation
|
page read and write
|
||
244F4000
|
trusted library allocation
|
page read and write
|
||
2C0000D38000
|
trusted library allocation
|
page read and write
|
||
66C000834000
|
trusted library allocation
|
page read and write
|
||
2C0000DD8000
|
trusted library allocation
|
page read and write
|
||
66C00060C000
|
trusted library allocation
|
page read and write
|
||
340002D4000
|
trusted library allocation
|
page read and write
|
||
66C000718000
|
trusted library allocation
|
page read and write
|
||
2C00007AC000
|
trusted library allocation
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
66C0002A0000
|
trusted library allocation
|
page read and write
|
||
6F720000
|
unkown
|
page readonly
|
||
624800264000
|
trusted library allocation
|
page read and write
|
||
788C002E8000
|
direct allocation
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
56B000201000
|
trusted library allocation
|
page read and write
|
||
244A4000
|
trusted library allocation
|
page read and write
|
||
A42EFFE000
|
unkown
|
page readonly
|
||
260E2755000
|
heap
|
page read and write
|
||
67D000250000
|
direct allocation
|
page read and write
|
||
66C000284000
|
trusted library allocation
|
page read and write
|
||
260E0902000
|
heap
|
page read and write
|
||
462400264000
|
trusted library allocation
|
page read and write
|
||
2C00009D8000
|
trusted library allocation
|
page read and write
|
||
340002F0000
|
trusted library allocation
|
page read and write
|
||
B4F000
|
unkown
|
page write copy
|
||
1E2093D0000
|
heap
|
page read and write
|
||
1E209400000
|
heap
|
page read and write
|
||
2EF7000
|
heap
|
page read and write
|
||
2C0000650000
|
trusted library allocation
|
page read and write
|
||
2C0000760000
|
trusted library allocation
|
page read and write
|
||
4D8800329000
|
direct allocation
|
page read and write
|
||
247800240000
|
trusted library allocation
|
page read and write
|
||
438C00408000
|
direct allocation
|
page read and write
|
||
4D88002E0000
|
direct allocation
|
page read and write
|
||
6B159000
|
unkown
|
page readonly
|
||
2C0000730000
|
trusted library allocation
|
page read and write
|
||
2C0000E2C000
|
trusted library allocation
|
page read and write
|
||
66C000AFC000
|
trusted library allocation
|
page read and write
|
||
2C0000830000
|
trusted library allocation
|
page read and write
|
||
A42DFFE000
|
unkown
|
page readonly
|
||
2F64000
|
heap
|
page read and write
|
||
260E2700000
|
heap
|
page read and write
|
||
69A800201000
|
trusted library allocation
|
page read and write
|
||
2C0000C84000
|
trusted library allocation
|
page read and write
|
||
4D88002E8000
|
direct allocation
|
page read and write
|
||
6AC70000
|
unkown
|
page readonly
|
||
7B380020C000
|
trusted library allocation
|
page read and write
|
||
2C0000970000
|
trusted library allocation
|
page read and write
|
||
462400219000
|
trusted library allocation
|
page read and write
|
||
6F71B000
|
unkown
|
page readonly
|
||
2E46000
|
heap
|
page read and write
|
||
2C000016C000
|
trusted library allocation
|
page read and write
|
||
66C000404000
|
trusted library allocation
|
page read and write
|
||
67D0002E0000
|
direct allocation
|
page read and write
|
||
C9E3DFE000
|
unkown
|
page readonly
|
||
211E7F90000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page readonly
|
||
63B4002D8000
|
trusted library allocation
|
page read and write
|
||
5A480027C000
|
trusted library allocation
|
page read and write
|
||
462400134000
|
trusted library allocation
|
page read and write
|
||
211E845E000
|
heap
|
page read and write
|
||
2C0000B68000
|
trusted library allocation
|
page read and write
|
||
2C0000D04000
|
trusted library allocation
|
page read and write
|
||
6BE31000
|
unkown
|
page execute read
|
||
2C0000D70000
|
trusted library allocation
|
page read and write
|
||
6AFF0000
|
unkown
|
page readonly
|
||
5FE800220000
|
direct allocation
|
page read and write
|
||
2C0000290000
|
trusted library allocation
|
page read and write
|
||
62480020D000
|
trusted library allocation
|
page read and write
|
||
5A48002A0000
|
trusted library allocation
|
page read and write
|
||
2EAC000
|
heap
|
page read and write
|
||
462400228000
|
trusted library allocation
|
page read and write
|
||
7B38002B4000
|
trusted library allocation
|
page read and write
|
||
A437FFE000
|
unkown
|
page readonly
|
||
56B0001BC000
|
trusted library allocation
|
page read and write
|
||
7300000
|
direct allocation
|
page execute and read and write
|
||
3A0C00230000
|
trusted library allocation
|
page read and write
|
||
C9D85FA000
|
stack
|
page read and write
|
||
340002F8000
|
trusted library allocation
|
page read and write
|
||
4D8800278000
|
direct allocation
|
page read and write
|
||
2C0000001000
|
trusted library allocation
|
page read and write
|
||
260E2723000
|
heap
|
page read and write
|
||
2C00008F8000
|
trusted library allocation
|
page read and write
|
||
2C0000280000
|
trusted library allocation
|
page read and write
|
||
4D7F000
|
stack
|
page read and write
|
||
211E8456000
|
heap
|
page read and write
|
||
2E52000
|
heap
|
page read and write
|
||
C9DA5FA000
|
stack
|
page read and write
|
||
244E4000
|
trusted library allocation
|
page read and write
|
||
66C0003EC000
|
trusted library allocation
|
page read and write
|
||
2EAC000
|
heap
|
page read and write
|
||
56B000338000
|
trusted library allocation
|
page read and write
|
||
7E92000
|
unkown
|
page readonly
|
||
6B112000
|
unkown
|
page execute read
|
||
211E8400000
|
heap
|
page read and write
|
||
438C00210000
|
direct allocation
|
page read and write
|
||
6BF39000
|
unkown
|
page read and write
|
||
69A80040C000
|
trusted library allocation
|
page read and write
|
||
4B54DFB000
|
stack
|
page read and write
|
||
66C000334000
|
trusted library allocation
|
page read and write
|
||
C0D37FF000
|
stack
|
page read and write
|
||
C9EFDFE000
|
unkown
|
page readonly
|
||
2C00006D8000
|
trusted library allocation
|
page read and write
|
||
66C00032C000
|
trusted library allocation
|
page read and write
|
||
56B0000ED000
|
trusted library allocation
|
page read and write
|
||
66C00031B000
|
trusted library allocation
|
page read and write
|
||
7B3800280000
|
trusted library allocation
|
page read and write
|
||
2C0000A7D000
|
trusted library allocation
|
page read and write
|
||
624800288000
|
trusted library allocation
|
page read and write
|
||
66C0008E4000
|
trusted library allocation
|
page read and write
|
||
2E57000
|
heap
|
page read and write
|
||
2C0000655000
|
trusted library allocation
|
page read and write
|
||
603000120000
|
trusted library allocation
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
2C0000CA4000
|
trusted library allocation
|
page read and write
|
||
438C00244000
|
direct allocation
|
page read and write
|
||
66C00077C000
|
trusted library allocation
|
page read and write
|
||
21A001C2000
|
trusted library allocation
|
page read and write
|
||
2C0000B04000
|
trusted library allocation
|
page read and write
|
||
FC00280000
|
direct allocation
|
page read and write
|
||
56B000088000
|
trusted library allocation
|
page read and write
|
||
2C00001E8000
|
trusted library allocation
|
page read and write
|
||
603000095000
|
trusted library allocation
|
page read and write
|
||
66C000908000
|
trusted library allocation
|
page read and write
|
||
2E59000
|
heap
|
page read and write
|
||
1E20DD30000
|
heap
|
page read and write
|
||
2444C000
|
trusted library allocation
|
page read and write
|
||
6B102000
|
unkown
|
page execute read
|
||
66C0009CC000
|
trusted library allocation
|
page read and write
|
||
66C00028C000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
2C000042C000
|
trusted library allocation
|
page read and write
|
||
69A800404000
|
trusted library allocation
|
page read and write
|
||
A429FFE000
|
unkown
|
page readonly
|
||
EB34DFE000
|
stack
|
page read and write
|
||
6B1E2000
|
unkown
|
page execute read
|
||
6AC72000
|
unkown
|
page execute read
|
||
74BE000
|
unkown
|
page readonly
|
||
171454B0000
|
remote allocation
|
page read and write
|
||
6ACC0000
|
unkown
|
page readonly
|
||
2C0000B50000
|
trusted library allocation
|
page read and write
|
||
6B141000
|
unkown
|
page read and write
|
||
5FE800230000
|
direct allocation
|
page read and write
|
||
2478002B8000
|
trusted library allocation
|
page read and write
|
||
274AD340000
|
unclassified section
|
page readonly
|
||
4D880030C000
|
direct allocation
|
page read and write
|
||
2C0000BA4000
|
trusted library allocation
|
page read and write
|
||
1607CF10000
|
heap
|
page readonly
|
||
66C0009DC000
|
trusted library allocation
|
page read and write
|
||
2C00000F8000
|
trusted library allocation
|
page read and write
|
||
66C0006FC000
|
trusted library allocation
|
page read and write
|
||
1E2093F0000
|
trusted library allocation
|
page read and write
|
||
66C0003EC000
|
trusted library allocation
|
page read and write
|
||
66C000614000
|
trusted library allocation
|
page read and write
|
||
260E092A000
|
heap
|
page read and write
|
||
C9D45FE000
|
stack
|
page read and write
|
||
56B0000F8000
|
trusted library allocation
|
page read and write
|
||
1E209505000
|
heap
|
page read and write
|
||
66C00078C000
|
trusted library allocation
|
page read and write
|
||
2C0000590000
|
trusted library allocation
|
page read and write
|
||
7B3800334000
|
trusted library allocation
|
page read and write
|
||
788C002AC000
|
direct allocation
|
page read and write
|
||
C9DF5FD000
|
stack
|
page read and write
|
||
734B000
|
direct allocation
|
page read and write
|
||
4D8800323000
|
direct allocation
|
page read and write
|
||
66C000AA1000
|
trusted library allocation
|
page read and write
|
||
788C002B0000
|
direct allocation
|
page read and write
|
||
5FE800234000
|
direct allocation
|
page read and write
|
||
FC00264000
|
direct allocation
|
page read and write
|
||
32280010000
|
trusted library allocation
|
page read and write
|
||
67D0002AC000
|
direct allocation
|
page read and write
|
||
7B38002C4000
|
trusted library allocation
|
page read and write
|
||
5FE800250000
|
direct allocation
|
page read and write
|
||
274AD502000
|
heap
|
page read and write
|
||
274B0262000
|
heap
|
page read and write
|
||
7B380029C000
|
trusted library allocation
|
page read and write
|
||
2CC400201000
|
trusted library allocation
|
page read and write
|
||
EB2F5FE000
|
stack
|
page read and write
|
||
2CC4002A4000
|
trusted library allocation
|
page read and write
|
||
171800258000
|
trusted library allocation
|
page read and write
|
||
56B000114000
|
trusted library allocation
|
page read and write
|
||
74B2000
|
unkown
|
page readonly
|
||
171800201000
|
trusted library allocation
|
page read and write
|
||
603000054000
|
trusted library allocation
|
page read and write
|
||
66C00028C000
|
trusted library allocation
|
page read and write
|
||
66C0003A0000
|
trusted library allocation
|
page read and write
|
||
7CA0000
|
direct allocation
|
page read and write
|
||
66C000750000
|
trusted library allocation
|
page read and write
|
||
2445C000
|
trusted library allocation
|
page read and write
|
||
20DC001C1000
|
trusted library allocation
|
page read and write
|
||
244C0000
|
trusted library allocation
|
page read and write
|
||
603000001000
|
trusted library allocation
|
page read and write
|
||
2C000037C000
|
trusted library allocation
|
page read and write
|
||
2C0000DAC000
|
trusted library allocation
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
C0DAFFE000
|
unkown
|
page readonly
|
||
2C0000D14000
|
trusted library allocation
|
page read and write
|
||
2C0000CC4000
|
trusted library allocation
|
page read and write
|
||
6E5AC000
|
unkown
|
page readonly
|
||
21A00082000
|
trusted library allocation
|
page read and write
|
||
624800238000
|
trusted library allocation
|
page read and write
|
||
C9F7DFE000
|
unkown
|
page readonly
|
||
4B5C5FE000
|
unkown
|
page readonly
|
||
4624000D0000
|
trusted library allocation
|
page read and write
|
||
69A8002C8000
|
trusted library allocation
|
page read and write
|
||
66C000824000
|
trusted library allocation
|
page read and write
|
||
9E20000
|
direct allocation
|
page execute and read and write
|
||
C9D7DFE000
|
unkown
|
page readonly
|
||
274B02C4000
|
heap
|
page read and write
|
||
2EBB000
|
heap
|
page read and write
|
||
24490000
|
trusted library allocation
|
page read and write
|
||
66C000AE4000
|
trusted library allocation
|
page read and write
|
||
2CC4002A4000
|
trusted library allocation
|
page read and write
|
||
B66000
|
unkown
|
page readonly
|
||
2C00006D8000
|
trusted library allocation
|
page read and write
|
||
67D000288000
|
direct allocation
|
page read and write
|
||
603000028000
|
trusted library allocation
|
page read and write
|
||
6B276000
|
unkown
|
page execute read
|
||
624800210000
|
trusted library allocation
|
page read and write
|
||
274AD320000
|
heap
|
page read and write
|
||
66C0002A0000
|
trusted library allocation
|
page read and write
|
||
274B02AA000
|
heap
|
page read and write
|
||
2C0000368000
|
trusted library allocation
|
page read and write
|
||
56B000134000
|
trusted library allocation
|
page read and write
|
||
2C0000880000
|
trusted library allocation
|
page read and write
|
||
2C0000AA8000
|
trusted library allocation
|
page read and write
|
||
6B002000
|
unkown
|
page execute read
|
||
2C0000E3C000
|
trusted library allocation
|
page read and write
|
||
66C000A58000
|
trusted library allocation
|
page read and write
|
||
247800364000
|
trusted library allocation
|
page read and write
|
||
2C0000A98000
|
trusted library allocation
|
page read and write
|
||
171800220000
|
trusted library allocation
|
page read and write
|
||
2E71000
|
heap
|
page read and write
|
||
C9E9DFC000
|
stack
|
page read and write
|
||
5A48002A0000
|
trusted library allocation
|
page read and write
|
||
6B253000
|
unkown
|
page readonly
|
||
C9D9DFE000
|
unkown
|
page readonly
|
||
C9D05FE000
|
stack
|
page read and write
|
||
274AD360000
|
heap
|
page readonly
|
||
4B595FE000
|
unkown
|
page readonly
|
||
63B400274000
|
trusted library allocation
|
page read and write
|
||
340002A0000
|
trusted library allocation
|
page read and write
|
||
7B38002D4000
|
trusted library allocation
|
page read and write
|
||
4624001CC000
|
trusted library allocation
|
page read and write
|
||
274AD3C0000
|
trusted library allocation
|
page read and write
|
||
6B020000
|
unkown
|
page readonly
|
||
7B3800274000
|
trusted library allocation
|
page read and write
|
||
603000070000
|
trusted library allocation
|
page read and write
|
||
69A80033C000
|
trusted library allocation
|
page read and write
|
||
2C0000DC8000
|
trusted library allocation
|
page read and write
|
||
C0DDFFE000
|
unkown
|
page readonly
|
||
211E7EF5000
|
remote allocation
|
page execute read
|
||
211E8413000
|
heap
|
page read and write
|
||
1E2092B0000
|
heap
|
page read and write
|
||
69A800328000
|
trusted library allocation
|
page read and write
|
||
4D880037C000
|
direct allocation
|
page read and write
|
||
34000404000
|
trusted library allocation
|
page read and write
|
||
1607CF70000
|
heap
|
page read and write
|
||
2C000021C000
|
trusted library allocation
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
462400001000
|
trusted library allocation
|
page read and write
|
||
7E12000
|
unkown
|
page readonly
|
||
56B00022C000
|
trusted library allocation
|
page read and write
|
||
2C0000801000
|
trusted library allocation
|
page read and write
|
||
C9F5DFE000
|
unkown
|
page readonly
|
||
2C0000114000
|
trusted library allocation
|
page read and write
|
||
2E5C000
|
heap
|
page read and write
|
||
66C000408000
|
trusted library allocation
|
page read and write
|
||
66C000824000
|
trusted library allocation
|
page read and write
|
||
247800404000
|
trusted library allocation
|
page read and write
|
||
211E842B000
|
heap
|
page read and write
|
||
34000334000
|
trusted library allocation
|
page read and write
|
||
2CC400248000
|
trusted library allocation
|
page read and write
|
||
66C000818000
|
trusted library allocation
|
page read and write
|
||
2478002BC000
|
trusted library allocation
|
page read and write
|
||
34000334000
|
trusted library allocation
|
page read and write
|
||
66C0009A0000
|
trusted library allocation
|
page read and write
|
||
56B0003A4000
|
trusted library allocation
|
page read and write
|
||
66C000380000
|
trusted library allocation
|
page read and write
|
||
752E000
|
stack
|
page read and write
|
||
2C0000994000
|
trusted library allocation
|
page read and write
|
||
438C00404000
|
direct allocation
|
page read and write
|
||
211EB635000
|
trusted library allocation
|
page read and write
|
||
4D8800315000
|
direct allocation
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
2C0000678000
|
trusted library allocation
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
733B000
|
direct allocation
|
page read and write
|
||
462400201000
|
trusted library allocation
|
page read and write
|
||
69A800258000
|
trusted library allocation
|
page read and write
|
||
2C000000C000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
heap
|
page read and write
|
||
56B000324000
|
trusted library allocation
|
page read and write
|
||
21A00040000
|
trusted library allocation
|
page read and write
|
||
2CC400258000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
66C0006F0000
|
trusted library allocation
|
page read and write
|
||
2C00003C4000
|
trusted library allocation
|
page read and write
|
||
66C00021B000
|
trusted library allocation
|
page read and write
|
||
66C00032C000
|
trusted library allocation
|
page read and write
|
||
6248002A8000
|
trusted library allocation
|
page read and write
|
||
C0D27FC000
|
stack
|
page read and write
|
||
171454F0000
|
unclassified section
|
page readonly
|
||
66C000AA8000
|
trusted library allocation
|
page read and write
|
||
20DC00121000
|
trusted library allocation
|
page read and write
|
||
260E0958000
|
heap
|
page read and write
|
||
5A48002A0000
|
trusted library allocation
|
page read and write
|
||
46240005C000
|
trusted library allocation
|
page read and write
|
||
2C0000D1C000
|
trusted library allocation
|
page read and write
|
||
2C0000324000
|
trusted library allocation
|
page read and write
|
||
2C0000B8C000
|
trusted library allocation
|
page read and write
|
||
56B00020C000
|
trusted library allocation
|
page read and write
|
||
2478002D8000
|
trusted library allocation
|
page read and write
|
||
438C002C0000
|
direct allocation
|
page read and write
|
||
2F14000
|
direct allocation
|
page read and write
|
||
274AD790000
|
unclassified section
|
page read and write
|
||
6BDC3000
|
unkown
|
page readonly
|
||
C9DFDFE000
|
unkown
|
page readonly
|
||
56B000254000
|
trusted library allocation
|
page read and write
|
||
34000288000
|
trusted library allocation
|
page read and write
|
||
7B3800240000
|
trusted library allocation
|
page read and write
|
||
211E842B000
|
heap
|
page read and write
|
||
FC00238000
|
direct allocation
|
page read and write
|
||
6ACA1000
|
unkown
|
page readonly
|
||
21A00182000
|
trusted library allocation
|
page read and write
|
||
2C000004A000
|
trusted library allocation
|
page read and write
|
||
2EAC000
|
heap
|
page read and write
|
||
260E08F1000
|
heap
|
page read and write
|
||
6030000FC000
|
trusted library allocation
|
page read and write
|
||
788C00230000
|
direct allocation
|
page read and write
|
||
6B012000
|
unkown
|
page execute read
|
||
6E18E000
|
unkown
|
page readonly
|
||
C0DB7FE000
|
stack
|
page read and write
|
||
6E381000
|
unkown
|
page read and write
|
||
2CC4002A4000
|
trusted library allocation
|
page read and write
|
||
211E7FF7000
|
unclassified section
|
page read and write
|
||
2C00007D8000
|
trusted library allocation
|
page read and write
|
||
C9EADFC000
|
stack
|
page read and write
|
||
6F99000
|
stack
|
page read and write
|
||
76FE000
|
stack
|
page read and write
|
||
788C00234000
|
direct allocation
|
page read and write
|
||
1E20DC50000
|
trusted library section
|
page readonly
|
||
2C00001C8000
|
trusted library allocation
|
page read and write
|
||
80A0000
|
direct allocation
|
page read and write
|
||
5A4800210000
|
trusted library allocation
|
page read and write
|
||
66C000334000
|
trusted library allocation
|
page read and write
|
||
211E8370000
|
unclassified section
|
page readonly
|
||
4B40000
|
direct allocation
|
page read and write
|
||
2C0000B40000
|
trusted library allocation
|
page read and write
|
||
66C000237000
|
trusted library allocation
|
page read and write
|
||
6BF5D000
|
unkown
|
page read and write
|
||
69A80020C000
|
trusted library allocation
|
page read and write
|
||
2C00008C4000
|
trusted library allocation
|
page read and write
|
||
6B0EB000
|
unkown
|
page readonly
|
||
274B0221000
|
heap
|
page read and write
|
||
66C000724000
|
trusted library allocation
|
page read and write
|
||
3A0C00238000
|
trusted library allocation
|
page read and write
|
||
2C0000390000
|
trusted library allocation
|
page read and write
|
||
5DA5000
|
direct allocation
|
page read and write
|
||
4D88002B0000
|
direct allocation
|
page read and write
|
||
2C00008A0000
|
trusted library allocation
|
page read and write
|
||
66C000788000
|
trusted library allocation
|
page read and write
|
||
6030000B8000
|
trusted library allocation
|
page read and write
|
||
5A48002AC000
|
trusted library allocation
|
page read and write
|
||
C0DA7FC000
|
stack
|
page read and write
|
||
63B40028C000
|
trusted library allocation
|
page read and write
|
||
2C0000C0C000
|
trusted library allocation
|
page read and write
|
||
211E7F20000
|
unclassified section
|
page readonly
|
||
274B0110000
|
trusted library allocation
|
page read and write
|
||
2C0000A84000
|
trusted library allocation
|
page read and write
|
||
5A48002D0000
|
trusted library allocation
|
page read and write
|
||
624800220000
|
trusted library allocation
|
page read and write
|
||
211E7F40000
|
heap
|
page read and write
|
||
2C0000E5C000
|
trusted library allocation
|
page read and write
|
||
462400028000
|
trusted library allocation
|
page read and write
|
||
1E209453000
|
heap
|
page read and write
|
||
4D8800274000
|
direct allocation
|
page read and write
|
||
56B00039E000
|
trusted library allocation
|
page read and write
|
||
340002C8000
|
trusted library allocation
|
page read and write
|
||
5A48002FC000
|
trusted library allocation
|
page read and write
|
||
74B6000
|
unkown
|
page readonly
|
||
66C000A6D000
|
trusted library allocation
|
page read and write
|
||
EB2FDFE000
|
stack
|
page read and write
|
||
66C000794000
|
trusted library allocation
|
page read and write
|
||
788C00220000
|
direct allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
21A00000000
|
trusted library allocation
|
page readonly
|
||
73A1000
|
heap
|
page read and write
|
||
63B400210000
|
trusted library allocation
|
page read and write
|
||
4D880030F000
|
direct allocation
|
page read and write
|
||
66C000340000
|
trusted library allocation
|
page read and write
|
||
20DC00101000
|
trusted library allocation
|
page read and write
|
||
9F14000
|
heap
|
page execute and read and write
|
||
69A800248000
|
trusted library allocation
|
page read and write
|
||
2C0000948000
|
trusted library allocation
|
page read and write
|
||
FC002D4000
|
direct allocation
|
page read and write
|
||
5DEC000
|
direct allocation
|
page read and write
|
||
8840000
|
direct allocation
|
page read and write
|
||
3A0C002B4000
|
trusted library allocation
|
page read and write
|
||
260E0938000
|
heap
|
page read and write
|
||
66C000620000
|
trusted library allocation
|
page read and write
|
||
56B0003BC000
|
trusted library allocation
|
page read and write
|
||
2E99000
|
heap
|
page read and write
|
||
56B00027C000
|
trusted library allocation
|
page read and write
|
||
7B3800260000
|
trusted library allocation
|
page read and write
|
||
56B0001C8000
|
trusted library allocation
|
page read and write
|
||
438C00201000
|
direct allocation
|
page read and write
|
||
56B0001EC000
|
trusted library allocation
|
page read and write
|
||
2C0000658000
|
trusted library allocation
|
page read and write
|
||
C0DCFFE000
|
unkown
|
page readonly
|
||
5FE800284000
|
direct allocation
|
page read and write
|
||
66C000230000
|
trusted library allocation
|
page read and write
|
||
66C000618000
|
trusted library allocation
|
page read and write
|
||
66C0008BC000
|
trusted library allocation
|
page read and write
|
||
211E8042000
|
heap
|
page read and write
|
||
4B57DFD000
|
stack
|
page read and write
|
||
777E000
|
stack
|
page read and write
|
||
274B02C2000
|
heap
|
page read and write
|
||
6F80D000
|
unkown
|
page readonly
|
||
46240013F000
|
trusted library allocation
|
page read and write
|
||
6BE30000
|
unkown
|
page readonly
|
||
86F0000
|
direct allocation
|
page read and write
|
||
66C000918000
|
trusted library allocation
|
page read and write
|
||
2E59000
|
heap
|
page read and write
|
||
66C00061C000
|
trusted library allocation
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
6CC1D000
|
unkown
|
page readonly
|
||
56B000138000
|
trusted library allocation
|
page read and write
|
||
5A4800244000
|
trusted library allocation
|
page read and write
|
||
FC002F4000
|
direct allocation
|
page read and write
|
||
2C000060D000
|
trusted library allocation
|
page read and write
|
||
6B201000
|
unkown
|
page read and write
|
||
EB325FE000
|
stack
|
page read and write
|
||
A42FFFE000
|
unkown
|
page readonly
|
||
EB345FF000
|
stack
|
page read and write
|
||
3A0C002B4000
|
trusted library allocation
|
page read and write
|
||
2C00003B8000
|
trusted library allocation
|
page read and write
|
||
C9E4DFE000
|
unkown
|
page readonly
|
||
66C00061C000
|
trusted library allocation
|
page read and write
|
||
2C0000AC4000
|
trusted library allocation
|
page read and write
|
||
1718002C4000
|
trusted library allocation
|
page read and write
|
||
260E08F6000
|
heap
|
page read and write
|
||
5A4800268000
|
trusted library allocation
|
page read and write
|
||
6B1F1000
|
unkown
|
page readonly
|
||
211E7FFD000
|
unclassified section
|
page read and write
|
||
260E08EB000
|
heap
|
page read and write
|
||
5A48002B4000
|
trusted library allocation
|
page read and write
|
||
69A800408000
|
trusted library allocation
|
page read and write
|
||
462400124000
|
trusted library allocation
|
page read and write
|
||
66C0006D4000
|
trusted library allocation
|
page read and write
|
||
5FE8002C4000
|
direct allocation
|
page read and write
|
||
2C0000830000
|
trusted library allocation
|
page read and write
|
||
63B400248000
|
trusted library allocation
|
page read and write
|
||
63B4002B0000
|
trusted library allocation
|
page read and write
|
||
2CC4002C4000
|
trusted library allocation
|
page read and write
|
||
66C000624000
|
trusted library allocation
|
page read and write
|
||
21A001C0000
|
trusted library allocation
|
page read and write
|
||
725F000
|
stack
|
page read and write
|
||
6B6A3000
|
unkown
|
page execute read
|
||
56B0000BC000
|
trusted library allocation
|
page read and write
|
||
7B3800237000
|
trusted library allocation
|
page read and write
|
||
2C0000828000
|
trusted library allocation
|
page read and write
|
||
247800310000
|
trusted library allocation
|
page read and write
|
||
2C00005B8000
|
trusted library allocation
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
7B38002EC000
|
trusted library allocation
|
page read and write
|
||
2C0000590000
|
trusted library allocation
|
page read and write
|
||
2C00008F4000
|
trusted library allocation
|
page read and write
|
||
24780031C000
|
trusted library allocation
|
page read and write
|
||
69A800274000
|
trusted library allocation
|
page read and write
|
||
63B400201000
|
trusted library allocation
|
page read and write
|
||
67D000264000
|
direct allocation
|
page read and write
|
||
4624001B8000
|
trusted library allocation
|
page read and write
|
||
C9DD5FD000
|
stack
|
page read and write
|
||
2C0000714000
|
trusted library allocation
|
page read and write
|
||
74CB000
|
unkown
|
page readonly
|
||
2C00007BC000
|
trusted library allocation
|
page read and write
|
||
2C0000E64000
|
trusted library allocation
|
page read and write
|
||
73A0000
|
heap
|
page read and write
|
||
66C000708000
|
trusted library allocation
|
page read and write
|
||
63B40028C000
|
trusted library allocation
|
page read and write
|
||
5A4800230000
|
trusted library allocation
|
page read and write
|
||
274B023C000
|
heap
|
page read and write
|
||
56B000134000
|
trusted library allocation
|
page read and write
|
||
247800430000
|
trusted library allocation
|
page read and write
|
||
2C00003D8000
|
trusted library allocation
|
page read and write
|
||
7E10000
|
unkown
|
page readonly
|
||
C0DD7FE000
|
stack
|
page read and write
|
||
6B6B1000
|
unkown
|
page execute read
|
||
5FE800274000
|
direct allocation
|
page read and write
|
||
788C00284000
|
direct allocation
|
page read and write
|
||
63B4002C8000
|
trusted library allocation
|
page read and write
|
||
1E20942B000
|
heap
|
page read and write
|
||
2C0000DBC000
|
trusted library allocation
|
page read and write
|
||
244FC000
|
trusted library allocation
|
page read and write
|
||
6CC2C000
|
unkown
|
page read and write
|
||
6B110000
|
unkown
|
page readonly
|
||
80B5000
|
heap
|
page read and write
|
||
247800380000
|
trusted library allocation
|
page read and write
|
||
EB305FC000
|
stack
|
page read and write
|
||
274AD44C000
|
heap
|
page read and write
|
||
260E8020000
|
heap
|
page read and write
|
||
2C00001D0000
|
trusted library allocation
|
page read and write
|
||
66C0009E8000
|
trusted library allocation
|
page read and write
|
||
804C000
|
stack
|
page read and write
|
||
66C000848000
|
trusted library allocation
|
page read and write
|
||
274B026A000
|
heap
|
page read and write
|
||
2C0000684000
|
trusted library allocation
|
page read and write
|
||
247800334000
|
trusted library allocation
|
page read and write
|
||
6B261000
|
unkown
|
page read and write
|
||
2447C000
|
trusted library allocation
|
page read and write
|
||
244A4000
|
trusted library allocation
|
page read and write
|
||
2F1A000
|
direct allocation
|
page execute and read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
17180020D000
|
trusted library allocation
|
page read and write
|
||
56B0003CC000
|
trusted library allocation
|
page read and write
|
||
72E0000
|
direct allocation
|
page read and write
|
||
69A800210000
|
trusted library allocation
|
page read and write
|
||
6AC40000
|
unkown
|
page readonly
|
||
274B0292000
|
heap
|
page read and write
|
||
A42CFFE000
|
unkown
|
page readonly
|
||
260E08CC000
|
heap
|
page read and write
|
||
2C0000A78000
|
trusted library allocation
|
page read and write
|
||
2CC400274000
|
trusted library allocation
|
page read and write
|
||
2C00009F0000
|
trusted library allocation
|
page read and write
|
||
171800244000
|
trusted library allocation
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
FC00201000
|
direct allocation
|
page read and write
|
||
4B585FE000
|
unkown
|
page readonly
|
||
274AD43F000
|
heap
|
page read and write
|
||
2C0000920000
|
trusted library allocation
|
page read and write
|
||
C9E15FD000
|
stack
|
page read and write
|
||
274AD42F000
|
heap
|
page read and write
|
||
7D02000
|
direct allocation
|
page read and write
|
||
17145510000
|
heap
|
page read and write
|
||
2C0000124000
|
trusted library allocation
|
page read and write
|
||
34000230000
|
trusted library allocation
|
page read and write
|
||
17145A05000
|
heap
|
page read and write
|
||
34000244000
|
trusted library allocation
|
page read and write
|
||
56B0001A8000
|
trusted library allocation
|
page read and write
|
||
EB315FB000
|
stack
|
page read and write
|
||
C0DFFFE000
|
unkown
|
page readonly
|
||
2E4C000
|
heap
|
page read and write
|
||
66C0006A0000
|
trusted library allocation
|
page read and write
|
||
73A1000
|
heap
|
page read and write
|
||
4D8800288000
|
direct allocation
|
page read and write
|
||
5FE800244000
|
direct allocation
|
page read and write
|
||
2E87000
|
heap
|
page read and write
|
||
260E07C0000
|
heap
|
page read and write
|
||
260E06A0000
|
heap
|
page read and write
|
||
2C0000401000
|
trusted library allocation
|
page read and write
|
||
2C0000AF0000
|
trusted library allocation
|
page read and write
|
||
2C0000BC4000
|
trusted library allocation
|
page read and write
|
||
56B000054000
|
trusted library allocation
|
page read and write
|
||
2C0000990000
|
trusted library allocation
|
page read and write
|
||
2C000008C000
|
trusted library allocation
|
page read and write
|
||
3A0C00240000
|
trusted library allocation
|
page read and write
|
||
66C000638000
|
trusted library allocation
|
page read and write
|
||
6CB98000
|
unkown
|
page read and write
|
||
603000058000
|
trusted library allocation
|
page read and write
|
||
274B0286000
|
heap
|
page read and write
|
||
6B1E0000
|
unkown
|
page readonly
|
||
80C0000
|
heap
|
page read and write
|
||
C9F9DFE000
|
unkown
|
page readonly
|
||
2C0000930000
|
trusted library allocation
|
page read and write
|
||
438C002BC000
|
direct allocation
|
page read and write
|
||
4D8800304000
|
direct allocation
|
page read and write
|
||
2C0000770000
|
trusted library allocation
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
2E0F3FE000
|
stack
|
page read and write
|
||
17145602000
|
heap
|
page read and write
|
||
2C00003B4000
|
trusted library allocation
|
page read and write
|
||
56B0001C0000
|
trusted library allocation
|
page read and write
|
||
4B58DFE000
|
stack
|
page read and write
|
||
2E63000
|
heap
|
page read and write
|
||
17145600000
|
heap
|
page read and write
|
||
260E0913000
|
heap
|
page read and write
|
||
340002E8000
|
trusted library allocation
|
page read and write
|
||
6CAF6000
|
unkown
|
page readonly
|
||
2C0000814000
|
trusted library allocation
|
page read and write
|
||
2C00000BC000
|
trusted library allocation
|
page read and write
|
||
1718002D4000
|
trusted library allocation
|
page read and write
|
||
69A800358000
|
trusted library allocation
|
page read and write
|
||
6B203000
|
unkown
|
page execute read
|
||
66C000A44000
|
trusted library allocation
|
page read and write
|
||
3A0C00270000
|
trusted library allocation
|
page read and write
|
||
66C000370000
|
trusted library allocation
|
page read and write
|
||
260E0846000
|
heap
|
page read and write
|
||
462400178000
|
trusted library allocation
|
page read and write
|
||
260E2717000
|
heap
|
page read and write
|
||
624800248000
|
trusted library allocation
|
page read and write
|
||
2C0000914000
|
trusted library allocation
|
page read and write
|
||
66C00035E000
|
trusted library allocation
|
page read and write
|
||
17145830000
|
heap
|
page read and write
|
||
24448000
|
trusted library allocation
|
page read and write
|
||
24780033C000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
heap
|
page read and write
|
||
2C000052C000
|
trusted library allocation
|
page read and write
|
||
247800201000
|
trusted library allocation
|
page read and write
|
||
462400234000
|
trusted library allocation
|
page read and write
|
||
5A48002A0000
|
trusted library allocation
|
page read and write
|
||
2C0000E01000
|
trusted library allocation
|
page read and write
|
||
C0DE7FE000
|
stack
|
page read and write
|
||
3A0C002A4000
|
trusted library allocation
|
page read and write
|
||
FC0027C000
|
direct allocation
|
page read and write
|
||
260E271E000
|
heap
|
page read and write
|
||
2CC4002A4000
|
trusted library allocation
|
page read and write
|
||
211EB3F0000
|
unclassified section
|
page read and write
|
||
340002A4000
|
trusted library allocation
|
page read and write
|
||
7E90000
|
unkown
|
page readonly
|
||
2E3C000
|
heap
|
page read and write
|
||
260E90A0000
|
heap
|
page read and write
|
||
56B000130000
|
trusted library allocation
|
page read and write
|
||
2C000082B000
|
trusted library allocation
|
page read and write
|
||
6F701000
|
unkown
|
page read and write
|
||
2C00003C8000
|
trusted library allocation
|
page read and write
|
||
EB335FF000
|
stack
|
page read and write
|
||
24424000
|
trusted library allocation
|
page read and write
|
||
66C0006DC000
|
trusted library allocation
|
page read and write
|
||
603000124000
|
trusted library allocation
|
page read and write
|
||
2C0000DF8000
|
trusted library allocation
|
page read and write
|
||
6030000D4000
|
trusted library allocation
|
page read and write
|
||
274AD300000
|
remote allocation
|
page read and write
|
||
2E47000
|
heap
|
page read and write
|
||
2C000045F000
|
trusted library allocation
|
page read and write
|
||
B66000
|
unkown
|
page readonly
|
||
462400074000
|
trusted library allocation
|
page read and write
|
||
24780040C000
|
trusted library allocation
|
page read and write
|
||
2C0000A50000
|
trusted library allocation
|
page read and write
|
||
260E07E0000
|
trusted library allocation
|
page read and write
|
||
624800278000
|
trusted library allocation
|
page read and write
|
||
462400158000
|
trusted library allocation
|
page read and write
|
||
4624001E0000
|
trusted library allocation
|
page read and write
|
||
2C0000A28000
|
trusted library allocation
|
page read and write
|
||
2CC4002C8000
|
trusted library allocation
|
page read and write
|
||
2C00002E8000
|
trusted library allocation
|
page read and write
|
||
6B1E1000
|
unkown
|
page read and write
|
||
6AC80000
|
unkown
|
page readonly
|
||
B30000
|
unkown
|
page readonly
|
||
2E43000
|
heap
|
page read and write
|
||
4D8800298000
|
direct allocation
|
page read and write
|
||
80B0000
|
heap
|
page read and write
|
||
32200010000
|
trusted library allocation
|
page read and write
|
||
5A48002D0000
|
trusted library allocation
|
page read and write
|
||
17145500000
|
unclassified section
|
page readonly
|
||
3A0C002CC000
|
trusted library allocation
|
page read and write
|
||
260E2756000
|
heap
|
page read and write
|
||
2C0000234000
|
trusted library allocation
|
page read and write
|
||
1718002B8000
|
trusted library allocation
|
page read and write
|
||
274AD350000
|
heap
|
page read and write
|
||
995C000
|
stack
|
page read and write
|
||
6C766000
|
unkown
|
page readonly
|
||
6C8BA000
|
unkown
|
page execute and read and write
|
||
260E092A000
|
heap
|
page read and write
|
||
5A4800254000
|
trusted library allocation
|
page read and write
|
||
56B0003AC000
|
trusted library allocation
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
462400098000
|
trusted library allocation
|
page read and write
|
||
C9FB5FD000
|
stack
|
page read and write
|
||
6AC51000
|
unkown
|
page readonly
|
||
211E7EE0000
|
remote allocation
|
page read and write
|
||
274AD2A0000
|
heap
|
page read and write
|
||
69A800230000
|
trusted library allocation
|
page read and write
|
||
56B0000D8000
|
trusted library allocation
|
page read and write
|
||
1E2092D0000
|
heap
|
page read and write
|
||
4BA0000
|
direct allocation
|
page read and write
|
||
56B000198000
|
trusted library allocation
|
page read and write
|
||
6C8BB000
|
unkown
|
page execute read
|
||
73B0000
|
heap
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
7D10000
|
heap
|
page read and write
|
||
FC002C4000
|
direct allocation
|
page read and write
|
||
2450C000
|
trusted library allocation
|
page read and write
|
||
211E8402000
|
heap
|
page read and write
|
||
438C00294000
|
direct allocation
|
page read and write
|
||
4D8800217000
|
direct allocation
|
page read and write
|
||
56B000060000
|
trusted library allocation
|
page read and write
|
||
462400244000
|
trusted library allocation
|
page read and write
|
||
4D8800210000
|
direct allocation
|
page read and write
|
||
66C000358000
|
trusted library allocation
|
page read and write
|
||
274AD457000
|
heap
|
page read and write
|
||
4624000A5000
|
trusted library allocation
|
page read and write
|
||
C9D75FE000
|
stack
|
page read and write
|
||
69A800334000
|
trusted library allocation
|
page read and write
|
||
C0E2FFE000
|
unkown
|
page readonly
|
||
EB2EDEF000
|
stack
|
page read and write
|
||
67D000230000
|
direct allocation
|
page read and write
|
||
211E8423000
|
heap
|
page read and write
|
||
56B00036F000
|
trusted library allocation
|
page read and write
|
||
69A8002A0000
|
trusted library allocation
|
page read and write
|
||
85C0000
|
heap
|
page read and write
|
||
56B00000C000
|
trusted library allocation
|
page read and write
|
||
6248002B8000
|
trusted library allocation
|
page read and write
|
||
274AD770000
|
trusted library allocation
|
page read and write
|
||
2CC40020C000
|
trusted library allocation
|
page read and write
|
||
6ACF1000
|
unkown
|
page read and write
|
||
1E2093B0000
|
heap
|
page readonly
|
||
66C000834000
|
trusted library allocation
|
page read and write
|
||
4D88002E0000
|
direct allocation
|
page read and write
|
||
438C00284000
|
direct allocation
|
page read and write
|
||
4B50000
|
heap
|
page execute and read and write
|
||
24434000
|
trusted library allocation
|
page read and write
|
||
2CC400230000
|
trusted library allocation
|
page read and write
|
||
5FE8002B4000
|
direct allocation
|
page read and write
|
||
7B380029C000
|
trusted library allocation
|
page read and write
|
||
86C7000
|
direct allocation
|
page read and write
|
||
2C0000CE8000
|
trusted library allocation
|
page read and write
|
||
2CC4002C4000
|
trusted library allocation
|
page read and write
|
||
274B02AD000
|
heap
|
page read and write
|
||
56B00021C000
|
trusted library allocation
|
page read and write
|
||
66C00097C000
|
trusted library allocation
|
page read and write
|
||
2CC4002B8000
|
trusted library allocation
|
page read and write
|
||
6ACED000
|
unkown
|
page readonly
|
||
B30000
|
unkown
|
page readonly
|
||
462400190000
|
trusted library allocation
|
page read and write
|
||
46240024C000
|
trusted library allocation
|
page read and write
|
||
2C000023A000
|
trusted library allocation
|
page read and write
|
||
438C002A8000
|
direct allocation
|
page read and write
|
||
C9F4DFE000
|
unkown
|
page readonly
|
||
56B0000E0000
|
trusted library allocation
|
page read and write
|
||
9A8E000
|
stack
|
page read and write
|
||
260E2731000
|
heap
|
page read and write
|
||
C9E1DFE000
|
unkown
|
page readonly
|
||
69A800284000
|
trusted library allocation
|
page read and write
|
||
6F702000
|
unkown
|
page execute read
|
||
7CE0000
|
unkown
|
page readonly
|
||
24780024C000
|
trusted library allocation
|
page read and write
|
||
2C0000B30000
|
trusted library allocation
|
page read and write
|
||
69A8002A4000
|
trusted library allocation
|
page read and write
|
||
2C0000DDC000
|
trusted library allocation
|
page read and write
|
||
56B000024000
|
trusted library allocation
|
page read and write
|
||
2C00007EC000
|
trusted library allocation
|
page read and write
|
||
2442C000
|
trusted library allocation
|
page read and write
|
||
260E9010000
|
heap
|
page read and write
|
||
211EB5F4000
|
trusted library allocation
|
page read and write
|
||
66C000610000
|
trusted library allocation
|
page read and write
|
||
C0DEFFE000
|
unkown
|
page readonly
|
||
2C00009B8000
|
trusted library allocation
|
page read and write
|
||
6AC62000
|
unkown
|
page execute read
|
||
3400033C000
|
trusted library allocation
|
page read and write
|
||
274B0273000
|
heap
|
page read and write
|
||
603000024000
|
trusted library allocation
|
page read and write
|
||
788C002C4000
|
direct allocation
|
page read and write
|
||
274B02A5000
|
heap
|
page read and write
|
||
2C0000394000
|
trusted library allocation
|
page read and write
|
||
6AC5D000
|
unkown
|
page readonly
|
||
66C00020C000
|
trusted library allocation
|
page read and write
|
||
4D880031E000
|
direct allocation
|
page read and write
|
||
56B000368000
|
trusted library allocation
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
34000274000
|
trusted library allocation
|
page read and write
|
||
1E20DE02000
|
heap
|
page read and write
|
||
A4367FE000
|
stack
|
page read and write
|
||
2C00008E4000
|
trusted library allocation
|
page read and write
|
||
2C0000AA4000
|
trusted library allocation
|
page read and write
|
||
462400184000
|
trusted library allocation
|
page read and write
|
||
2C000020C000
|
trusted library allocation
|
page read and write
|
||
66C0002D8000
|
trusted library allocation
|
page read and write
|
||
211E8053000
|
heap
|
page read and write
|
||
2CC400294000
|
trusted library allocation
|
page read and write
|
||
2C0000890000
|
trusted library allocation
|
page read and write
|
||
7B3800324000
|
trusted library allocation
|
page read and write
|
||
7B38002F0000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
260E2749000
|
heap
|
page read and write
|
||
C9CF5FE000
|
stack
|
page read and write
|
||
17148B80000
|
unclassified section
|
page read and write
|
||
260E082B000
|
heap
|
page read and write
|
||
A434FFE000
|
unkown
|
page readonly
|
||
2C0000D84000
|
trusted library allocation
|
page read and write
|
||
6B018000
|
unkown
|
page readonly
|
||
788C00244000
|
direct allocation
|
page read and write
|
||
56B000038000
|
trusted library allocation
|
page read and write
|
||
56B000178000
|
trusted library allocation
|
page read and write
|
||
72F0000
|
direct allocation
|
page read and write
|
||
69A800264000
|
trusted library allocation
|
page read and write
|
||
3A0C00220000
|
trusted library allocation
|
page read and write
|
||
C0DC7FC000
|
stack
|
page read and write
|
||
74E0000
|
direct allocation
|
page read and write
|
||
260E08C0000
|
heap
|
page read and write
|
||
C9DADFE000
|
unkown
|
page readonly
|
||
56B000138000
|
trusted library allocation
|
page read and write
|
||
24480000
|
trusted library allocation
|
page read and write
|
||
4D8800234000
|
direct allocation
|
page read and write
|
||
6B13C000
|
unkown
|
page readonly
|
||
3400040C000
|
trusted library allocation
|
page read and write
|
||
6B6DB000
|
unkown
|
page execute read
|
||
2CC400268000
|
trusted library allocation
|
page read and write
|
||
56B000328000
|
trusted library allocation
|
page read and write
|
||
24414000
|
trusted library allocation
|
page read and write
|
||
6BF65000
|
unkown
|
page execute read
|
||
56B00012C000
|
trusted library allocation
|
page read and write
|
||
C9F6DFE000
|
unkown
|
page readonly
|
||
2C00000D8000
|
trusted library allocation
|
page read and write
|
||
2C0000C94000
|
trusted library allocation
|
page read and write
|
||
274B0281000
|
heap
|
page read and write
|
||
438C00274000
|
direct allocation
|
page read and write
|
||
211E8409000
|
heap
|
page read and write
|
||
6B555000
|
unkown
|
page execute read
|
||
5A4800258000
|
trusted library allocation
|
page read and write
|
||
C9E55FC000
|
stack
|
page read and write
|
||
66C00094C000
|
trusted library allocation
|
page read and write
|
||
247800238000
|
trusted library allocation
|
page read and write
|
||
624800284000
|
trusted library allocation
|
page read and write
|
||
66C0009A4000
|
trusted library allocation
|
page read and write
|
||
438C00220000
|
direct allocation
|
page read and write
|
||
340002A0000
|
trusted library allocation
|
page read and write
|
||
5FE8002D0000
|
direct allocation
|
page read and write
|
||
67D000220000
|
direct allocation
|
page read and write
|
||
2C000033C000
|
trusted library allocation
|
page read and write
|
||
56B00036C000
|
trusted library allocation
|
page read and write
|
||
2C0000328000
|
trusted library allocation
|
page read and write
|
||
6AFF2000
|
unkown
|
page execute read
|
||
A432FFE000
|
unkown
|
page readonly
|
||
66C000694000
|
trusted library allocation
|
page read and write
|
||
2F2C000
|
direct allocation
|
page execute and read and write
|
||
B59000
|
unkown
|
page readonly
|
||
6B160000
|
unkown
|
page readonly
|
||
244C8000
|
trusted library allocation
|
page read and write
|
||
211E8460000
|
heap
|
page read and write
|
||
66C0008AC000
|
trusted library allocation
|
page read and write
|
||
66C000AAC000
|
trusted library allocation
|
page read and write
|
||
624800258000
|
trusted library allocation
|
page read and write
|
||
2C0000198000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
260E2602000
|
heap
|
page read and write
|
||
C9F25FD000
|
stack
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
274AD469000
|
heap
|
page read and write
|
||
2C0000300000
|
trusted library allocation
|
page read and write
|
||
260E07A0000
|
heap
|
page read and write
|
||
6F72B000
|
unkown
|
page readonly
|
||
66C0003D4000
|
trusted library allocation
|
page read and write
|
||
2C0000B0C000
|
trusted library allocation
|
page read and write
|
||
6ACB2000
|
unkown
|
page execute read
|
||
624800230000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
66C0006AC000
|
trusted library allocation
|
page read and write
|
||
171800230000
|
trusted library allocation
|
page read and write
|
||
34000328000
|
trusted library allocation
|
page read and write
|
||
5D81000
|
direct allocation
|
page read and write
|
||
66C0008A9000
|
trusted library allocation
|
page read and write
|
||
5A48002C0000
|
trusted library allocation
|
page read and write
|
||
C9F75FE000
|
stack
|
page read and write
|
||
247800418000
|
trusted library allocation
|
page read and write
|
||
2C0000728000
|
trusted library allocation
|
page read and write
|
||
7B3800210000
|
trusted library allocation
|
page read and write
|
||
211E7F62000
|
unclassified section
|
page read and write
|
||
244B8000
|
trusted library allocation
|
page read and write
|
||
6CB9E000
|
unkown
|
page read and write
|
||
56B0001B0000
|
trusted library allocation
|
page read and write
|
||
274B02B8000
|
heap
|
page read and write
|
||
A4287FE000
|
stack
|
page read and write
|
||
3A0C00244000
|
trusted library allocation
|
page read and write
|
||
462400108000
|
trusted library allocation
|
page read and write
|
||
2478002C4000
|
trusted library allocation
|
page read and write
|
||
17145440000
|
unclassified section
|
page readonly
|
||
A4347FE000
|
stack
|
page read and write
|
||
C9DB5FD000
|
stack
|
page read and write
|
||
260E0884000
|
heap
|
page read and write
|
||
5DE8000
|
direct allocation
|
page read and write
|
||
56B000399000
|
trusted library allocation
|
page read and write
|
||
2C0000854000
|
trusted library allocation
|
page read and write
|
||
2C0000C01000
|
trusted library allocation
|
page read and write
|
||
274B0200000
|
heap
|
page read and write
|
||
2C0000201000
|
trusted library allocation
|
page read and write
|
||
24780033C000
|
trusted library allocation
|
page read and write
|
||
7CE2000
|
unkown
|
page readonly
|
||
56B0000A0000
|
trusted library allocation
|
page read and write
|
||
7350000
|
direct allocation
|
page read and write
|
||
2C0000B80000
|
trusted library allocation
|
page read and write
|
||
66C000628000
|
trusted library allocation
|
page read and write
|
||
340002A4000
|
trusted library allocation
|
page read and write
|
||
2C0000A1C000
|
trusted library allocation
|
page read and write
|
||
34000418000
|
trusted library allocation
|
page read and write
|
||
2446C000
|
trusted library allocation
|
page read and write
|
||
86E0000
|
direct allocation
|
page execute and read and write
|
||
462400068000
|
trusted library allocation
|
page read and write
|
||
56B00019C000
|
trusted library allocation
|
page read and write
|
||
462400038000
|
trusted library allocation
|
page read and write
|
||
2478002F1000
|
trusted library allocation
|
page read and write
|
||
5A48002D0000
|
trusted library allocation
|
page read and write
|
||
244D8000
|
trusted library allocation
|
page read and write
|
||
66C000898000
|
trusted library allocation
|
page read and write
|
||
C9E35FD000
|
stack
|
page read and write
|
||
60300000C000
|
trusted library allocation
|
page read and write
|
||
3A0C00280000
|
trusted library allocation
|
page read and write
|
||
4BF8000
|
heap
|
page read and write
|
||
C9E85FE000
|
unkown
|
page readonly
|
||
66C00060C000
|
trusted library allocation
|
page read and write
|
||
5A4800238000
|
trusted library allocation
|
page read and write
|
||
7573000
|
heap
|
page read and write
|
||
A67000
|
stack
|
page read and write
|
||
7FF8C7010000
|
direct allocation
|
page execute read
|
||
438C002CC000
|
direct allocation
|
page read and write
|
||
66C00086D000
|
trusted library allocation
|
page read and write
|
||
1607CE10000
|
heap
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
2C0000B30000
|
trusted library allocation
|
page read and write
|
||
6C7B1000
|
unkown
|
page execute read
|
||
5A4800220000
|
trusted library allocation
|
page read and write
|
||
A4377FE000
|
stack
|
page read and write
|
||
FC00254000
|
direct allocation
|
page read and write
|
||
4D88002BC000
|
direct allocation
|
page read and write
|
||
A42BFFE000
|
unkown
|
page readonly
|
||
2C0000BB0000
|
trusted library allocation
|
page read and write
|
||
5A48002C0000
|
trusted library allocation
|
page read and write
|
||
66C0006BC000
|
trusted library allocation
|
page read and write
|
||
66C000888000
|
trusted library allocation
|
page read and write
|
||
24510000
|
trusted library allocation
|
page read and write
|
||
3400033C000
|
trusted library allocation
|
page read and write
|
||
603000108000
|
trusted library allocation
|
page read and write
|
||
66C000829000
|
trusted library allocation
|
page read and write
|
||
66C0003AA000
|
trusted library allocation
|
page read and write
|
||
66C0003B4000
|
trusted library allocation
|
page read and write
|
||
3A0C002C0000
|
trusted library allocation
|
page read and write
|
||
C9D95FE000
|
stack
|
page read and write
|
||
8700000
|
direct allocation
|
page read and write
|
||
6B142000
|
unkown
|
page execute read
|
||
274AD41C000
|
heap
|
page read and write
|
||
C9F45FE000
|
stack
|
page read and write
|
||
24780029C000
|
trusted library allocation
|
page read and write
|
||
2CC400284000
|
trusted library allocation
|
page read and write
|
||
46240020C000
|
trusted library allocation
|
page read and write
|
||
69A800254000
|
trusted library allocation
|
page read and write
|
||
5A48002B4000
|
trusted library allocation
|
page read and write
|
||
2C0000D08000
|
trusted library allocation
|
page read and write
|
||
2E59000
|
heap
|
page read and write
|
||
6248002A0000
|
trusted library allocation
|
page read and write
|
||
C0E3FFE000
|
unkown
|
page readonly
|
||
260E5C00000
|
heap
|
page read and write
|
||
2C0000B74000
|
trusted library allocation
|
page read and write
|
||
34000284000
|
trusted library allocation
|
page read and write
|
||
2C0000A3C000
|
trusted library allocation
|
page read and write
|
||
66C000220000
|
trusted library allocation
|
page read and write
|
||
17145860000
|
trusted library allocation
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
624800244000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
2E77000
|
heap
|
page read and write
|
||
603000060000
|
trusted library allocation
|
page read and write
|
||
67D000201000
|
direct allocation
|
page read and write
|
||
66C000730000
|
trusted library allocation
|
page read and write
|
||
C0E0FFE000
|
unkown
|
page readonly
|
||
2C0000BF0000
|
trusted library allocation
|
page read and write
|
||
2C0000D74000
|
trusted library allocation
|
page read and write
|
||
63B400230000
|
trusted library allocation
|
page read and write
|
||
C9E65FE000
|
unkown
|
page readonly
|
||
4D880032C000
|
direct allocation
|
page read and write
|
||
C9F1DFE000
|
unkown
|
page readonly
|
||
56B000386000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
4D8800304000
|
direct allocation
|
page read and write
|
||
2C00001B9000
|
trusted library allocation
|
page read and write
|
||
2C0000661000
|
trusted library allocation
|
page read and write
|
||
56B0001DC000
|
trusted library allocation
|
page read and write
|
||
2CC4002C4000
|
trusted library allocation
|
page read and write
|
||
4D880034F000
|
direct allocation
|
page read and write
|
||
B47000
|
unkown
|
page readonly
|
||
66C000A90000
|
trusted library allocation
|
page read and write
|
||
80D0000
|
heap
|
page read and write
|
||
462400084000
|
trusted library allocation
|
page read and write
|
||
2C00005A8000
|
trusted library allocation
|
page read and write
|
||
2C0000E64000
|
trusted library allocation
|
page read and write
|
||
6BF5F000
|
unkown
|
page read and write
|
||
2C0000DB0000
|
trusted library allocation
|
page read and write
|
||
4D8800294000
|
direct allocation
|
page read and write
|
||
2C0000624000
|
trusted library allocation
|
page read and write
|
||
66C0008AC000
|
trusted library allocation
|
page read and write
|
||
34000220000
|
trusted library allocation
|
page read and write
|
||
2E3C000
|
heap
|
page read and write
|
||
7360000
|
direct allocation
|
page read and write
|
||
247800310000
|
trusted library allocation
|
page read and write
|
||
67D000254000
|
direct allocation
|
page read and write
|
||
1718002A8000
|
trusted library allocation
|
page read and write
|
||
2CC400210000
|
trusted library allocation
|
page read and write
|
||
2E47000
|
heap
|
page read and write
|
||
1607D01C000
|
heap
|
page read and write
|
||
66C000A18000
|
trusted library allocation
|
page read and write
|
||
20DC001C6000
|
trusted library allocation
|
page read and write
|
||
A4297FE000
|
stack
|
page read and write
|
||
260E0813000
|
heap
|
page read and write
|
||
63B400298000
|
trusted library allocation
|
page read and write
|
||
66C000770000
|
trusted library allocation
|
page read and write
|
||
2C000071C000
|
trusted library allocation
|
page read and write
|
||
56B000114000
|
trusted library allocation
|
page read and write
|
||
211E8102000
|
heap
|
page read and write
|
||
2E3C000
|
heap
|
page read and write
|
||
603000114000
|
trusted library allocation
|
page read and write
|
||
2C0000054000
|
trusted library allocation
|
page read and write
|
||
247800230000
|
trusted library allocation
|
page read and write
|
||
624800254000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
438C00250000
|
direct allocation
|
page read and write
|
||
1714562B000
|
heap
|
page read and write
|
||
2C00006F0000
|
trusted library allocation
|
page read and write
|
||
211E7E70000
|
unclassified section
|
page readonly
|
||
2C0000234000
|
trusted library allocation
|
page read and write
|
||
2C0000DA0000
|
trusted library allocation
|
page read and write
|
||
2C000085C000
|
trusted library allocation
|
page read and write
|
||
6BF50000
|
unkown
|
page readonly
|
||
56B000348000
|
trusted library allocation
|
page read and write
|
||
66C000375000
|
trusted library allocation
|
page read and write
|
||
69A800237000
|
trusted library allocation
|
page read and write
|
||
260E2754000
|
heap
|
page read and write
|
||
20DC001E1000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
69A8002A0000
|
trusted library allocation
|
page read and write
|
||
66C00032C000
|
trusted library allocation
|
page read and write
|
||
20DC00181000
|
trusted library allocation
|
page read and write
|
||
C0E17FE000
|
stack
|
page read and write
|
||
6E151000
|
unkown
|
page execute read
|
||
3400020C000
|
trusted library allocation
|
page read and write
|
||
2C000015C000
|
trusted library allocation
|
page read and write
|
||
A4277F6000
|
stack
|
page read and write
|
||
2CC4002C4000
|
trusted library allocation
|
page read and write
|
||
66C000754000
|
trusted library allocation
|
page read and write
|
||
2C00009F0000
|
trusted library allocation
|
page read and write
|
||
69A800244000
|
trusted library allocation
|
page read and write
|
||
FC00220000
|
direct allocation
|
page read and write
|
||
260E279D000
|
heap
|
page read and write
|
||
2C00004D0000
|
trusted library allocation
|
page read and write
|
||
73A1000
|
heap
|
page read and write
|
||
1607CF30000
|
heap
|
page read and write
|
||
244A4000
|
trusted library allocation
|
page read and write
|
||
69A800310000
|
trusted library allocation
|
page read and write
|
||
56B00027C000
|
trusted library allocation
|
page read and write
|
||
C9FBDFE000
|
unkown
|
page readonly
|
||
66C000998000
|
trusted library allocation
|
page read and write
|
||
2F04000
|
direct allocation
|
page read and write
|
||
4624000C0000
|
trusted library allocation
|
page read and write
|
||
6B1A5000
|
unkown
|
page readonly
|
||
2F22000
|
direct allocation
|
page execute and read and write
|
||
66C00093C000
|
trusted library allocation
|
page read and write
|
||
2CC4002C8000
|
trusted library allocation
|
page read and write
|
||
211E7F30000
|
unclassified section
|
page readonly
|
||
2E7F000
|
heap
|
page read and write
|
||
56B0000AC000
|
trusted library allocation
|
page read and write
|
||
4B5B5FE000
|
unkown
|
page readonly
|
||
FC0029C000
|
direct allocation
|
page read and write
|
||
2C0000244000
|
trusted library allocation
|
page read and write
|
||
C9EA5FE000
|
unkown
|
page readonly
|
||
C9EB5FE000
|
unkown
|
page readonly
|
||
7380000
|
direct allocation
|
page read and write
|
||
438C00264000
|
direct allocation
|
page read and write
|
||
274AD7C0000
|
unclassified section
|
page read and write
|
||
56B000120000
|
trusted library allocation
|
page read and write
|
||
4D8800338000
|
direct allocation
|
page read and write
|
||
260E0927000
|
heap
|
page read and write
|
||
56B0000CC000
|
trusted library allocation
|
page read and write
|
||
171800254000
|
trusted library allocation
|
page read and write
|
||
69A8002E4000
|
trusted library allocation
|
page read and write
|
||
260E2765000
|
heap
|
page read and write
|
||
2C00002EC000
|
trusted library allocation
|
page read and write
|
||
5A48002B4000
|
trusted library allocation
|
page read and write
|
||
56B000070000
|
trusted library allocation
|
page read and write
|
||
4624000D8000
|
trusted library allocation
|
page read and write
|
||
C9D0DFE000
|
unkown
|
page readonly
|
||
A42C7FE000
|
stack
|
page read and write
|
||
4D88002FF000
|
direct allocation
|
page read and write
|
||
7CEA000
|
unkown
|
page readonly
|
||
2C0000648000
|
trusted library allocation
|
page read and write
|
||
171454E0000
|
heap
|
page read and write
|
||
66C0006AC000
|
trusted library allocation
|
page read and write
|
||
24780025C000
|
trusted library allocation
|
page read and write
|
||
A42D7FE000
|
stack
|
page read and write
|
||
788C002B4000
|
direct allocation
|
page read and write
|
||
2C000094C000
|
trusted library allocation
|
page read and write
|
||
7B3800300000
|
trusted library allocation
|
page read and write
|
||
7B3800220000
|
trusted library allocation
|
page read and write
|
||
2C0000E24000
|
trusted library allocation
|
page read and write
|
||
5FE8002A0000
|
direct allocation
|
page read and write
|
||
2C0000A60000
|
trusted library allocation
|
page read and write
|
||
66C0006E4000
|
trusted library allocation
|
page read and write
|
||
6B100000
|
unkown
|
page readonly
|
||
7B3800201000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
direct allocation
|
page read and write
|
||
2C0000940000
|
trusted library allocation
|
page read and write
|
||
17145819000
|
unclassified section
|
page read and write
|
||
66C000674000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
438C00298000
|
direct allocation
|
page read and write
|
||
56B000130000
|
trusted library allocation
|
page read and write
|
||
2C0000A88000
|
trusted library allocation
|
page read and write
|
||
2C0000590000
|
trusted library allocation
|
page read and write
|
||
603000044000
|
trusted library allocation
|
page read and write
|
||
FC002C0000
|
direct allocation
|
page read and write
|
||
66C00069A000
|
trusted library allocation
|
page read and write
|
||
7008000
|
heap
|
page read and write
|
||
69A8002B8000
|
trusted library allocation
|
page read and write
|
||
66C000801000
|
trusted library allocation
|
page read and write
|
||
211E842B000
|
heap
|
page read and write
|
||
66C000624000
|
trusted library allocation
|
page read and write
|
||
2CC400238000
|
trusted library allocation
|
page read and write
|
||
2C0000E45000
|
trusted library allocation
|
page read and write
|
||
7DF4E03E1000
|
trusted library allocation
|
page execute read
|
||
211E8424000
|
heap
|
page read and write
|
||
260E2737000
|
heap
|
page read and write
|
||
274B02AF000
|
heap
|
page read and write
|
||
274B0241000
|
heap
|
page read and write
|
||
2C00009C8000
|
trusted library allocation
|
page read and write
|
||
2C0000B1C000
|
trusted library allocation
|
page read and write
|
||
2478002D0000
|
trusted library allocation
|
page read and write
|
||
4D88002C4000
|
direct allocation
|
page read and write
|
||
211E842B000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute read
|
||
6B1B1000
|
unkown
|
page read and write
|
||
66C000634000
|
trusted library allocation
|
page read and write
|
||
EB32DFD000
|
stack
|
page read and write
|
||
A42E7FE000
|
stack
|
page read and write
|
||
56B000138000
|
trusted library allocation
|
page read and write
|
||
2C0000840000
|
trusted library allocation
|
page read and write
|
||
56B00037C000
|
trusted library allocation
|
page read and write
|
||
66C0003D4000
|
trusted library allocation
|
page read and write
|
||
2C0000C74000
|
trusted library allocation
|
page read and write
|
||
2C0000CFD000
|
trusted library allocation
|
page read and write
|
||
260E085E000
|
heap
|
page read and write
|
||
260E272E000
|
heap
|
page read and write
|
||
244B0000
|
trusted library allocation
|
page read and write
|
||
247800348000
|
trusted library allocation
|
page read and write
|
||
1E209502000
|
heap
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
5FE800254000
|
direct allocation
|
page read and write
|
||
46240001C000
|
trusted library allocation
|
page read and write
|
||
9E30000
|
unkown
|
page readonly
|
||
7037000
|
heap
|
page read and write
|
||
A4327FE000
|
stack
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
247800328000
|
trusted library allocation
|
page read and write
|
||
274B0302000
|
heap
|
page read and write
|
||
260E0902000
|
heap
|
page read and write
|
||
438C002A4000
|
direct allocation
|
page read and write
|
||
2E86000
|
heap
|
page read and write
|
||
66C000320000
|
trusted library allocation
|
page read and write
|
||
C9E05FE000
|
stack
|
page read and write
|
||
56B000108000
|
trusted library allocation
|
page read and write
|
||
2C00009A8000
|
trusted library allocation
|
page read and write
|
||
2E0A000
|
heap
|
page read and write
|
||
21A00040000
|
trusted library allocation
|
page readonly
|
||
67D000284000
|
direct allocation
|
page read and write
|
||
5A48002D0000
|
trusted library allocation
|
page read and write
|
||
17145613000
|
heap
|
page read and write
|
||
A433FFE000
|
unkown
|
page readonly
|
||
2C0000CB4000
|
trusted library allocation
|
page read and write
|
||
66C0003C8000
|
trusted library allocation
|
page read and write
|
||
603000110000
|
trusted library allocation
|
page read and write
|
||
2C0000D34000
|
trusted library allocation
|
page read and write
|
||
274AD802000
|
heap
|
page read and write
|
||
462400148000
|
trusted library allocation
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
274B027E000
|
heap
|
page read and write
|
||
247800284000
|
trusted library allocation
|
page read and write
|
||
244B0000
|
trusted library allocation
|
page read and write
|
||
8E9000
|
stack
|
page read and write
|
||
56B00035C000
|
trusted library allocation
|
page read and write
|
||
2440C000
|
trusted library allocation
|
page read and write
|
||
C0DBFFE000
|
unkown
|
page readonly
|
||
6FEA000
|
heap
|
page read and write
|
||
2C0000AF9000
|
trusted library allocation
|
page read and write
|
||
4D88002AC000
|
direct allocation
|
page read and write
|
||
2C0000B00000
|
trusted library allocation
|
page read and write
|
||
4D8800314000
|
direct allocation
|
page read and write
|
||
56B000120000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
2C0000A0C000
|
trusted library allocation
|
page read and write
|
||
1E20943F000
|
heap
|
page read and write
|
||
808E000
|
stack
|
page read and write
|
||
7570000
|
heap
|
page read and write
|
||
5A4800238000
|
trusted library allocation
|
page read and write
|
||
6AC59000
|
unkown
|
page read and write
|
||
FC0020C000
|
direct allocation
|
page read and write
|
||
C0D8FFE000
|
unkown
|
page readonly
|
||
2EA2000
|
heap
|
page read and write
|
||
56B000134000
|
trusted library allocation
|
page read and write
|
||
211EBD2D000
|
unclassified section
|
page read and write
|
||
2CC40028C000
|
trusted library allocation
|
page read and write
|
||
2E5C000
|
heap
|
page read and write
|
||
2C000099C000
|
trusted library allocation
|
page read and write
|
||
56B0000C8000
|
trusted library allocation
|
page read and write
|
||
66C0003E0000
|
trusted library allocation
|
page read and write
|
||
46240008A000
|
trusted library allocation
|
page read and write
|
||
2C000001C000
|
trusted library allocation
|
page read and write
|
||
66C000A0C000
|
trusted library allocation
|
page read and write
|
||
2C0000908000
|
trusted library allocation
|
page read and write
|
||
56B000394000
|
trusted library allocation
|
page read and write
|
||
2C0000A68000
|
trusted library allocation
|
page read and write
|
||
2C00000CC000
|
trusted library allocation
|
page read and write
|
||
2CC4002B8000
|
trusted library allocation
|
page read and write
|
||
4624000A8000
|
trusted library allocation
|
page read and write
|
||
66C0009D0000
|
trusted library allocation
|
page read and write
|
||
FC002FC000
|
direct allocation
|
page read and write
|
||
6248002B8000
|
trusted library allocation
|
page read and write
|
||
2C00005A0000
|
trusted library allocation
|
page read and write
|
||
171455F0000
|
heap
|
page readonly
|
||
244B0000
|
trusted library allocation
|
page read and write
|
||
4D880030C000
|
direct allocation
|
page read and write
|
||
732B000
|
direct allocation
|
page read and write
|
||
5A48002A0000
|
trusted library allocation
|
page read and write
|
||
56B000158000
|
trusted library allocation
|
page read and write
|
||
2C0000BB0000
|
trusted library allocation
|
page read and write
|
||
63B40027C000
|
trusted library allocation
|
page read and write
|
||
5A48002F0000
|
trusted library allocation
|
page read and write
|
||
66C0002C8000
|
trusted library allocation
|
page read and write
|
||
2C0000A54000
|
trusted library allocation
|
page read and write
|
||
6E5A2000
|
unkown
|
page execute read
|
||
2ED0000
|
heap
|
page read and write
|
||
2C0000D50000
|
trusted library allocation
|
page read and write
|
||
34000310000
|
trusted library allocation
|
page read and write
|
||
7354000
|
direct allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
2C0000274000
|
trusted library allocation
|
page read and write
|
||
2C00007AC000
|
trusted library allocation
|
page read and write
|
||
2E3F000
|
heap
|
page read and write
|
||
6B260000
|
unkown
|
page readonly
|
||
274AD49A000
|
heap
|
page read and write
|
||
438C002E4000
|
direct allocation
|
page read and write
|
||
C0DF7FE000
|
stack
|
page read and write
|
||
66C000334000
|
trusted library allocation
|
page read and write
|
||
7390000
|
direct allocation
|
page read and write
|
||
9C46000
|
heap
|
page read and write
|
||
4B5ADFD000
|
stack
|
page read and write
|
||
66C00074C000
|
trusted library allocation
|
page read and write
|
||
C9F15FD000
|
stack
|
page read and write
|
||
247800284000
|
trusted library allocation
|
page read and write
|
||
2EE2000
|
heap
|
page read and write
|
||
66C000A78000
|
trusted library allocation
|
page read and write
|
||
56B000138000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
67D0002A0000
|
direct allocation
|
page read and write
|
||
2C0000D78000
|
trusted library allocation
|
page read and write
|
||
78FF000
|
stack
|
page read and write
|
||
6B021000
|
unkown
|
page read and write
|
||
2C00006D8000
|
trusted library allocation
|
page read and write
|
||
6FDF000
|
heap
|
page read and write
|
||
69A8002E8000
|
trusted library allocation
|
page read and write
|
||
FC00270000
|
direct allocation
|
page read and write
|
||
2C00003B0000
|
trusted library allocation
|
page read and write
|
||
2C00005CC000
|
trusted library allocation
|
page read and write
|
||
2C0000D20000
|
trusted library allocation
|
page read and write
|
||
2C000095C000
|
trusted library allocation
|
page read and write
|
||
2C0000354000
|
trusted library allocation
|
page read and write
|
||
C0D7FFE000
|
unkown
|
page readonly
|
||
260E0935000
|
heap
|
page read and write
|
||
5A48002A0000
|
trusted library allocation
|
page read and write
|
||
66C000248000
|
trusted library allocation
|
page read and write
|
||
7392000
|
direct allocation
|
page read and write
|
||
66C000954000
|
trusted library allocation
|
page read and write
|
||
1714561B000
|
heap
|
page read and write
|
||
4D880030E000
|
direct allocation
|
page read and write
|
||
274B0243000
|
heap
|
page read and write
|
||
4624001CC000
|
trusted library allocation
|
page read and write
|
||
2C000017C000
|
trusted library allocation
|
page read and write
|
||
7700000
|
heap
|
page read and write
|
||
66C000620000
|
trusted library allocation
|
page read and write
|
||
66C000898000
|
trusted library allocation
|
page read and write
|
||
5A48002C0000
|
trusted library allocation
|
page read and write
|
||
24404000
|
trusted library allocation
|
page read and write
|
||
6F722000
|
unkown
|
page execute read
|
||
6B240000
|
unkown
|
page readonly
|
||
7B38002E0000
|
trusted library allocation
|
page read and write
|
||
C9F35FD000
|
stack
|
page read and write
|
||
6F800000
|
unkown
|
page readonly
|
||
2E0E000
|
heap
|
page read and write
|
||
C9E7DFD000
|
stack
|
page read and write
|
||
C9DDDFE000
|
unkown
|
page readonly
|
||
4D8800201000
|
direct allocation
|
page read and write
|
||
2C0000C54000
|
trusted library allocation
|
page read and write
|
||
260E08F8000
|
heap
|
page read and write
|
||
6248002C4000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
7D04000
|
direct allocation
|
page read and write
|
||
7B3800418000
|
trusted library allocation
|
page read and write
|
||
66C000418000
|
trusted library allocation
|
page read and write
|
||
6AC92000
|
unkown
|
page execute read
|
||
340002AC000
|
trusted library allocation
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
7B3800230000
|
trusted library allocation
|
page read and write
|
||
247800288000
|
trusted library allocation
|
page read and write
|
||
274B02B1000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
7B3800250000
|
trusted library allocation
|
page read and write
|
||
66C0002EC000
|
trusted library allocation
|
page read and write
|
||
2C00009E8000
|
trusted library allocation
|
page read and write
|
||
4624000EC000
|
trusted library allocation
|
page read and write
|
||
260E25C0000
|
trusted library section
|
page readonly
|
||
211E840C000
|
heap
|
page read and write
|
||
260E2775000
|
heap
|
page read and write
|
||
2C0000868000
|
trusted library allocation
|
page read and write
|
||
34000408000
|
trusted library allocation
|
page read and write
|
||
63B400278000
|
trusted library allocation
|
page read and write
|
||
C9E9DFE000
|
stack
|
page read and write
|
||
7341000
|
direct allocation
|
page read and write
|
||
7B38002A0000
|
trusted library allocation
|
page read and write
|
||
63B40028C000
|
trusted library allocation
|
page read and write
|
||
2C0000020000
|
trusted library allocation
|
page read and write
|
||
247800288000
|
trusted library allocation
|
page read and write
|
||
2CC4002B8000
|
trusted library allocation
|
page read and write
|
||
C9CE5F6000
|
stack
|
page read and write
|
||
260E2723000
|
heap
|
page read and write
|
||
2C0000A01000
|
trusted library allocation
|
page read and write
|
||
EB355FE000
|
stack
|
page read and write
|
||
1607D102000
|
heap
|
page read and write
|
||
69A800278000
|
trusted library allocation
|
page read and write
|
||
9E60000
|
direct allocation
|
page read and write
|
||
C9DE5FD000
|
stack
|
page read and write
|
||
2C0000BE4000
|
trusted library allocation
|
page read and write
|
||
66C0002CC000
|
trusted library allocation
|
page read and write
|
||
2C000063C000
|
trusted library allocation
|
page read and write
|
||
788C00294000
|
direct allocation
|
page read and write
|
||
4D880031C000
|
direct allocation
|
page read and write
|
||
34000254000
|
trusted library allocation
|
page read and write
|
||
1607EA02000
|
heap
|
page read and write
|
||
2E42000
|
heap
|
page read and write
|
||
7AFE000
|
stack
|
page read and write
|
||
C9E5DFD000
|
stack
|
page read and write
|
||
A42AFFE000
|
unkown
|
page readonly
|
||
69A8002F0000
|
trusted library allocation
|
page read and write
|
||
69A8002A4000
|
trusted library allocation
|
page read and write
|
||
60300009B000
|
trusted library allocation
|
page read and write
|
||
247800424000
|
trusted library allocation
|
page read and write
|
||
B4F000
|
unkown
|
page read and write
|
||
2E57000
|
heap
|
page read and write
|
||
66C000684000
|
trusted library allocation
|
page read and write
|
||
A4337F9000
|
stack
|
page read and write
|
||
63B40028C000
|
trusted library allocation
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
2C00000A8000
|
trusted library allocation
|
page read and write
|
||
5A48002D0000
|
trusted library allocation
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
2C000040C000
|
trusted library allocation
|
page read and write
|
||
2C000080C000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
direct allocation
|
page read and write
|
||
67D000210000
|
direct allocation
|
page read and write
|
||
4D8800320000
|
direct allocation
|
page read and write
|
||
66C000614000
|
trusted library allocation
|
page read and write
|
||
260E273B000
|
heap
|
page read and write
|
||
274B0312000
|
heap
|
page read and write
|
||
4624000E8000
|
trusted library allocation
|
page read and write
|
||
5A48002A0000
|
trusted library allocation
|
page read and write
|
||
624800201000
|
trusted library allocation
|
page read and write
|
||
A431FFE000
|
unkown
|
page readonly
|
||
24434000
|
trusted library allocation
|
page read and write
|
||
274AD813000
|
heap
|
page read and write
|
||
260E08A5000
|
heap
|
page read and write
|
||
274AD3A0000
|
heap
|
page read and write
|
||
260E0928000
|
heap
|
page read and write
|
||
2EAC000
|
heap
|
page read and write
|
||
2C0000AD4000
|
trusted library allocation
|
page read and write
|
||
2C0000DE8000
|
trusted library allocation
|
page read and write
|
||
2C0000134000
|
trusted library allocation
|
page read and write
|
||
2C0000B30000
|
trusted library allocation
|
page read and write
|
||
260E08F7000
|
heap
|
page read and write
|
||
34000258000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
729D000
|
stack
|
page read and write
|
||
6ACC2000
|
unkown
|
page execute read
|
||
2F1D000
|
direct allocation
|
page execute and read and write
|
||
2C0000BE4000
|
trusted library allocation
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
274B0300000
|
heap
|
page read and write
|
||
788C00254000
|
direct allocation
|
page read and write
|
||
66C0003C0000
|
trusted library allocation
|
page read and write
|
||
A4317FC000
|
stack
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute read
|
||
2C000074C000
|
trusted library allocation
|
page read and write
|
||
56B0000C4000
|
trusted library allocation
|
page read and write
|
||
7B38002A8000
|
trusted library allocation
|
page read and write
|
||
2C0000590000
|
trusted library allocation
|
page read and write
|
||
17145450000
|
heap
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
260E092F000
|
heap
|
page read and write
|
||
6AF50000
|
unkown
|
page readonly
|
||
260E279A000
|
heap
|
page read and write
|
||
171454CA000
|
remote allocation
|
page execute read
|
||
6B140000
|
unkown
|
page readonly
|
||
244B8000
|
trusted library allocation
|
page read and write
|
||
4D8800250000
|
direct allocation
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
66C000378000
|
trusted library allocation
|
page read and write
|
||
7370000
|
direct allocation
|
page read and write
|
||
7E84000
|
unkown
|
page readonly
|
||
2C00000B9000
|
trusted library allocation
|
page read and write
|
||
66C000201000
|
trusted library allocation
|
page read and write
|
||
171800288000
|
trusted library allocation
|
page read and write
|
||
1E209402000
|
heap
|
page read and write
|
||
66C000614000
|
trusted library allocation
|
page read and write
|
||
56B0001AC000
|
trusted library allocation
|
page read and write
|
||
66C0008DC000
|
trusted library allocation
|
page read and write
|
||
260E9000000
|
heap
|
page read and write
|
||
171800238000
|
trusted library allocation
|
page read and write
|
||
211E802A000
|
heap
|
page read and write
|
||
9F10000
|
heap
|
page execute and read and write
|
||
6B011000
|
unkown
|
page read and write
|
||
6CBA3000
|
unkown
|
page read and write
|
||
56B000354000
|
trusted library allocation
|
page read and write
|
||
66C000314000
|
trusted library allocation
|
page read and write
|
||
211E8013000
|
heap
|
page read and write
|
||
274AD42B000
|
heap
|
page read and write
|
||
C0D87FC000
|
stack
|
page read and write
|
||
2C00002A4000
|
trusted library allocation
|
page read and write
|
||
67D0002C4000
|
direct allocation
|
page read and write
|
||
2C0000C54000
|
trusted library allocation
|
page read and write
|
||
211E7F7A000
|
unclassified section
|
page read and write
|
||
2E58000
|
heap
|
page read and write
|
||
274AD372000
|
unclassified section
|
page read and write
|
||
260E2766000
|
heap
|
page read and write
|
||
2C0000AA0000
|
trusted library allocation
|
page read and write
|
||
34000248000
|
trusted library allocation
|
page read and write
|
||
6B010000
|
unkown
|
page readonly
|
||
66C0008A9000
|
trusted library allocation
|
page read and write
|
||
260E0883000
|
heap
|
page read and write
|
||
7335000
|
direct allocation
|
page read and write
|
||
2C00009CC000
|
trusted library allocation
|
page read and write
|
||
788C002A0000
|
direct allocation
|
page read and write
|
||
C9EDDFE000
|
unkown
|
page readonly
|
||
2C000044C000
|
trusted library allocation
|
page read and write
|
||
56B0001B8000
|
trusted library allocation
|
page read and write
|
||
B47000
|
unkown
|
page readonly
|
||
C9F95FC000
|
stack
|
page read and write
|
||
24780020C000
|
trusted library allocation
|
page read and write
|
||
2CC400264000
|
trusted library allocation
|
page read and write
|
||
63B400254000
|
trusted library allocation
|
page read and write
|
||
2C0000550000
|
trusted library allocation
|
page read and write
|
||
2EAC000
|
heap
|
page read and write
|
||
6ACC1000
|
unkown
|
page read and write
|
||
274AD413000
|
heap
|
page read and write
|
||
C9F65FE000
|
stack
|
page read and write
|
||
6E380000
|
unkown
|
page readonly
|
||
2CC400278000
|
trusted library allocation
|
page read and write
|
||
211E7F00000
|
remote allocation
|
page read and write
|
||
2C0000504000
|
trusted library allocation
|
page read and write
|
||
2C0000934000
|
trusted library allocation
|
page read and write
|
||
4D88002D0000
|
direct allocation
|
page read and write
|
||
7347000
|
direct allocation
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
6AC90000
|
unkown
|
page readonly
|
||
6AC91000
|
unkown
|
page read and write
|
||
788C00210000
|
direct allocation
|
page read and write
|
||
C0E27FB000
|
stack
|
page read and write
|
||
788C00264000
|
direct allocation
|
page read and write
|
||
2478002F8000
|
trusted library allocation
|
page read and write
|
||
69A8002D4000
|
trusted library allocation
|
page read and write
|
||
260E33C0000
|
unkown
|
page read and write
|
||
66C000724000
|
trusted library allocation
|
page read and write
|
||
60300007C000
|
trusted library allocation
|
page read and write
|
||
5A480028C000
|
trusted library allocation
|
page read and write
|
||
56B000080000
|
trusted library allocation
|
page read and write
|
||
5A4800264000
|
trusted library allocation
|
page read and write
|
||
6E1A0000
|
unkown
|
page readonly
|
||
2C0000464000
|
trusted library allocation
|
page read and write
|
||
462400154000
|
trusted library allocation
|
page read and write
|
||
66C000A24000
|
trusted library allocation
|
page read and write
|
||
6B1D7000
|
unkown
|
page readonly
|
||
4624000F0000
|
trusted library allocation
|
page read and write
|
||
C9E45FC000
|
stack
|
page read and write
|
||
56B0000C1000
|
trusted library allocation
|
page read and write
|
||
17145802000
|
unclassified section
|
page read and write
|
||
66C00080C000
|
trusted library allocation
|
page read and write
|
||
56B000250000
|
trusted library allocation
|
page read and write
|
||
20DC001A1000
|
trusted library allocation
|
page read and write
|
||
66C000A6D000
|
trusted library allocation
|
page read and write
|
||
7B3800408000
|
trusted library allocation
|
page read and write
|
||
C9D5DFE000
|
unkown
|
page readonly
|
||
34000201000
|
trusted library allocation
|
page read and write
|
||
6BF1F000
|
unkown
|
page readonly
|
||
C0D47FF000
|
stack
|
page read and write
|
||
21A00202000
|
trusted library allocation
|
page read and write
|
||
63B400264000
|
trusted library allocation
|
page read and write
|
||
56B000160000
|
trusted library allocation
|
page read and write
|
||
733E000
|
direct allocation
|
page read and write
|
||
6248002D4000
|
trusted library allocation
|
page read and write
|
||
624800274000
|
trusted library allocation
|
page read and write
|
||
7083000
|
heap
|
page read and write
|
||
C0E37FE000
|
stack
|
page read and write
|
||
6B274000
|
unkown
|
page read and write
|
||
2CC400294000
|
trusted library allocation
|
page read and write
|
||
6B1B2000
|
unkown
|
page execute read
|
||
2C0000618000
|
trusted library allocation
|
page read and write
|
||
3400031C000
|
trusted library allocation
|
page read and write
|
||
69A80033C000
|
trusted library allocation
|
page read and write
|
||
56B0001A4000
|
trusted library allocation
|
page read and write
|
||
FC002C0000
|
direct allocation
|
page read and write
|
||
211E7F10000
|
heap
|
page read and write
|
||
788C002E0000
|
direct allocation
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
4D8800230000
|
direct allocation
|
page read and write
|
||
66C000601000
|
trusted library allocation
|
page read and write
|
||
247800344000
|
trusted library allocation
|
page read and write
|
||
2C0000D94000
|
trusted library allocation
|
page read and write
|
||
438C002D4000
|
direct allocation
|
page read and write
|
||
A7FC4030000
|
trusted library allocation
|
page read and write
|
||
7CC0000
|
heap
|
page read and write
|
||
244A0000
|
trusted library allocation
|
page read and write
|
||
2C00002B0000
|
trusted library allocation
|
page read and write
|
||
2C0000074000
|
trusted library allocation
|
page read and write
|
||
7730000
|
heap
|
page read and write
|
||
60300010C000
|
trusted library allocation
|
page read and write
|
||
6CBE1000
|
unkown
|
page execute read
|
||
2C00001AC000
|
trusted library allocation
|
page read and write
|
||
7B3800404000
|
trusted library allocation
|
page read and write
|
||
4D8800364000
|
direct allocation
|
page read and write
|
||
56B000194000
|
trusted library allocation
|
page read and write
|
||
63B400258000
|
trusted library allocation
|
page read and write
|
||
274AD31B000
|
remote allocation
|
page execute read
|
||
C9DEDFE000
|
unkown
|
page readonly
|
||
17145A02000
|
heap
|
page read and write
|
||
66C000764000
|
trusted library allocation
|
page read and write
|
||
9E70000
|
direct allocation
|
page read and write
|
||
260E27A0000
|
heap
|
page read and write
|
||
438C00230000
|
direct allocation
|
page read and write
|
||
2C00006D8000
|
trusted library allocation
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
66C000AB8000
|
trusted library allocation
|
page read and write
|
||
171800248000
|
trusted library allocation
|
page read and write
|
||
24401000
|
trusted library allocation
|
page read and write
|
||
6F700000
|
unkown
|
page readonly
|
||
5FE800294000
|
direct allocation
|
page read and write
|
||
2E123FC000
|
stack
|
page read and write
|
||
247800220000
|
trusted library allocation
|
page read and write
|
||
2443C000
|
trusted library allocation
|
page read and write
|
||
462400050000
|
trusted library allocation
|
page read and write
|
||
C9EEDFE000
|
unkown
|
page readonly
|
||
260E2755000
|
heap
|
page read and write
|
||
A4387FE000
|
stack
|
page read and write
|
||
66C0002A8000
|
trusted library allocation
|
page read and write
|
||
66C000304000
|
trusted library allocation
|
page read and write
|
||
6B200000
|
unkown
|
page readonly
|
||
171800284000
|
trusted library allocation
|
page read and write
|
||
2E12BFE000
|
unkown
|
page readonly
|
||
5A48002E4000
|
trusted library allocation
|
page read and write
|
||
274AD760000
|
trusted library allocation
|
page read and write
|
||
274AD389000
|
unclassified section
|
page read and write
|
||
603000090000
|
trusted library allocation
|
page read and write
|
||
9C20000
|
heap
|
page read and write
|
||
2C0000679000
|
trusted library allocation
|
page read and write
|
||
2E43000
|
heap
|
page read and write
|
||
4D8800254000
|
direct allocation
|
page read and write
|
||
6ACF2000
|
unkown
|
page execute read
|
||
2C0000B98000
|
trusted library allocation
|
page read and write
|
||
2C0000238000
|
trusted library allocation
|
page read and write
|
||
5A48002A0000
|
trusted library allocation
|
page read and write
|
||
274B02C9000
|
heap
|
page read and write
|
||
7C80000
|
direct allocation
|
page read and write
|
||
462400100000
|
trusted library allocation
|
page read and write
|
||
A428FFE000
|
unkown
|
page readonly
|
||
7324000
|
direct allocation
|
page read and write
|
||
A430FFE000
|
unkown
|
page readonly
|
||
603000038000
|
trusted library allocation
|
page read and write
|
||
66C000924000
|
trusted library allocation
|
page read and write
|
||
24460000
|
trusted library allocation
|
page read and write
|
||
56B00026C000
|
trusted library allocation
|
page read and write
|
||
FC00298000
|
direct allocation
|
page read and write
|
||
2CC4002C4000
|
trusted library allocation
|
page read and write
|
||
20DC00161000
|
trusted library allocation
|
page read and write
|
||
6030000EC000
|
trusted library allocation
|
page read and write
|
||
B59000
|
unkown
|
page readonly
|
||
3A0C00250000
|
trusted library allocation
|
page read and write
|
||
66C0002C8000
|
trusted library allocation
|
page read and write
|
||
6B1B0000
|
unkown
|
page readonly
|
||
2C0000AAC000
|
trusted library allocation
|
page read and write
|
||
20DC00221000
|
trusted library allocation
|
page read and write
|
||
1718002A0000
|
trusted library allocation
|
page read and write
|
||
2C0000B40000
|
trusted library allocation
|
page read and write
|
||
3A0C0020C000
|
trusted library allocation
|
page read and write
|
||
6B6DD000
|
unkown
|
page execute read
|
||
2E4A000
|
heap
|
page read and write
|
||
2C00004F4000
|
trusted library allocation
|
page read and write
|
||
260E2796000
|
heap
|
page read and write
|
||
C9E6DFD000
|
stack
|
page read and write
|
||
2C00004C0000
|
trusted library allocation
|
page read and write
|
||
66C0008EC000
|
trusted library allocation
|
page read and write
|
||
46240012C000
|
trusted library allocation
|
page read and write
|
||
260E2613000
|
heap
|
page read and write
|
||
4BC5000
|
direct allocation
|
page read and write
|
||
7042000
|
heap
|
page read and write
|
||
34000264000
|
trusted library allocation
|
page read and write
|
||
4D880031C000
|
direct allocation
|
page read and write
|
||
1607D002000
|
heap
|
page read and write
|
||
2C0000D08000
|
trusted library allocation
|
page read and write
|
||
2EAC000
|
heap
|
page read and write
|
||
C9F2DFE000
|
unkown
|
page readonly
|
||
6E5A1000
|
unkown
|
page read and write
|
||
462400220000
|
trusted library allocation
|
page read and write
|
||
5A4800201000
|
trusted library allocation
|
page read and write
|
||
4D880031A000
|
direct allocation
|
page read and write
|
||
6B163000
|
unkown
|
page execute read
|
||
A4307FE000
|
stack
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
66C000624000
|
trusted library allocation
|
page read and write
|
||
2F0D000
|
direct allocation
|
page execute and read and write
|
||
4624001F0000
|
trusted library allocation
|
page read and write
|
||
66C00060C000
|
trusted library allocation
|
page read and write
|
||
24470000
|
trusted library allocation
|
page read and write
|
||
2C0000234000
|
trusted library allocation
|
page read and write
|
||
247800334000
|
trusted library allocation
|
page read and write
|
||
56B000106000
|
trusted library allocation
|
page read and write
|
||
171800278000
|
trusted library allocation
|
page read and write
|
||
67D0002B4000
|
direct allocation
|
page read and write
|
||
69A800220000
|
trusted library allocation
|
page read and write
|
||
878C000
|
stack
|
page read and write
|
||
2C0000744000
|
trusted library allocation
|
page read and write
|
||
6B242000
|
unkown
|
page execute read
|
||
462400268000
|
trusted library allocation
|
page read and write
|
||
340002C8000
|
trusted library allocation
|
page read and write
|
||
5A48002D4000
|
trusted library allocation
|
page read and write
|
||
20DC00201000
|
trusted library allocation
|
page read and write
|
||
211E7FE0000
|
unclassified section
|
page read and write
|
||
C9DBDFE000
|
unkown
|
page readonly
|
||
9C0F000
|
stack
|
page read and write
|
||
2C0000150000
|
trusted library allocation
|
page read and write
|
||
7EB0000
|
direct allocation
|
page read and write
|
||
FC00248000
|
direct allocation
|
page read and write
|
||
274AD902000
|
heap
|
page read and write
|
||
2C0000B5C000
|
trusted library allocation
|
page read and write
|
||
7ABF000
|
stack
|
page read and write
|
||
1607D000000
|
heap
|
page read and write
|
||
247800408000
|
trusted library allocation
|
page read and write
|
||
85BF000
|
stack
|
page read and write
|
||
6AF54000
|
unkown
|
page execute read
|
||
63B400240000
|
trusted library allocation
|
page read and write
|
||
4D880021C000
|
direct allocation
|
page read and write
|
||
260E0780000
|
heap
|
page readonly
|
||
2F64000
|
heap
|
page read and write
|
||
2C0000D40000
|
trusted library allocation
|
page read and write
|
||
7B380040C000
|
trusted library allocation
|
page read and write
|
||
FC00230000
|
direct allocation
|
page read and write
|
||
247800210000
|
trusted library allocation
|
page read and write
|
||
6B000000
|
unkown
|
page readonly
|
||
6E150000
|
unkown
|
page readonly
|
||
4D88002E0000
|
direct allocation
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
34000210000
|
trusted library allocation
|
page read and write
|
||
2C0000357000
|
trusted library allocation
|
page read and write
|
||
6B024000
|
unkown
|
page execute read
|
||
6AF40000
|
unkown
|
page readonly
|
||
C0D77FB000
|
stack
|
page read and write
|
||
4D8800220000
|
direct allocation
|
page read and write
|
||
6E385000
|
unkown
|
page readonly
|
||
6B161000
|
unkown
|
page read and write
|
||
20DC001C8000
|
trusted library allocation
|
page read and write
|
||
4D880020C000
|
direct allocation
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
56B000164000
|
trusted library allocation
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
32240010000
|
trusted library allocation
|
page read and write
|
||
7B3800270000
|
trusted library allocation
|
page read and write
|
||
46240013C000
|
trusted library allocation
|
page read and write
|
||
FC002B4000
|
direct allocation
|
page read and write
|
||
3A0C00284000
|
trusted library allocation
|
page read and write
|
||
69A8002C8000
|
trusted library allocation
|
page read and write
|
||
247800274000
|
trusted library allocation
|
page read and write
|
||
211E845A000
|
heap
|
page read and write
|
||
6B6D8000
|
unkown
|
page execute read
|
||
24780026C000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
direct allocation
|
page read and write
|
||
C9E75FE000
|
unkown
|
page readonly
|
||
17145702000
|
heap
|
page read and write
|
||
69A800344000
|
trusted library allocation
|
page read and write
|
||
6AC82000
|
unkown
|
page execute read
|
||
66C0002E4000
|
trusted library allocation
|
page read and write
|
||
211E8056000
|
heap
|
page read and write
|
||
4D8800212000
|
direct allocation
|
page read and write
|
||
56B000114000
|
trusted library allocation
|
page read and write
|
||
C9E25FB000
|
stack
|
page read and write
|
||
34000358000
|
trusted library allocation
|
page read and write
|
||
2C00007E4000
|
trusted library allocation
|
page read and write
|
||
2E74000
|
heap
|
page read and write
|
||
63B400238000
|
trusted library allocation
|
page read and write
|
||
3A0C00201000
|
trusted library allocation
|
page read and write
|
||
2C0000656000
|
trusted library allocation
|
page read and write
|
||
2C00007A8000
|
trusted library allocation
|
page read and write
|
||
FC00234000
|
direct allocation
|
page read and write
|
||
211E8002000
|
heap
|
page read and write
|
||
260E0680000
|
heap
|
page read and write
|
||
2CC400220000
|
trusted library allocation
|
page read and write
|
||
34000237000
|
trusted library allocation
|
page read and write
|
||
7B3800244000
|
trusted library allocation
|
page read and write
|
||
274AD400000
|
heap
|
page read and write
|
||
C9F3DFE000
|
unkown
|
page readonly
|
||
56B000170000
|
trusted library allocation
|
page read and write
|
||
C9D2DFE000
|
unkown
|
page readonly
|
||
6B69C000
|
unkown
|
page execute read
|
||
274AD290000
|
unclassified section
|
page readonly
|
||
2CC400294000
|
trusted library allocation
|
page read and write
|
||
5FE800288000
|
direct allocation
|
page read and write
|
||
274AD3F0000
|
heap
|
page read and write
|
||
66C0006AC000
|
trusted library allocation
|
page read and write
|
||
63B4002BC000
|
trusted library allocation
|
page read and write
|
||
2C0000283000
|
trusted library allocation
|
page read and write
|
||
2C0000238000
|
trusted library allocation
|
page read and write
|
||
7033000
|
heap
|
page read and write
|
||
211E8424000
|
heap
|
page read and write
|
||
6030000E4000
|
trusted library allocation
|
page read and write
|
||
2E173FE000
|
stack
|
page read and write
|
||
C9D65FE000
|
stack
|
page read and write
|
||
2C0000338000
|
trusted library allocation
|
page read and write
|
||
56B000280000
|
trusted library allocation
|
page read and write
|
||
2EF7000
|
heap
|
page read and write
|
||
247800370000
|
trusted library allocation
|
page read and write
|
||
63B400220000
|
trusted library allocation
|
page read and write
|
||
C9D25FC000
|
stack
|
page read and write
|
||
6E19E000
|
unkown
|
page read and write
|
||
340002B8000
|
trusted library allocation
|
page read and write
|
||
1E209413000
|
heap
|
page read and write
|
||
C0E1FFE000
|
unkown
|
page readonly
|
||
2C000045A000
|
trusted library allocation
|
page read and write
|
||
2C00006D8000
|
trusted library allocation
|
page read and write
|
||
260E0800000
|
heap
|
page read and write
|
||
67D0002B0000
|
direct allocation
|
page read and write
|
||
171800264000
|
trusted library allocation
|
page read and write
|
||
4D8800304000
|
direct allocation
|
page read and write
|
||
66C0006C4000
|
trusted library allocation
|
page read and write
|
||
56B000001000
|
trusted library allocation
|
page read and write
|
||
2C0000544000
|
trusted library allocation
|
page read and write
|
||
63B4002C8000
|
trusted library allocation
|
page read and write
|
||
2C000066D000
|
trusted library allocation
|
page read and write
|
||
6AF51000
|
unkown
|
page read and write
|
||
6030000A4000
|
trusted library allocation
|
page read and write
|
||
6AC41000
|
unkown
|
page execute read
|
||
66C0003B6000
|
trusted library allocation
|
page read and write
|
||
EB30DFD000
|
stack
|
page read and write
|
||
67D000294000
|
direct allocation
|
page read and write
|
||
462400118000
|
trusted library allocation
|
page read and write
|
||
69A800334000
|
trusted library allocation
|
page read and write
|
||
6F721000
|
unkown
|
page read and write
|
||
6ACB0000
|
unkown
|
page readonly
|
||
17148920000
|
unclassified section
|
page readonly
|
||
2E62000
|
heap
|
page read and write
|
||
66C00040C000
|
trusted library allocation
|
page read and write
|
||
2E44000
|
heap
|
page read and write
|
||
260E2739000
|
heap
|
page read and write
|
||
6BF62000
|
unkown
|
page read and write
|
||
211E7F50000
|
heap
|
page readonly
|
||
211E8454000
|
heap
|
page read and write
|
||
4D8800264000
|
direct allocation
|
page read and write
|
||
260E081D000
|
heap
|
page read and write
|
||
2CC4002B8000
|
trusted library allocation
|
page read and write
|
||
5FE800201000
|
direct allocation
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
66C000AB4000
|
trusted library allocation
|
page read and write
|
||
5A480026C000
|
trusted library allocation
|
page read and write
|
||
B51000
|
unkown
|
page readonly
|
||
2E69000
|
heap
|
page read and write
|
||
2C00001DC000
|
trusted library allocation
|
page read and write
|
||
2F03000
|
direct allocation
|
page execute and read and write
|
||
5FE800264000
|
direct allocation
|
page read and write
|
||
2E99000
|
heap
|
page read and write
|
||
63B4002A0000
|
trusted library allocation
|
page read and write
|
||
211E7FC0000
|
trusted library allocation
|
page read and write
|
||
66C0006A0000
|
trusted library allocation
|
page read and write
|
||
260E5D02000
|
heap
|
page read and write
|
||
5FE8002B0000
|
direct allocation
|
page read and write
|
||
67D0002D0000
|
direct allocation
|
page read and write
|
||
FC002B0000
|
direct allocation
|
page read and write
|
||
2C0000C64000
|
trusted library allocation
|
page read and write
|
||
7CF1000
|
direct allocation
|
page read and write
|
||
4B9B000
|
stack
|
page read and write
|
||
72DE000
|
stack
|
page read and write
|
||
2C0000601000
|
trusted library allocation
|
page read and write
|
||
438C00254000
|
direct allocation
|
page read and write
|
||
2E4A000
|
heap
|
page read and write
|
||
5A48002B4000
|
trusted library allocation
|
page read and write
|
||
6C7B0000
|
unkown
|
page readonly
|
||
1607CF50000
|
trusted library allocation
|
page read and write
|
||
46240025C000
|
trusted library allocation
|
page read and write
|
||
211E842B000
|
heap
|
page read and write
|
||
462400260000
|
trusted library allocation
|
page read and write
|
||
66C000A01000
|
trusted library allocation
|
page read and write
|
||
7C7F000
|
stack
|
page read and write
|
||
9C10000
|
heap
|
page execute and read and write
|
||
66C00092C000
|
trusted library allocation
|
page read and write
|
||
56B000342000
|
trusted library allocation
|
page read and write
|
||
211E8000000
|
heap
|
page read and write
|
||
6030000AC000
|
trusted library allocation
|
page read and write
|
||
260E7AC2000
|
trusted library allocation
|
page read and write
|
||
6CBA7000
|
unkown
|
page readonly
|
||
2478002B8000
|
trusted library allocation
|
page read and write
|
||
3A0C0029C000
|
trusted library allocation
|
page read and write
|
||
C9CFDFE000
|
unkown
|
page readonly
|
||
247800308000
|
trusted library allocation
|
page read and write
|
||
2C0000768000
|
trusted library allocation
|
page read and write
|
||
2C0000378000
|
trusted library allocation
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
2C0000080000
|
trusted library allocation
|
page read and write
|
||
C9D55FE000
|
stack
|
page read and write
|
||
788C00201000
|
direct allocation
|
page read and write
|
||
67D000244000
|
direct allocation
|
page read and write
|
||
86C0000
|
direct allocation
|
page read and write
|
||
438C00234000
|
direct allocation
|
page read and write
|
||
2C0000044000
|
trusted library allocation
|
page read and write
|
||
2C000038C000
|
trusted library allocation
|
page read and write
|
||
2C0000CF4000
|
trusted library allocation
|
page read and write
|
||
3A0C00260000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
2E8B000
|
heap
|
page read and write
|
||
274AD330000
|
unclassified section
|
page readonly
|
||
260E0927000
|
heap
|
page read and write
|
||
2C0000689000
|
trusted library allocation
|
page read and write
|
||
56B00038C000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
1607CE30000
|
heap
|
page read and write
|
||
56B000381000
|
trusted library allocation
|
page read and write
|
||
56B0001C4000
|
trusted library allocation
|
page read and write
|
||
66C00028C000
|
trusted library allocation
|
page read and write
|
||
2C000001E000
|
trusted library allocation
|
page read and write
|
||
2C0000980000
|
trusted library allocation
|
page read and write
|
||
C9E0DFE000
|
unkown
|
page readonly
|
||
2C00000E8000
|
trusted library allocation
|
page read and write
|
||
74B0000
|
unkown
|
page readonly
|
||
6AFE3000
|
unkown
|
page readonly
|
||
2C0000700000
|
trusted library allocation
|
page read and write
|
||
211E7E80000
|
heap
|
page read and write
|
||
6BF51000
|
unkown
|
page read and write
|
||
20DC001CE000
|
trusted library allocation
|
page read and write
|
||
260E2744000
|
heap
|
page read and write
|
||
2C000026C000
|
trusted library allocation
|
page read and write
|
||
C9EE5FD000
|
stack
|
page read and write
|
||
2C0000CDC000
|
trusted library allocation
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
6B237000
|
unkown
|
page readonly
|
||
69A80031C000
|
trusted library allocation
|
page read and write
|
||
6B111000
|
unkown
|
page read and write
|
||
66C00073C000
|
trusted library allocation
|
page read and write
|
||
260E08C3000
|
heap
|
page read and write
|
||
56B0000DE000
|
trusted library allocation
|
page read and write
|
||
2C000081C000
|
trusted library allocation
|
page read and write
|
||
66C000944000
|
trusted library allocation
|
page read and write
|
||
2C0000984000
|
trusted library allocation
|
page read and write
|
||
6AD26000
|
unkown
|
page readonly
|
||
1718002B8000
|
trusted library allocation
|
page read and write
|
||
6BF3C000
|
unkown
|
page readonly
|
||
2C0000B68000
|
trusted library allocation
|
page read and write
|
||
C9D8DFE000
|
unkown
|
page readonly
|
||
69A800288000
|
trusted library allocation
|
page read and write
|
||
2C0000BD8000
|
trusted library allocation
|
page read and write
|
||
66C000910000
|
trusted library allocation
|
page read and write
|
||
34000344000
|
trusted library allocation
|
page read and write
|
||
FC00210000
|
direct allocation
|
page read and write
|
||
2CC4002A8000
|
trusted library allocation
|
page read and write
|
||
66C00074C000
|
trusted library allocation
|
page read and write
|
||
2F0B000
|
direct allocation
|
page read and write
|
||
C9F05FD000
|
stack
|
page read and write
|
||
6030000C4000
|
trusted library allocation
|
page read and write
|
||
3A0C00254000
|
trusted library allocation
|
page read and write
|
||
20DC00141000
|
trusted library allocation
|
page read and write
|
||
7CD0000
|
direct allocation
|
page execute and read and write
|
||
2C0000998000
|
trusted library allocation
|
page read and write
|
||
66C000730000
|
trusted library allocation
|
page read and write
|
||
66C00074C000
|
trusted library allocation
|
page read and write
|
||
A42B7FE000
|
stack
|
page read and write
|
||
56B00023C000
|
trusted library allocation
|
page read and write
|
||
6B241000
|
unkown
|
page read and write
|
||
66C000634000
|
trusted library allocation
|
page read and write
|
||
A42F7FD000
|
stack
|
page read and write
|
||
2C0000584000
|
trusted library allocation
|
page read and write
|
||
6AC60000
|
unkown
|
page readonly
|
||
2ED1000
|
heap
|
page read and write
|
||
74A0000
|
direct allocation
|
page read and write
|
||
2E103FE000
|
stack
|
page read and write
|
||
2C0000944000
|
trusted library allocation
|
page read and write
|
||
2478002F4000
|
trusted library allocation
|
page read and write
|
||
2E42000
|
heap
|
page read and write
|
||
7B3800284000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
462400090000
|
trusted library allocation
|
page read and write
|
||
211E83CA000
|
unclassified section
|
page read and write
|
||
EB31DFE000
|
stack
|
page read and write
|
||
2E3F000
|
heap
|
page read and write
|
||
56B00025C000
|
trusted library allocation
|
page read and write
|
||
4D8800240000
|
direct allocation
|
page read and write
|
||
67D000234000
|
direct allocation
|
page read and write
|
||
2C0000960000
|
trusted library allocation
|
page read and write
|
||
260E2765000
|
heap
|
page read and write
|
||
66C0003B0000
|
trusted library allocation
|
page read and write
|
||
2C0000E28000
|
trusted library allocation
|
page read and write
|
||
56B0000E8000
|
trusted library allocation
|
page read and write
|
||
244A4000
|
trusted library allocation
|
page read and write
|
||
2C0000D60000
|
trusted library allocation
|
page read and write
|
||
85CE000
|
heap
|
page read and write
|
||
46240000C000
|
trusted library allocation
|
page read and write
|
||
69A800418000
|
trusted library allocation
|
page read and write
|
||
5FE8002AC000
|
direct allocation
|
page read and write
|
||
171800274000
|
trusted library allocation
|
page read and write
|
||
340002E4000
|
trusted library allocation
|
page read and write
|
||
1607D02B000
|
heap
|
page read and write
|
||
4D8800284000
|
direct allocation
|
page read and write
|
||
56B000190000
|
trusted library allocation
|
page read and write
|
||
66C000A30000
|
trusted library allocation
|
page read and write
|
||
756C000
|
stack
|
page read and write
|
||
260E08AA000
|
heap
|
page read and write
|
||
211EB612000
|
trusted library allocation
|
page read and write
|
||
56B000148000
|
trusted library allocation
|
page read and write
|
||
788C00250000
|
direct allocation
|
page read and write
|
||
1718002B8000
|
trusted library allocation
|
page read and write
|
||
2C0000661000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
4B5BDFE000
|
stack
|
page read and write
|
||
247800401000
|
trusted library allocation
|
page read and write
|
||
260E092F000
|
heap
|
page read and write
|
||
C9E2DFE000
|
unkown
|
page readonly
|
||
788C002D0000
|
direct allocation
|
page read and write
|
||
274AD7A7000
|
unclassified section
|
page read and write
|
||
66C000314000
|
trusted library allocation
|
page read and write
|
||
6AF42000
|
unkown
|
page execute read
|
||
244C8000
|
trusted library allocation
|
page read and write
|
||
FC00284000
|
direct allocation
|
page read and write
|
||
5FE800210000
|
direct allocation
|
page read and write
|
||
56B000124000
|
trusted library allocation
|
page read and write
|
||
438C0023C000
|
direct allocation
|
page read and write
|
||
FC002E4000
|
direct allocation
|
page read and write
|
||
C0E07FE000
|
stack
|
page read and write
|
||
66C00039C000
|
trusted library allocation
|
page read and write
|
||
66C000264000
|
trusted library allocation
|
page read and write
|
||
2C0000DD4000
|
trusted library allocation
|
page read and write
|
||
7320000
|
direct allocation
|
page read and write
|
||
7B3800318000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
462400092000
|
trusted library allocation
|
page read and write
|
||
C9D4DFE000
|
unkown
|
page readonly
|
||
2C00009EC000
|
trusted library allocation
|
page read and write
|
||
462400168000
|
trusted library allocation
|
page read and write
|
||
2C0000798000
|
trusted library allocation
|
page read and write
|
||
2C00007D0000
|
trusted library allocation
|
page read and write
|
||
A436FFE000
|
unkown
|
page readonly
|
||
788C00274000
|
direct allocation
|
page read and write
|
||
1E20945F000
|
heap
|
page read and write
|
||
2C0000E0C000
|
trusted library allocation
|
page read and write
|
||
2C000018C000
|
trusted library allocation
|
page read and write
|
||
6F802000
|
unkown
|
page execute read
|
||
C9F55FE000
|
stack
|
page read and write
|
||
1E20941C000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
2C0000658000
|
trusted library allocation
|
page read and write
|
||
6FFF000
|
heap
|
page read and write
|
||
260E0928000
|
heap
|
page read and write
|
||
2CC400294000
|
trusted library allocation
|
page read and write
|
||
6E5A0000
|
unkown
|
page readonly
|
||
66C000AB0000
|
trusted library allocation
|
page read and write
|
||
2C0000A24000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
66C00061C000
|
trusted library allocation
|
page read and write
|
||
2C0000E40000
|
trusted library allocation
|
page read and write
|
||
3A0C00274000
|
trusted library allocation
|
page read and write
|
||
247800290000
|
trusted library allocation
|
page read and write
|
||
60300001C000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
heap
|
page read and write
|
||
69A8002F8000
|
trusted library allocation
|
page read and write
|
||
274B029D000
|
heap
|
page read and write
|
||
56B000192000
|
trusted library allocation
|
page read and write
|
||
66C000326000
|
trusted library allocation
|
page read and write
|
||
6B699000
|
unkown
|
page execute read
|
||
274AD4F7000
|
heap
|
page read and write
|
||
A42A7FE000
|
stack
|
page read and write
|
||
69A8002AC000
|
trusted library allocation
|
page read and write
|
||
438C00288000
|
direct allocation
|
page read and write
|
||
7720000
|
trusted library section
|
page readonly
|
||
66C00033C000
|
trusted library allocation
|
page read and write
|
||
274AD46C000
|
heap
|
page read and write
|
||
34000278000
|
trusted library allocation
|
page read and write
|
||
260E2755000
|
heap
|
page read and write
|
||
2CC400294000
|
trusted library allocation
|
page read and write
|
||
260E0878000
|
heap
|
page read and write
|
||
7B3800254000
|
trusted library allocation
|
page read and write
|
||
4624001A4000
|
trusted library allocation
|
page read and write
|
||
67D000274000
|
direct allocation
|
page read and write
|
||
211E8458000
|
heap
|
page read and write
|
||
B51000
|
unkown
|
page readonly
|
||
274AD6D0000
|
unclassified section
|
page readonly
|
||
2C0000518000
|
trusted library allocation
|
page read and write
|
||
260E2719000
|
heap
|
page read and write
|
||
C9EF5FC000
|
stack
|
page read and write
|
There are 1992 hidden memdumps, click here to show them.