IOC Report
Clear-TemplateSearch.b5003.SK048.ed.exe

loading gif

Files

File Path
Type
Category
Malicious
Clear-TemplateSearch.b5003.SK048.ed.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\History
SQLite 3.x database, last written using SQLite version 3043002, file counter 1, database pages 40, cookie 0x21, schema 4, UTF-8, version-valid-for 1
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\7zr.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-P0J9K.tmp\Clear-TemplateSearch.b5003.SK048.ed.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user~1\AppData\Local\Temp\is-ND9CL.tmp\chromium.7z (copy)
7-zip archive data, version 0.4
dropped
C:\Users\user~1\AppData\Local\Temp\is-ND9CL.tmp\clear.7z (copy)
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\007b0d76-28a3-436d-b3ab-b5452dfa769d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\7a286aef-89f8-44d8-89d0-a4cf9233363d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\BrowserMetrics\BrowserMetrics-664E2CBE-1D64.pma
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\03a0ca70-78f0-41d9-9d1b-a5cb6e1cf5c2.tmp
MS Windows icon resource - 13 icons, 8x8, 32 bits/pixel, 10x10, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\0f778b33-a4f4-4a85-acf8-e3163d1618ac.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\4fe1725e-8251-473e-8e53-28c413df9cb6.tmp
MS Windows icon resource - 13 icons, 8x8, 32 bits/pixel, 10x10, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\5f20f944-c4c6-40c1-8f7a-f50e224c4ec0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\71ccdf6c-cf14-42f4-98c9-965d60e94242.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\8d7f9856-6a31-4796-9001-d863b079b6f3.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\92621740-9ce4-414c-8639-9458514c3a01.tmp
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\99eb271e-e102-47bf-b51f-611a86084830.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Affiliation Database
SQLite 3.x database, last written using SQLite version 3043002, file counter 5, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Bookmarks (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\BrowsingTopicsSiteData
SQLite 3.x database, last written using SQLite version 3043002, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\BrowsingTopicsState (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Cache\Cache_Data\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Code Cache\webui_js\index
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Code Cache\webui_js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Code Cache\webui_js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\DIPS
SQLite 3.x database, last written using SQLite version 3043002, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\GCM Store\Encryption\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\GCM Store\Encryption\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\GCM Store\Encryption\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\GCM Store\Encryption\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Google Profile.ico (copy)
MS Windows icon resource - 13 icons, 8x8, 32 bits/pixel, 10x10, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Google Profile.ico~RF6bc645.TMP (copy)
MS Windows icon resource - 13 icons, 8x8, 32 bits/pixel, 10x10, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Google Profile.ico~RF6bda1b.TMP (copy)
MS Windows icon resource - 13 icons, 8x8, 32 bits/pixel, 10x10, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Login Data
SQLite 3.x database, last written using SQLite version 3043002, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Login Data For Account
SQLite 3.x database, last written using SQLite version 3043002, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3043002, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network\44eb9690-80f3-4918-b2f8-baac9da64af3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network\4cfa74cc-b63e-4bbc-bc5e-c9ea2bcd683e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network\4ecb2bb4-8da8-40e0-84e0-032bc1d329f1.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3043002, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network\Network Persistent State~RF6c16c6.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3043002, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network\SCT Auditing Pending Reports~RF6bc80a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3043002, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Network\b1cbbbae-fc24-415c-b6b8-afda2a25d13e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Preferences
ASCII text, with very long lines (417), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Preferences~RF6bea86.TMP (copy)
ASCII text, with very long lines (417), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Preferences~RF6c1196.TMP (copy)
ASCII text, with very long lines (417), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Preferences~RF6c1697.TMP (copy)
ASCII text, with very long lines (417), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Secure Preferences~RF6c1669.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\Database\000003.log
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\013888a1cda32b90_0
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\013888a1cda32b90_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\297ecea5cebb5dfe_0
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\297ecea5cebb5dfe_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\4cb013792b196a35_0
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\4cb013792b196a35_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\67a473248953641b_0
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\67a473248953641b_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\b6c28cea6ed9dfc1_0
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\ba23d8ecda68de77_0
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\d0757ff92c7cde0a_0
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\f1cdccba37924bda_0
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\f1cdccba37924bda_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\fa813c9ad67834ac_0
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\fa813c9ad67834ac_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\index
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index
PDP-11 overlaid pure executable not stripped
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index (copy)
PDP-11 overlaid pure executable not stripped
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RF6c1678.TMP (copy)
PDP-11 overlaid pure executable not stripped
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Session Storage\000003.log
data
modified
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Sessions\Session_13360872903789425
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Shared Dictionary\cache\index
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Shared Dictionary\cache\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Shared Dictionary\cache\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Shared Dictionary\db
SQLite 3.x database, last written using SQLite version 3043002, file counter 9, database pages 11, cookie 0x8, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Shortcuts
SQLite 3.x database, last written using SQLite version 3043002, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Site Characteristics Database\000003.log
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Sync Extension Settings\hnaldbmaaihebfkndlpogamgccddckad\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Sync Extension Settings\hnaldbmaaihebfkndlpogamgccddckad\000003.log
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Sync Extension Settings\hnaldbmaaihebfkndlpogamgccddckad\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Sync Extension Settings\hnaldbmaaihebfkndlpogamgccddckad\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Sync Extension Settings\hnaldbmaaihebfkndlpogamgccddckad\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3038005, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\Web Data
SQLite 3.x database, last written using SQLite version 3043002, page size 2048, file counter 3, database pages 63, cookie 0x26, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\WebStorage\QuotaManager
SQLite 3.x database, last written using SQLite version 3043002, file counter 1, database pages 10, cookie 0x7, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\a976122a-61f4-41ca-8348-ace3e5b766e9.tmp
MS Windows icon resource - 13 icons, 8x8, 32 bits/pixel, 10x10, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\d8fef916-68db-4e38-b965-eee00e1db044.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\databases\Databases.db
SQLite 3.x database, last written using SQLite version 3043002, file counter 1, database pages 7, cookie 0x4, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\de4adea9-f498-41ab-919c-934136cbc100.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\f93eb13f-7b6b-435f-9d17-b451bcd6dba5.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3043002, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\power_bookmarks\PowerBookmarks.db
SQLite 3.x database, last written using SQLite version 3043002, file counter 2, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Default\trusted_vault.pb (copy)
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Local State~RF6be99c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Local State~RF6c1669.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Local State~RF6c1697.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\a0d62ee2-df6d-467c-87aa-cb5593f71d74.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\c105f5d1-fe52-4dcd-8b35-fd64df211ddb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\first_party_sets.db
SQLite 3.x database, last written using SQLite version 3043002, file counter 1, database pages 12, cookie 0xa, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\ClearBrowser\User Data\segmentation_platform\ukm_db
SQLite 3.x database, last written using SQLite version 3043002, file counter 6, database pages 7, cookie 0x6, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Clear\app_profile.json
JSON data
dropped
C:\Users\user\AppData\Local\Clear\user_config.json
JSON data
dropped
C:\Users\user\AppData\Local\Clear\user_database.db
data
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Clear.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\120.0.6099.199.manifest (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\First Run (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\MEIPreload\is-3MPE6.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\MEIPreload\is-DUT82.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\MEIPreload\manifest.json (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\MEIPreload\preloaded_data.pb (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\chrome.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\chrome_100_percent.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\chrome_200_percent.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\chrome_elf.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\chrome_proxy.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\chrome_pwa_launcher.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clear.native-manifest.json
JSON data
modified
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\elevation_service.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\icudtl.dat (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-4C1O9.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-4P04C.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-63952.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-7DLNC.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-988PC.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-9R8D9.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-9V0UG.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-DPM2J.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-JTT37.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-LI5F9.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-MBJUT.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-MH764.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-OVDJG.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-Q3F4Q.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-QA32S.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-RVMTK.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\is-U1PHM.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\libEGL.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\libGLESv2.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\af.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\am.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\ar.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\bg.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\bn.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\ca.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\cs.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\da.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\de.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\el.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\en-GB.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\en-US.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\es-419.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\es.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\et.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\fa.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\fi.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\fil.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\fr.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\gu.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\he.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\hi.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\hr.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\hu.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\id.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-0CEEJ.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-0HF7O.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-15IS8.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-27FP4.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-27P7L.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-2N02G.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-2T3UU.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-4LO8V.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-5DN1N.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-6660E.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-79C42.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-7ABIO.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-7H3EJ.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-8H4JF.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-AH8ER.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-AJRT8.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-AN74H.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-B7A33.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-C1S8J.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-CDLUD.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-E4IU5.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-EVGMA.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-EVGVS.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-F3EF8.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-F8KS1.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-FMGA0.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-GB0M2.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-H9AH2.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-HIFRC.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-IF5OM.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-JDM55.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-K5CTN.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-KTV82.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-L53JO.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-L8Q9U.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-LMV7E.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-MK99A.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-MNTM8.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-MPG1E.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-N2SFF.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-N3IOC.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-NVAIU.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-NVHS2.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-PHCCM.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-PRD98.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-Q16TB.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-QJSJG.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-REI0K.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-RL3FK.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-RQ2US.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-SS759.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-UJRHE.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-V8EBL.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-VBQ8F.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\is-VK41I.tmp
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\it.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\ja.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\kn.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\ko.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\lt.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\lv.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\ml.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\mr.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\ms.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\nb.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\nl.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\pl.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\pt-BR.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\pt-PT.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\ro.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\ru.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\sk.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\sl.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\sr.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\sv.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\sw.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\ta.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\te.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\th.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\tr.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\uk.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\ur.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\vi.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\zh-CN.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\locales\zh-TW.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\master_preferences
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\master_preferences.tmpl (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\notification_helper.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\resources.pak (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\resources\inspector_overlay\inspector_overlay_resources.grd (copy)
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\resources\inspector_overlay\is-K8Q9D.tmp
Unicode text, UTF-8 text, with very long lines (65532), with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\resources\inspector_overlay\is-M57D6.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\resources\inspector_overlay\main.js (copy)
Unicode text, UTF-8 text, with very long lines (65532), with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\v8_context_snapshot.bin (copy)
data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.Remoting.Native.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.Remoting.Native.exe.config (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.Remoting.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.application (copy)
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (550), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.exe.config (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.exe.manifest (copy)
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (504), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Greensoft.TlvLib.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Hardcodet.NotifyIcon.Wpf.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Humanizer.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\LiteDB.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Microsoft.Bcl.AsyncInterfaces.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Microsoft.Extensions.DependencyInjection.Abstractions.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Microsoft.Extensions.DependencyInjection.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Microsoft.Toolkit.Uwp.Notifications.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Microsoft.Win32.Primitives.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Microsoft.Win32.TaskScheduler.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Newtonsoft.Json.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\SharpClipboard.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\SharpVectors.Converters.Wpf.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\SharpVectors.Core.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\SharpVectors.Css.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\SharpVectors.Dom.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\SharpVectors.Model.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\SharpVectors.Rendering.Gdi.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\SharpVectors.Rendering.Wpf.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\SharpVectors.Runtime.Wpf.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.AppContext.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Collections.Concurrent.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Collections.NonGeneric.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Collections.Specialized.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Collections.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.ComponentModel.EventBasedAsync.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.ComponentModel.Primitives.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.ComponentModel.TypeConverter.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.ComponentModel.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Console.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Data.Common.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Data.SQLite.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Diagnostics.Contracts.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Diagnostics.Debug.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Diagnostics.FileVersionInfo.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Diagnostics.Process.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Diagnostics.StackTrace.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Diagnostics.TextWriterTraceListener.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Diagnostics.Tools.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Diagnostics.TraceSource.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Diagnostics.Tracing.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Drawing.Primitives.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Dynamic.Runtime.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Globalization.Calendars.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Globalization.Extensions.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Globalization.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.IO.Compression.ZipFile.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.IO.Compression.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.IO.FileSystem.DriveInfo.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.IO.FileSystem.Primitives.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.IO.FileSystem.Watcher.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.IO.FileSystem.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.IO.IsolatedStorage.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.IO.MemoryMappedFiles.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.IO.Pipes.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.IO.UnmanagedMemoryStream.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.IO.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Linq.Expressions.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Linq.Parallel.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Linq.Queryable.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Linq.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Net.Http.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Net.NameResolution.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Net.NetworkInformation.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Net.Ping.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Net.Primitives.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Net.Requests.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Net.Security.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Net.Sockets.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Net.WebHeaderCollection.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Net.WebSockets.Client.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Net.WebSockets.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.ObjectModel.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Reflection.Extensions.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Reflection.Primitives.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Reflection.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Resources.Reader.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Resources.ResourceManager.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Resources.Writer.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.CompilerServices.Unsafe.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.CompilerServices.VisualC.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.Extensions.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.Handles.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.InteropServices.RuntimeInformation.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.InteropServices.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.Numerics.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.Serialization.Formatters.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.Serialization.Json.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.Serialization.Primitives.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.Serialization.Xml.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Runtime.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Security.Claims.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Security.Cryptography.Algorithms.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Security.Cryptography.Csp.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Security.Cryptography.Encoding.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Security.Cryptography.Primitives.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Security.Cryptography.X509Certificates.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Security.Principal.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Security.SecureString.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Text.Encoding.Extensions.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Text.Encoding.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Text.RegularExpressions.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Threading.Overlapped.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Threading.Tasks.Extensions.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Threading.Tasks.Parallel.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Threading.Tasks.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Threading.Thread.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Threading.ThreadPool.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Threading.Timer.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Threading.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.ValueTuple.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Xml.ReaderWriter.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Xml.XDocument.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Xml.XPath.XDocument.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Xml.XPath.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Xml.XmlDocument.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\System.Xml.XmlSerializer.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Uninst\Networking.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Uninst\is-K585J.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\WpfAppBar.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\WpfScreenHelper.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\app_profile.json (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\css\app.29e34c24.css (copy)
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\css\is-AHE4J.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\favicon.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\arrow-left.png (copy)
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\arrow-right.png (copy)
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\back-light.png (copy)
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\back.png (copy)
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\breakfast.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\camera-light.14f45916.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\camera.cc7b8dcf.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\chicken.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\clipboard-light.1026c11e.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\clipboard.c4755019.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\close-light.png (copy)
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\close.png (copy)
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\dinner.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\ers-generic-ico.png (copy)
PNG image data, 299 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\files-light.675f9318.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\files.2205c6a9.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\google.png (copy)
PNG image data, 40 x 41, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\healthy.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\apps-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\background-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\background.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\bookmark-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\bookmark.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\calculator-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\calculator.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\compress-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\compress-win11-light.png (copy)
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\compress-win11.png (copy)
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\compress.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\doctopdf-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\doctopdf-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\doctopdf-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\doctopdf.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\exceltopdf-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\exceltopdf-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\exceltopdf-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\exceltopdf.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\file-explorer-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\file-explorer.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\home-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\incognito-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-0R5K4.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-163O0.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-16J2V.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-1AIOP.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-21JPS.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-2QM69.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-337TV.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-38E01.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-3UOJ8.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-54H94.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-5DNPF.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-5MQQG.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-60C4F.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-65GDG.tmp
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-6KCQO.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-6V8G9.tmp
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-81CAI.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-9TBTO.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-9VAV3.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-ABC5U.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-AFD2L.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-AFHUH.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-AJ9S0.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-APGMR.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-AVKHQ.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-BFOO5.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-BG1CG.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-BQC1S.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-BVI4O.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-D0FVC.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-E0NIK.tmp
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-E4OJU.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-E7PVP.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-E9IR4.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-G98FI.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-GF8AV.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-H44OV.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-HKEK0.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-IA66R.tmp
PNG image data, 179 x 178, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-IH7H9.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-IK7D7.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-IT3A1.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-JHJSB.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-JSRKL.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-KJ9D1.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-LSMVV.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-MJORM.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-MU0N9.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-NI5AG.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-OEF2I.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-PPAE1.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-Q2BG1.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-QH7F8.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-QHPG9.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-QTG1H.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-QVOGO.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-RNR4K.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-S3TFQ.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-S935C.tmp
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-SNVTI.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-T0UT0.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-TQMGI.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-TU7B4.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-VC5L4.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-VLL8N.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\is-VRASL.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\jpgtopdf-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\jpgtopdf-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\jpgtopdf-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\jpgtopdf.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\linkout-light.png (copy)
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\linkout.png (copy)
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\menu-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\merge-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\merge-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\merge.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\mp10-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\mp10.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\newtab-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\newtab.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\notepad-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\notepad.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftodoc-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftodoc-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftodoc-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftodoc.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftoexcel-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftoexcel-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftoexcel-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftoexcel.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftoppt-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftoppt-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftoppt-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\pdftoppt.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\ppttopdf-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\ppttopdf-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\ppttopdf-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\ppttopdf.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\print-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\recycle-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\recycle.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\search-light.png (copy)
PNG image data, 179 x 178, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\search.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\snipping-tool-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\snipping-tool.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\speedtest-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\speedtest.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\splashed-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\icon\splashed.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-0F26A.tmp
PNG image data, 85 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-19JAM.tmp
PNG image data, 299 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-1HI56.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-1PPC2.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-2BLGI.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-3ARAD.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-3F3J4.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-5QIUK.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-8JPHF.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-8KGOT.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-8PN46.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-9C1A4.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-A5R30.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-ANGVQ.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-BPMOC.tmp
PNG image data, 40 x 41, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-BQTN2.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-C56MN.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-CF272.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-IOHQH.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-JLBT3.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-K0O0I.tmp
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-K80MD.tmp
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-KFJQ9.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-MA3IR.tmp
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-MLRGO.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-O70FC.tmp
PNG image data, 86 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-Q6Q9G.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-QNJPD.tmp
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-SAOJP.tmp
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\is-U8JGU.tmp
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\easyrecipesearch-light.png (copy)
PNG image data, 284 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\easyrecipesearch.png (copy)
PNG image data, 283 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\frompdftodoc.png (copy)
PNG image data, 367 x 368, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\is-50U29.tmp
PNG image data, 374 x 333, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\is-9TQO2.tmp
PNG image data, 365 x 365, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\is-BBP1P.tmp
PNG image data, 381 x 389, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\is-F5I0L.tmp
PNG image data, 368 x 367, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\is-GUQJS.tmp
PNG image data, 284 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\is-JRH00.tmp
PNG image data, 283 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\is-K5CNV.tmp
PNG image data, 367 x 368, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\manualslibrary.png (copy)
PNG image data, 365 x 365, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\mapsrch.png (copy)
PNG image data, 381 x 389, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\myofficex.png (copy)
PNG image data, 368 x 367, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\logo\tvsearch.png (copy)
PNG image data, 374 x 333, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\lunch.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\mic-light.ef89f88c.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\mic.0bbff27e.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\more-light.png (copy)
PNG image data, 86 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\more-light.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\more.png (copy)
PNG image data, 85 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\more.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\pork.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\search.ea2d187a.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\steak.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\vegetarian.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\img\warning_1.20159b81.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\index.html (copy)
HTML document, ASCII text, with very long lines (759), with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\is-2CL6G.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\is-JI2PF.tmp
HTML document, ASCII text, with very long lines (759), with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\js\app.3f57d9f7.js (copy)
ASCII text, with very long lines (14987)
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\js\app.3f57d9f7.js.map (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\js\chunk-vendors.f61cf75b.js (copy)
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\js\chunk-vendors.f61cf75b.js.map (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\js\is-3ARDE.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\js\is-ATEEL.tmp
ASCII text, with very long lines (14987)
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\js\is-JGDB3.tmp
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\appdrawer\js\is-VQD1M.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\css\app.29e34c24.css (copy)
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\css\is-41MM9.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\de\Microsoft.Win32.TaskScheduler.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\de\is-S9RD1.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\es\Microsoft.Win32.TaskScheduler.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\es\is-QDMU5.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\favicon.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\fr\Microsoft.Win32.TaskScheduler.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\fr\is-0FSFV.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\arrow-left.png (copy)
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\arrow-right.png (copy)
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\back-light.png (copy)
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\back.png (copy)
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\breakfast.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\camera-light.14f45916.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\camera.cc7b8dcf.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\chicken.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\clipboard-light.1026c11e.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\clipboard.c4755019.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\close-light.png (copy)
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\close.png (copy)
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\dinner.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\ers-generic-ico.png (copy)
PNG image data, 299 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\files-light.675f9318.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\files.2205c6a9.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\google.png (copy)
PNG image data, 40 x 41, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\healthy.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\apps-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\background-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\background.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\bookmark-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\bookmark.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\calculator-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\calculator.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\compress-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\compress-win11-light.png (copy)
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\compress-win11.png (copy)
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\compress.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\doctopdf-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\doctopdf-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\doctopdf-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\doctopdf.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\exceltopdf-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\exceltopdf-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\exceltopdf-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\exceltopdf.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\file-explorer-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\file-explorer.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\home-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\incognito-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-0DQIV.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-17J5V.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-1DPNO.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-1PR95.tmp
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-1SPA4.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-2N64B.tmp
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-2SOBD.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-4E296.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-4KP7A.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-5DUKB.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-6DG0I.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-6RD8O.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-7430K.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-7PK47.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-8IDEO.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-8V8LL.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-9F6ES.tmp
PNG image data, 179 x 178, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-A5TH7.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-B248D.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-BC8V7.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-BFTH0.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-BO75B.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-BR3UT.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-C557A.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-D2G5U.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-DJOM6.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-EG600.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-ERGFR.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-F0QBO.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-FD5QO.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-H4BJ9.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-HGA4V.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-IBBG3.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-IKVG6.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-IRL4N.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-JOERO.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-K8K1F.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-L8P63.tmp
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-M29JA.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-MIBRV.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-MLCAR.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-N3BE9.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-N5U2P.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-NG3L8.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-NMNQT.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-O4OER.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-OEQ2G.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-OP5PG.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-OPIV0.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-OQ1HD.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-OV5EK.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-P9UFM.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-PFD3A.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-PM6T9.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-PRK97.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-PSJTF.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-QUQ08.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-R9MFJ.tmp
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-RJ28B.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-SV0L1.tmp
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-TFQL2.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-U1MET.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-U9AH5.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-UFPKD.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-V0MDB.tmp
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\is-V4DN4.tmp
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\jpgtopdf-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\jpgtopdf-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\jpgtopdf-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\jpgtopdf.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\linkout-light.png (copy)
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\linkout.png (copy)
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\menu-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\merge-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\merge-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\merge.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\mp10-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\mp10.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\newtab-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\newtab.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\notepad-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\notepad.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftodoc-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftodoc-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftodoc-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftodoc.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftoexcel-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftoexcel-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftoexcel-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftoexcel.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftoppt-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftoppt-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftoppt-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\pdftoppt.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\ppttopdf-ico.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\ppttopdf-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\ppttopdf-win11.png (copy)
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\ppttopdf.png (copy)
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\print-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\recycle-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\recycle.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\search-light.png (copy)
PNG image data, 179 x 178, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\search.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\snipping-tool-light.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\snipping-tool.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\speedtest-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\speedtest.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\splashed-light.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\icon\splashed.png (copy)
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-3CMRB.tmp
PNG image data, 85 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-635UV.tmp
PNG image data, 299 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-89BMA.tmp
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-8LDM9.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-8VDCI.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-9GS6D.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-AJ67B.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-AP755.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-CSVD7.tmp
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-DEUAK.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-EP43M.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-EQOPK.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-FAUNO.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-H6BE7.tmp
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-HA3E5.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-HN8C0.tmp
PNG image data, 40 x 41, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-J70O8.tmp
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-KL4JS.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-MBQAL.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-MQ5JQ.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-NT24L.tmp
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-Q1K5F.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-Q54P3.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-R55D9.tmp
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-S1KMI.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-SM8O3.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-TF78A.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-UGS2F.tmp
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-VCD0H.tmp
PNG image data, 86 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\is-VUIGO.tmp
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\easyrecipesearch-light.png (copy)
PNG image data, 284 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\easyrecipesearch.png (copy)
PNG image data, 283 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\frompdftodoc.png (copy)
PNG image data, 367 x 368, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\is-6GNUV.tmp
PNG image data, 283 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\is-77298.tmp
PNG image data, 284 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\is-BRFEJ.tmp
PNG image data, 368 x 367, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\is-EBIBR.tmp
PNG image data, 374 x 333, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\is-FRADC.tmp
PNG image data, 381 x 389, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\is-MVIMR.tmp
PNG image data, 367 x 368, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\is-QL86C.tmp
PNG image data, 365 x 365, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\manualslibrary.png (copy)
PNG image data, 365 x 365, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\mapsrch.png (copy)
PNG image data, 381 x 389, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\myofficex.png (copy)
PNG image data, 368 x 367, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\logo\tvsearch.png (copy)
PNG image data, 374 x 333, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\lunch.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\mic-light.ef89f88c.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\mic.0bbff27e.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\more-light.png (copy)
PNG image data, 86 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\more-light.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\more.png (copy)
PNG image data, 85 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\more.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\pork.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\search.ea2d187a.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\steak.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\vegetarian.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\img\warning_1.20159b81.svg (copy)
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\index.html (copy)
HTML document, ASCII text, with very long lines (759), with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-0286F.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-0HAIA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-10GPT.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-1KAF4.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-1MO1B.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-1T6AN.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-20DGM.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-23NVI.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-2A3U4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-2AFRA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-2KU8B.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-2L6P2.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-2MB65.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-2O16F.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-2QTC0.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-38F0A.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-3FN0L.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-40NNL.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-4BM0B.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-52JU8.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-5A214.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-5FC31.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-5HUBI.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-5S69T.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-6CHFM.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-6FJHT.tmp
HTML document, ASCII text, with very long lines (759), with no line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-6LN71.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-6SI67.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-6TBP4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-6TPNG.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-6VU9P.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-75V95.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-7I3RJ.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-7QFPE.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-7SD3T.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-8HG11.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-8N9GS.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (504), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-8OJM2.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-8UBLU.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-96JN4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-9E9TN.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-9GTP5.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-9S7BD.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-A2NCU.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-AI5I0.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-AMMB0.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-ARVMU.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-AS9AU.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-AT07R.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-B3VJL.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-B8O8E.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-C6SSC.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-CJA9H.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-D4FI6.tmp
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-D8F8K.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-DD01F.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-DKN5Q.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-DMRO6.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-DOH0U.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-ECL5N.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-EEO25.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-ETVL9.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-EV863.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-F4SJF.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-FA10R.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-G0CR4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-G4L6C.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-G7ELA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-GBL9Q.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-GDD25.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-GNMM8.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-GU2I5.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-HBD8O.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-HESRK.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-HHT9H.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-HHV6Q.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-HK51L.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-HM8L4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-I2HMI.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-I53AF.tmp
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (550), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-I7MF9.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-I8LB6.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-IHDF0.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-IPQI0.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-J8HOA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-K7VFE.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-KSNII.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-KVPU7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-L44T9.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-LJTH0.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-LPSKV.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-LTI51.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-MJB0T.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-MKAC5.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-MOF23.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-MRCU1.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-N3995.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-NFO05.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-O56GI.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-OFPQN.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-P1KJV.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-PCCLC.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-PJDAA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-PO9RP.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-PQ410.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-PT87J.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-R43LO.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-R6FTJ.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-R70VF.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-R83ND.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-RCDHE.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-RE807.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-RNFKH.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-S6HAT.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-S7D15.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-SNP6L.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-SR0IF.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-T0A69.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-T78L9.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-TA0F6.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-TQ5MQ.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-TQJI7.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-TQS09.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-UGLPU.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-UJRG2.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-UK4HH.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-UL8PG.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-UM03N.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-VJNDQ.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\is-VR258.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\it\Microsoft.Win32.TaskScheduler.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\it\is-07PID.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\js\app.3f57d9f7.js (copy)
ASCII text, with very long lines (14987)
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\js\app.3f57d9f7.js.map (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\js\chunk-vendors.f61cf75b.js (copy)
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\js\chunk-vendors.f61cf75b.js.map (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\js\is-5C0OE.tmp
ASCII text, with very long lines (14987)
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\js\is-5URJI.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\js\is-IL6EM.tmp
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\js\is-M1SGU.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\netstandard.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\pl\Microsoft.Win32.TaskScheduler.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\pl\is-JKUT7.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\ru\Microsoft.Win32.TaskScheduler.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\ru\is-OPN3R.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\x64\SQLite.Interop.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\x64\is-NUUK3.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\x86\SQLite.Interop.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\x86\is-0JKHJ.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\zh-CN\is-CJS2F.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\zh-Hant\Microsoft.Win32.TaskScheduler.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\zh-Hant\is-NMB8V.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\is-KSDTH.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\unins000.dat
InnoSetup Log Clear {D5806CCB-8635-4E7A-94FC-BF2723167477}, version 0x418, 186939 bytes, 226546\37\user, C:\Users\user\AppData\Local\Programs\
dropped
C:\Users\user\AppData\Local\Programs\Clear\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Clear\unins000.msg
InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
dropped
C:\Users\user\AppData\Local\Temp\181e6924-5f84-4292-b982-a9f2d599c9bd.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\1ca2af85-2913-4d00-8e59-d8367191bd9f.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\31e0119b-6b1a-49c4-a093-7c698de4022f.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\53226739-40a4-40a1-93a3-a1e0cbd442c9.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\ac5e0f54-bc5c-45d5-8ee1-ae9087f9da4c.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\b5e1b74e-ad78-42f0-8d20-e22590dcea94.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\c693a023-ba0b-4e3e-9285-9ce8b5f3f3d5.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\clearbrowser_topsites
SQLite 3.x database, last written using SQLite version 3038005, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\HtmlInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\120.0.6099.199.manifest
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\First Run
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\MEIPreload\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\MEIPreload\preloaded_data.pb
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\chrome.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\chrome_elf.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\chrome_proxy.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\chrome_pwa_launcher.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\clearbrowser.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\elevation_service.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\libEGL.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\libGLESv2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\af.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\am.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\ar.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\bg.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\bn.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\ca.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\cs.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\da.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\de.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\el.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\es.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\et.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\fa.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\fi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\fil.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\fr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\gu.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\he.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\hi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\hr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\hu.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\id.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\it.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\ja.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\kn.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\ko.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\lt.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\lv.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\ml.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\mr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\ms.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\nb.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\nl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\pl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\ro.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\ru.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\sk.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\sl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\sr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\sv.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\sw.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\ta.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\te.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\th.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\tr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\uk.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\ur.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\vi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\notification_helper.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\resources.pak
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\resources\inspector_overlay\inspector_overlay_resources.grd
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\resources\inspector_overlay\main.js
Unicode text, UTF-8 text, with very long lines (65532), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Chromium\master_preferences.tmpl
JSON data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Clear.Remoting.Native.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Clear.Remoting.Native.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Clear.Remoting.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Clear.application
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (550), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Clear.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Clear.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Clear.exe.manifest
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (504), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Greensoft.TlvLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Hardcodet.NotifyIcon.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Humanizer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\LiteDB.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Microsoft.Bcl.AsyncInterfaces.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Microsoft.Extensions.DependencyInjection.Abstractions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Microsoft.Extensions.DependencyInjection.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Microsoft.Toolkit.Uwp.Notifications.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Microsoft.Win32.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Microsoft.Win32.TaskScheduler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\SharpClipboard.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\SharpVectors.Converters.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\SharpVectors.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\SharpVectors.Css.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\SharpVectors.Dom.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\SharpVectors.Model.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\SharpVectors.Rendering.Gdi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\SharpVectors.Rendering.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\SharpVectors.Runtime.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.AppContext.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Collections.Concurrent.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Collections.NonGeneric.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Collections.Specialized.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Collections.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.ComponentModel.EventBasedAsync.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.ComponentModel.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.ComponentModel.TypeConverter.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.ComponentModel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Console.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Data.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Data.SQLite.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Diagnostics.Contracts.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Diagnostics.Debug.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Diagnostics.FileVersionInfo.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Diagnostics.Process.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Diagnostics.StackTrace.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Diagnostics.TextWriterTraceListener.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Diagnostics.Tools.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Diagnostics.TraceSource.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Diagnostics.Tracing.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Drawing.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Dynamic.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Globalization.Calendars.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Globalization.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Globalization.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.IO.Compression.ZipFile.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.IO.Compression.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.IO.FileSystem.DriveInfo.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.IO.FileSystem.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.IO.FileSystem.Watcher.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.IO.FileSystem.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.IO.IsolatedStorage.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.IO.MemoryMappedFiles.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.IO.Pipes.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.IO.UnmanagedMemoryStream.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.IO.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Linq.Expressions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Linq.Parallel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Linq.Queryable.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Linq.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Net.Http.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Net.NameResolution.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Net.NetworkInformation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Net.Ping.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Net.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Net.Requests.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Net.Security.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Net.Sockets.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Net.WebHeaderCollection.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Net.WebSockets.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Net.WebSockets.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.ObjectModel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Reflection.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Reflection.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Reflection.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Resources.Reader.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Resources.ResourceManager.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Resources.Writer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.CompilerServices.VisualC.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.Handles.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.InteropServices.RuntimeInformation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.InteropServices.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.Numerics.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.Serialization.Formatters.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.Serialization.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.Serialization.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.Serialization.Xml.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Security.Claims.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Security.Cryptography.Algorithms.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Security.Cryptography.Csp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Security.Cryptography.Encoding.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Security.Cryptography.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Security.Cryptography.X509Certificates.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Security.Principal.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Security.SecureString.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Text.Encoding.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Text.Encoding.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Text.RegularExpressions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Threading.Overlapped.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Threading.Tasks.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Threading.Tasks.Parallel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Threading.Tasks.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Threading.Thread.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Threading.ThreadPool.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Threading.Timer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Threading.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Xml.ReaderWriter.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Xml.XDocument.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Xml.XPath.XDocument.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Xml.XPath.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Xml.XmlDocument.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\System.Xml.XmlSerializer.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\WpfAppBar.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\WpfScreenHelper.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\app_profile.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\css\app.29e34c24.css
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\favicon.ico
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\arrow-left.png
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\arrow-right.png
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\back-light.png
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\back.png
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\breakfast.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\camera-light.14f45916.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\camera.cc7b8dcf.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\chicken.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\clipboard-light.1026c11e.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\clipboard.c4755019.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\close-light.png
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\close.png
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\dinner.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\ers-generic-ico.png
PNG image data, 299 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\files-light.675f9318.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\files.2205c6a9.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\google.png
PNG image data, 40 x 41, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\healthy.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\apps-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\background-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\background.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\bookmark-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\bookmark.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\calculator-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\calculator.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\compress-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\compress-win11-light.png
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\compress-win11.png
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\compress.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\doctopdf-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\doctopdf-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\doctopdf-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\doctopdf.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\exceltopdf-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\exceltopdf-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\exceltopdf-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\exceltopdf.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\file-explorer-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\file-explorer.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\home-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\incognito-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\jpgtopdf-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\jpgtopdf-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\jpgtopdf-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\jpgtopdf.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\linkout-light.png
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\linkout.png
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\menu-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\merge-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\merge-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\merge.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\mp10-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\mp10.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\newtab-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\newtab.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\notepad-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\notepad.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftodoc-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftodoc-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftodoc-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftodoc.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftoexcel-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftoexcel-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftoexcel-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftoexcel.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftoppt-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftoppt-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftoppt-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\pdftoppt.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\ppttopdf-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\ppttopdf-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\ppttopdf-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\ppttopdf.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\print-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\recycle-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\recycle.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\search-light.png
PNG image data, 179 x 178, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\search.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\snipping-tool-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\snipping-tool.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\speedtest-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\speedtest.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\splashed-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\icon\splashed.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\logo\easyrecipesearch-light.png
PNG image data, 284 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\logo\easyrecipesearch.png
PNG image data, 283 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\logo\frompdftodoc.png
PNG image data, 367 x 368, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\logo\manualslibrary.png
PNG image data, 365 x 365, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\logo\mapsrch.png
PNG image data, 381 x 389, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\logo\myofficex.png
PNG image data, 368 x 367, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\logo\tvsearch.png
PNG image data, 374 x 333, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\lunch.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\mic-light.ef89f88c.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\mic.0bbff27e.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\more-light.png
PNG image data, 86 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\more-light.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\more.png
PNG image data, 85 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\more.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\pork.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\search.ea2d187a.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\steak.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\vegetarian.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\img\warning_1.20159b81.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\index.html
HTML document, ASCII text, with very long lines (759), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\js\app.3f57d9f7.js
ASCII text, with very long lines (14987)
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\js\app.3f57d9f7.js.map
JSON data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\js\chunk-vendors.f61cf75b.js
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\appdrawer\js\chunk-vendors.f61cf75b.js.map
JSON data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\css\app.29e34c24.css
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\de\Microsoft.Win32.TaskScheduler.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\es\Microsoft.Win32.TaskScheduler.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\favicon.ico
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\fr\Microsoft.Win32.TaskScheduler.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\arrow-left.png
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\arrow-right.png
PNG image data, 114 x 197, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\back-light.png
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\back.png
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\breakfast.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\camera-light.14f45916.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\camera.cc7b8dcf.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\chicken.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\clipboard-light.1026c11e.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\clipboard.c4755019.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\close-light.png
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\close.png
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\dinner.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\ers-generic-ico.png
PNG image data, 299 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\files-light.675f9318.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\files.2205c6a9.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\google.png
PNG image data, 40 x 41, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\healthy.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\apps-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\background-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\background.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\bookmark-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\bookmark.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\calculator-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\calculator.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\compress-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\compress-win11-light.png
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\compress-win11.png
PNG image data, 300 x 370, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\compress.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\doctopdf-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\doctopdf-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\doctopdf-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\doctopdf.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\exceltopdf-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\exceltopdf-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\exceltopdf-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\exceltopdf.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\file-explorer-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\file-explorer.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\home-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\incognito-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\jpgtopdf-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\jpgtopdf-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\jpgtopdf-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\jpgtopdf.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\linkout-light.png
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\linkout.png
PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\menu-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\merge-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\merge-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\merge.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\mp10-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\mp10.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\newtab-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\newtab.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\notepad-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\notepad.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftodoc-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftodoc-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftodoc-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftodoc.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftoexcel-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftoexcel-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftoexcel-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftoexcel.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftoppt-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftoppt-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftoppt-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\pdftoppt.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\ppttopdf-ico.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\ppttopdf-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\ppttopdf-win11.png
PNG image data, 300 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\ppttopdf.png
PNG image data, 500 x 500, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\print-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\recycle-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\recycle.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\search-light.png
PNG image data, 179 x 178, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\search.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\snipping-tool-light.png
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\snipping-tool.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\speedtest-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\speedtest.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\splashed-light.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\icon\splashed.png
PNG image data, 500 x 500, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\logo\easyrecipesearch-light.png
PNG image data, 284 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\logo\easyrecipesearch.png
PNG image data, 283 x 244, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\logo\frompdftodoc.png
PNG image data, 367 x 368, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\logo\manualslibrary.png
PNG image data, 365 x 365, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\logo\mapsrch.png
PNG image data, 381 x 389, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\logo\myofficex.png
PNG image data, 368 x 367, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\logo\tvsearch.png
PNG image data, 374 x 333, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\lunch.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\mic-light.ef89f88c.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\mic.0bbff27e.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\more-light.png
PNG image data, 86 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\more-light.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\more.png
PNG image data, 85 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\more.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\pork.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\search.ea2d187a.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\steak.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\vegetarian.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 400x298, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\img\warning_1.20159b81.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\index.html
HTML document, ASCII text, with very long lines (759), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\it\Microsoft.Win32.TaskScheduler.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\js\app.3f57d9f7.js
ASCII text, with very long lines (14987)
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\js\app.3f57d9f7.js.map
JSON data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\js\chunk-vendors.f61cf75b.js
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\js\chunk-vendors.f61cf75b.js.map
JSON data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\netstandard.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\pl\Microsoft.Win32.TaskScheduler.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\ru\Microsoft.Win32.TaskScheduler.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\x64\SQLite.Interop.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\x86\SQLite.Interop.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Net\app\zh-Hant\Microsoft.Win32.TaskScheduler.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Networking.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Profiles\profile_map.txt
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\Profiles\templatesearch_clearbar.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\assets\common\browse_icon.png
PNG image data, 30 x 23, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\assets\common\check_badge.png
PNG image data, 17 x 19, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\assets\common\closex.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\assets\common\green-check.png
PNG image data, 50 x 57, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\assets\common\greenprogress.gif
GIF image data, version 89a, 256 x 40
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\assets\templatesearch\background.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 640x480, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\assets\templatesearch\clearbar_installer.jpg
JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 640x480, components 3
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\assets\templatesearch\logo-slidedown.gif
GIF image data, version 89a, 350 x 115
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\assets\templatesearch\logo_white.png
PNG image data, 1216 x 288, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\css\baseline-compliant.css
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\css\baseline.css
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\css\baselinenew.css
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\css\templatesearch.css
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\index-templatesearch.html
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\js\installer.js
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\html\js\knockout.js
ASCII text, with very long lines (597), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\is-0GHSI.tmp
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\is-I6UEE.tmp
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\53226739-40a4-40a1-93a3-a1e0cbd442c9.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\icons\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\icons\16.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\icons\32.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\icons\48.png
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\lib\ext.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\lib\tabs.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\lib\util.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\check.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\close.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\highlight.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\icon.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\imgs.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\logo333.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\minus.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\nopage.png
PNG image data, 662 x 432, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\original.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\plus.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\printer.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\images\size.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\js\loader.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\js\runPrint.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\js\util.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\js\vendor\Readability.js
Unicode text, UTF-8 text, with very long lines (353)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\js\vendor\jquery-3.5.1.min.js
ASCII text, with very long lines (65451)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\js\vendor\purify.min.js
ASCII text, with very long lines (20980)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\reader\index.html
HTML document, Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\reader\reader.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\pages\reader\reader.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1381850975\CRX_INSTALL\worker.js
Java source, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1490370054\CRX_INSTALL\icons\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1490370054\CRX_INSTALL\icons\16.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1490370054\CRX_INSTALL\icons\32.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1490370054\CRX_INSTALL\icons\48.png
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1490370054\CRX_INSTALL\lib\ext.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1490370054\CRX_INSTALL\lib\native.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1490370054\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1490370054\CRX_INSTALL\worker.js
Java source, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1490370054\ac5e0f54-bc5c-45d5-8ee1-ae9087f9da4c.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1610322727\1ca2af85-2913-4d00-8e59-d8367191bd9f.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1610322727\CRX_INSTALL\icons\128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1610322727\CRX_INSTALL\icons\16.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1610322727\CRX_INSTALL\icons\32.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1610322727\CRX_INSTALL\icons\48.png
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1610322727\CRX_INSTALL\lib\ext.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1610322727\CRX_INSTALL\lib\native.js
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1610322727\CRX_INSTALL\manifest.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir7524_1610322727\CRX_INSTALL\worker.js
Java source, ASCII text
dropped
C:\Users\user\AppData\Local\ToastNotificationManagerCompat\Apps\23B31915-F4E2-7D64-AD59-15041A094798\Icon.png
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Clear.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed May 22 16:34:33 2024, mtime=Wed May 22 16:34:33 2024, atime=Thu Jan 25 21:20:23 2024, length=5407792, window=hide
dropped
C:\Users\user\Desktop\Clear.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed May 22 16:34:33 2024, mtime=Wed May 22 16:34:47 2024, atime=Thu Jan 25 21:20:23 2024, length=5407792, window=hide
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
There are 1584 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Clear-TemplateSearch.b5003.SK048.ed.exe
"C:\Users\user\Desktop\Clear-TemplateSearch.b5003.SK048.ed.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-P0J9K.tmp\Clear-TemplateSearch.b5003.SK048.ed.tmp
"C:\Users\user~1\AppData\Local\Temp\is-P0J9K.tmp\Clear-TemplateSearch.b5003.SK048.ed.tmp" /SL5="$203E0,4024297,806400,C:\Users\user\Desktop\Clear-TemplateSearch.b5003.SK048.ed.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\7zr.exe
"C:\Users\user~1\AppData\Local\Temp\is-ND9CL.tmp\7zr.exe" x "C:\Users\user~1\AppData\Local\Temp\is-ND9CL.tmp\clear.7z" -o"C:\Users\user~1\AppData\Local\Temp\is-ND9CL.tmp\Net\app\" -y
malicious
C:\Users\user\AppData\Local\Temp\is-ND9CL.tmp\7zr.exe
"C:\Users\user~1\AppData\Local\Temp\is-ND9CL.tmp\7zr.exe" x "C:\Users\user~1\AppData\Local\Temp\is-ND9CL.tmp\chromium.7z" -o"C:\Users\user~1\AppData\Local\Temp\is-ND9CL.tmp\Net\Chromium" -y
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.exe" postinstall "C:\Users\user\Desktop\Clear-TemplateSearch.b5003.SK048.ed.exe" "1.1.3.0" "C:\Users\user~1\AppData\Local\Temp\is-ND9CL.tmp\Profiles" "AutoStart_=true" "BuildVariant[]="
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe"
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe --type=crashpad-handler "--user-data-dir=C:\Users\user\AppData\Local\ClearBrowser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\user\AppData\Local\ClearBrowser\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=ClearBrowser --annotation=ver=120.0.6099.199 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb0321e440,0x7ffb0321e44c,0x7ffb0321e458
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.exe
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.exe
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.exe
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.exe update
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.exe
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Clear.exe weather
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=gpu-process --no-pre-read-main-dll --start-stack-profiler --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2012 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:2
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --start-stack-profiler --mojo-platform-channel-handle=2164 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:8
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --no-pre-read-main-dll --mojo-platform-channel-handle=3324 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:8
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=renderer --no-pre-read-main-dll --first-renderer-process --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --time-ticks-at-unix-epoch=-1716392232912672 --launch-time-ticks=7063572613 --mojo-platform-channel-handle=3668 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:1
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=renderer --extension-process --no-pre-read-main-dll --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1716392232912672 --launch-time-ticks=7064007852 --mojo-platform-channel-handle=3752 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:1
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=renderer --extension-process --no-pre-read-main-dll --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1716392232912672 --launch-time-ticks=7064386856 --mojo-platform-channel-handle=3892 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:1
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=renderer --extension-process --no-pre-read-main-dll --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --time-ticks-at-unix-epoch=-1716392232912672 --launch-time-ticks=7064810809 --mojo-platform-channel-handle=4108 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:1
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=renderer --extension-process --no-pre-read-main-dll --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --time-ticks-at-unix-epoch=-1716392232912672 --launch-time-ticks=7065811433 --mojo-platform-channel-handle=4260 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:1
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=renderer --no-pre-read-main-dll --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --time-ticks-at-unix-epoch=-1716392232912672 --launch-time-ticks=7066277542 --mojo-platform-channel-handle=4464 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:1
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --mojo-platform-channel-handle=4572 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:8
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-GB --service-sandbox-type=service --no-pre-read-main-dll --mojo-platform-channel-handle=4052 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:8
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-GB --service-sandbox-type=service --no-pre-read-main-dll --mojo-platform-channel-handle=3220 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:8
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=renderer --extension-process --no-pre-read-main-dll --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --time-ticks-at-unix-epoch=-1716392232912672 --launch-time-ticks=7075773636 --mojo-platform-channel-handle=4568 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:1
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-GB --service-sandbox-type=service --no-pre-read-main-dll --mojo-platform-channel-handle=3280 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:8
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-GB --service-sandbox-type=service --no-pre-read-main-dll --mojo-platform-channel-handle=3928 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:8
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=gpu-process --no-pre-read-main-dll --start-stack-profiler --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3224 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:2
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=gpu-process --no-pre-read-main-dll --start-stack-profiler --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=disabled --mojo-platform-channel-handle=5184 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:2
malicious
C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\Chromium\clearbrowser.exe
"C:\Users\user\AppData\Local\Programs\Clear\1.1.3.0\chromium\clearbrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-GB --service-sandbox-type=none --no-pre-read-main-dll --mojo-platform-channel-handle=4208 --field-trial-handle=2024,i,1010881945953717101,10568412325989976514,262144 --variations-seed-version /prefetch:8
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
There are 21 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://github.com/mozilla/rhino/issues/346
unknown
https://tc39.github.io/ecma262/#sec-promise.prototype.finally
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://api.openweathermap.org/data/2.5/forecast/daily?
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://tc39.github.io/ecma262/#sec-tonumber
unknown
https://url.spec.whatwg.org/#dom-urlsearchparams-append
unknown
https://search.yahoo.com?fr=tightropetb&type=11745
unknown
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
unknown
https://clearbar.app/rd2/?id=374553Ly9hcmNhZGV0YWIuY29t&guid=
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
https://tc39.github.io/ecma262/#sec-promise.prototype.then
unknown
https://www.therealreal.com/cart
unknown
https://github.com/zloirock/core-js/issues/640
unknown
https://www.youtube.com
unknown
https://www.shutterfly.com/cart/
unknown
https://www.urbanoutfitters.com/cart
unknown
https://github.com/tc39/proposal-array-filtering
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://url.spec.whatwg.org/#dom-url-search
unknown
https://www.saksfifthavenue.com/cart
unknown
https://www.zappos.com/cart
unknown
http://www.hardcodet.net/taskbar
unknown
https://tc39.github.io/ecma262/#sec-toprimitive
unknown
https://www.guitarcenter.com/cart
unknown
https://www.remobjects.com/ps
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://tab.clearbar.app/223/edge/index.html?guid=
unknown
https://tc39.github.io/ecma262/#sec-array.prototype.foreach
unknown
https://tc39.github.io/ecma262/#sec-array.prototype.some
unknown
https://www.innosetup.com/
unknown
https://tc39.github.io/ecma262/#sec-string.prototype.codepointat
unknown
http://www.html5rocks.com/en/tutorials/canvas/hidpi/
unknown
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
unknown
http://crt.r2m02.amazontrust.com/r2m02.cer0
unknown
https://url.spec.whatwg.org/#dom-url-tojson
unknown
https://github.com/es-shims/es5-shim/issues/150
unknown
https://chrome.google.com/webstorehttps://chromewebstore.google.com/6EAED1924DB611B6EEF2A664BD077BE7
unknown
https://tc39.github.io/ecma262/#sec-promise.all
unknown
http://eev.ee/blog/2015/09/12/dark-corners-of-unicode/).
unknown
https://developer.mozilla.org/en-US/docs/Web/API/URL/revokeObjectURL
unknown
https://staging.newtab.ext.services/223/default/index.html?guid=
unknown
https://search.clearbar.app/crx/search.php?guid=
unknown
https://crashpad.chromium.org/
unknown
https://tc39.github.io/ecma262/#sec-symbol.prototype.description
unknown
https://www.williams-sonoma.com/shoppingcart/
unknown
https://tc39.github.io/ecma262/#sec-createarrayiterator
unknown
https://github.com/zloirock/core-js/issues/306
unknown
https://tc39.github.io/ecma262/#sec-array.from
unknown
https://tc39.github.io/ecma262/#sec-number.isnan
unknown
http://ocsp.r2m02.amazontrust.com06
unknown
https://tc39.github.io/ecma262/#sec-object.defineproperty
unknown
https://chrome.google.com/webstore
unknown
https://instagram.com
unknown
https://cloudfront.clearbar.app/profiles/common.json=https://clearbar.app/profiles/ehttps://clearbar
unknown
https://url.spec.whatwg.org/#dom-url-hostname
unknown
https://www.teacherspayteachers.com/Cart
unknown
http://ecma-international.org/ecma-262/7.0/#sec-properties-of-the-map-prototype-object)
unknown
https://clearbar.app/rd2/?id=273811Ly9hcmNhZGV0YWIuY29t&guid=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://chrome.google.com/webstore?hl=en-GB&category=theme81https://myactivity.google.com/myactivity
unknown
https://fullscreen.spec.whatwg.org/#user-agent-level-style-sheet-defaults:
unknown
https://www.qvc.com/checkout/cart.html
unknown
https://tc39.github.io/ecma262/#sec-symbol.keyfor
unknown
https://pdf-services.clearbar.app/api/v1/auth/handoff
unknown
http://underscorejs.org/LICENSE
unknown
https://tc39.github.io/ecma262/#sec-getsubstitution
unknown
http://crl.rootg2.amazontrust.com/rootg2.crl0
unknown
http://o.aolcdn.com/images/dims?image_uri=https%3A%2F%2Fs.yimg.com%2Fos%2Fcreatr-uploaded-images%2F2
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
https://developer.mozilla.org/en-US/docs/Web/API/URL/createObjectURL
unknown
https://tc39.github.io/ecma262/#sec-function-instances-name
unknown
https://clearbar.app/rd2/?id=175902Ly9hcmNhZGV0YWIuY29t&guid=
unknown
https://tc39.github.io/ecma262/#sec-array.prototype.values
unknown
https://tc39.github.io/ecma262/#sec-object.values
unknown
https://www.samsclub.com/cart
unknown
http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd
unknown
https://amazon.com
unknown
https://earth.google.com/web
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://cloudfront.clearbar.app/extensions/newtab-yahoo-20220131.xml
unknown
https://tc39.github.io/ecma262/#sec-array.prototype.map
unknown
https://chromewebstore.google.com/
unknown
https://cloudfront.clearbar.app/extensions/ycontent-mv3.xml
unknown
https://url.spec.whatwg.org/#dom-url-password
unknown
https://github.com/mathiasbynens/String.prototype.at
unknown
https://people.mozilla.org/~jorendorff/es6-draft.html#sec-generatorresume
unknown
https://tc39.github.io/ecma262/#sec-array.prototype.slice
unknown
https://tc39.github.io/ecma262/#sec-array.prototype.splice
unknown
https://tc39.github.io/ecma262/#sec-symbol.prototype-
unknown
http://w3.org/TR/2012/WD-url-20120524/#collect-url-parameters
unknown
https://github.com/zloirock/core-js/issues/679
unknown
https://tc39.github.io/ecma262/#sec-arrayspeciescreate
unknown
https://search.freshy.com/y-feeds/news/v1/topNews?length=-1
unknown
https://github.com/zloirock/core-js/issues/677
unknown
https://mathiasbynens.be/notes/javascript-unicode).
unknown
https://clearbar.app/rd2/?id=195104Ly9hcmNhZGV0YWIuY29t&guid=
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://cloudfront.clearbar.app/extensions/staging/zoomtool-v1056.xml
unknown
https://github.com/zloirock/core-js/issues/674
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
1.1.1.1
unknown
Australia
142.250.186.170
unknown
United States
18.239.69.89
unknown
United States
18.239.69.107
unknown
United States
192.168.2.7
unknown
unknown
142.251.40.234
unknown
United States
18.164.96.2
unknown
United States
142.250.185.238
unknown
United States
74.125.206.84
unknown
United States
172.67.70.239
unknown
United States
239.255.255.250
unknown
Reserved
34.205.103.86
unknown
United States
142.250.186.142
unknown
United States
18.245.86.18
unknown
United States
172.64.41.3
unknown
United States
There are 5 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Clear-TemplateSearch_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Clear.App\Clear
BrandName
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\NativeMessagingHosts\com.clear.application
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
Inno Setup: Setup Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
Inno Setup: App Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
Inno Setup: Icon Group
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
Inno Setup: User
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
Inno Setup: Selected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
Inno Setup: Deselected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
Inno Setup: Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
URLInfoAbout
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
HelpLink
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
URLUpdateInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
MajorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
MinorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
VersionMajor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
VersionMinor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D5806CCB-8635-4E7A-94FC-BF2723167477}_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Clear_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser
UsageStatsInSample
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser
usagestats
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser
metricsid
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser
metricsid_installdate
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser
metricsid_enableddate
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
google.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
google.services.account_id
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
google.services.last_username
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
chbonioepcgoolpaljfiaekejidonnba
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
hnaldbmaaihebfkndlpogamgccddckad
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
lhgbhkaddoclgompehjgnoabldpmpkno
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
ongdnllcjkgccaaeenpnccdmgnoakclk
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\BLBeacon
failed_count
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
chbonioepcgoolpaljfiaekejidonnba
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
hnaldbmaaihebfkndlpogamgccddckad
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
lhgbhkaddoclgompehjgnoabldpmpkno
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
ongdnllcjkgccaaeenpnccdmgnoakclk
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser
FirstNotDefault
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
chbonioepcgoolpaljfiaekejidonnba
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
hnaldbmaaihebfkndlpogamgccddckad
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
lhgbhkaddoclgompehjgnoabldpmpkno
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default\extensions.settings
ongdnllcjkgccaaeenpnccdmgnoakclk
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\PreferenceMACs\Default
pinned_tabs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_USERSS-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry
TraceTimeLast
HKEY_CURRENT_USER\SOFTWARE\ClearBrowser\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER_Classes\CLSID\{23b31915-f4e2-7d64-ad59-15041a094798}\LocalServer32
NULL
HKEY_CURRENT_USER_Classes\AppUserModelId\C:/Users/user/AppData/Local/Programs/Clear/1.1.3.0/Clear.exe
DisplayName
HKEY_CURRENT_USER_Classes\AppUserModelId\C:/Users/user/AppData/Local/Programs/Clear/1.1.3.0/Clear.exe
IconUri
HKEY_CURRENT_USER_Classes\AppUserModelId\C:/Users/user/AppData/Local/Programs/Clear/1.1.3.0/Clear.exe
IconBackgroundColor
HKEY_CURRENT_USER_Classes\AppUserModelId\C:/Users/user/AppData/Local/Programs/Clear/1.1.3.0/Clear.exe
Has7.0.1Fix
HKEY_CURRENT_USER_Classes\AppUserModelId\C:/Users/user/AppData/Local/Programs/Clear/1.1.3.0/Clear.exe
CustomActivator
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
There are 234 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1EDD163F000
heap
page read and write
AF6D000
stack
page read and write
180C012FC000
direct allocation
page read and write
C22F000
unkown
page read and write
83D0000
trusted library allocation
page read and write
F6C00290000
direct allocation
page read and write
1BE6C6B9000
remote allocation
page execute read
8B800324000
direct allocation
page read and write
CD700141000
direct allocation
page read and write
39000404000
direct allocation
page read and write
39E800340000
direct allocation
page read and write
B6AA000
stack
page read and write
1EDD163C000
heap
page read and write
CE09000
trusted library allocation
page read and write
41840000C000
direct allocation
page read and write
180C00338000
direct allocation
page read and write
7E38DFE000
stack
page read and write
8340000
trusted library allocation
page read and write
BBBB000
stack
page read and write
5C5800250000
direct allocation
page read and write
1B889FF0000
heap
page read and write
1F4C002E4000
direct allocation
page read and write
CDF2000
trusted library allocation
page read and write
384400260000
direct allocation
page read and write
5C58000BC000
direct allocation
page read and write
8EDD000
unkown
page read and write
280002B0000
direct allocation
page read and write
CDA3000
trusted library allocation
page read and write
13F80027C000
direct allocation
page read and write
8B80027C000
direct allocation
page read and write
83D0000
trusted library allocation
page read and write
4746000
unkown
page read and write
57000020C000
direct allocation
page read and write
180C00348000
direct allocation
page read and write
7BA0002B0000
direct allocation
page read and write
738BFF000
stack
page read and write
180C006D7000
direct allocation
page read and write
3C2C003A4000
direct allocation
page read and write
12C0000
heap
page read and write
737BFE000
stack
page read and write
1EDD163C000
heap
page read and write
5C5800250000
direct allocation
page read and write
36EF000
direct allocation
page read and write
1BEF3310000
unclassified section
page read and write
32C0000
heap
page read and write
6630001A0000
direct allocation
page read and write
15EC2D10000
heap
page read and write
39E8002D4000
direct allocation
page read and write
3C2C00958000
direct allocation
page read and write
5C58002D8000
direct allocation
page read and write
10CBE000
trusted library allocation
page read and write
52F400094000
direct allocation
page read and write
280002B4000
direct allocation
page read and write
3C2C00BC8000
direct allocation
page read and write
3C2C00228000
direct allocation
page read and write
1EDD163C000
heap
page read and write
36CF000
direct allocation
page read and write
52F40006C000
direct allocation
page read and write
5C5800104000
direct allocation
page read and write
7C5000240000
direct allocation
page read and write
6CF800024000
direct allocation
page read and write
7FF7FD713000
unkown
page readonly
3480000
direct allocation
page read and write
332000298000
direct allocation
page read and write
F071000
trusted library allocation
page read and write
171C00294000
direct allocation
page read and write
1EDD164B000
heap
page read and write
180C005B0000
direct allocation
page read and write
7C5000418000
direct allocation
page read and write
6DD000
unkown
page readonly
7BA0002A4000
direct allocation
page read and write
7FF7FD74C000
unkown
page write copy
3C2C00934000
direct allocation
page read and write
1EDD165B000
heap
page read and write
A627000
heap
page read and write
DC70000
trusted library allocation
page read and write
39000210000
direct allocation
page read and write
9C14000
trusted library allocation
page read and write
A617000
heap
page read and write
F6C002B4000
direct allocation
page read and write
24E13F8000
stack
page read and write
3C2C006E4000
direct allocation
page read and write
21000000000
direct allocation
page readonly
9D31000
trusted library allocation
page read and write
52A400418000
direct allocation
page read and write
61F0002B0000
direct allocation
page read and write
7E1E7FE000
stack
page read and write
8B800201000
direct allocation
page read and write
9259000
stack
page read and write
CDD7000
trusted library allocation
page read and write
EE78000
trusted library allocation
page read and write
15EC5940000
direct allocation
page read and write
8B800304000
direct allocation
page read and write
990FFE000
stack
page read and write
1EDD165F000
heap
page read and write
5C580026C000
direct allocation
page read and write
7FF7FD758000
unkown
page write copy
CDD5000
trusted library allocation
page read and write
7FF7FD775000
unkown
page readonly
A1B8000
trusted library allocation
page read and write
7176000
unkown
page read and write
1EDD1665000
heap
page read and write
66300031C000
direct allocation
page read and write
A1B0000
trusted library allocation
page read and write
180C006CC000
direct allocation
page read and write
32E6000
unkown
page read and write
44B80040C000
direct allocation
page read and write
6CF8000E4000
direct allocation
page read and write
7140000
unkown
page read and write
AEE7000
stack
page read and write
267C00221000
direct allocation
page read and write
7DE800330000
direct allocation
page read and write
3C2C00238000
direct allocation
page read and write
13DF929E000
remote allocation
page execute read
1EDD166E000
heap
page read and write
1EDD1665000
heap
page read and write
32D3000
unkown
page read and write
8D78000
unkown
page read and write
1EDD166E000
heap
page read and write
52F400108000
direct allocation
page read and write
A67B000
heap
page read and write
D3B0000
trusted library allocation
page read and write
1EDD163C000
heap
page read and write
7E3D5FE000
unkown
page readonly
20400284000
direct allocation
page read and write
1F4C00268000
direct allocation
page read and write
20400232000
direct allocation
page read and write
7FF7FD74C000
unkown
page write copy
3C2C0090C000
direct allocation
page read and write
21000020000
direct allocation
page readonly
3C2C008D0000
direct allocation
page read and write
1EDD164B000
heap
page read and write
390002E4000
direct allocation
page read and write
8B800250000
direct allocation
page read and write
E290000
unkown
page read and write
7162000
unkown
page read and write
39E800240000
direct allocation
page read and write
9C0000
heap
page read and write
5C58002E4000
direct allocation
page read and write
1EDD165F000
heap
page read and write
2D42000
unkown
page read and write
39000324000
direct allocation
page read and write
7C8C002A0000
direct allocation
page read and write
7FF7FD775000
unkown
page readonly
1EDD166E000
heap
page read and write
27456D91000
unkown
page readonly
A68B000
heap
page read and write
5C5800230000
direct allocation
page read and write
8200000
trusted library allocation
page read and write
F6C0027C000
direct allocation
page read and write
20400304000
direct allocation
page read and write
1BE6F310000
direct allocation
page readonly
169F000
stack
page read and write
1EDD166E000
heap
page read and write
7FF7FD768000
unkown
page readonly
180C00C8C000
direct allocation
page read and write
7FF7FD580000
unkown
page readonly
15EC2C90000
remote allocation
page read and write
A6BB000
heap
page read and write
CD7E000
trusted library allocation
page read and write
44B80033C000
direct allocation
page read and write
7FF7FD758000
unkown
page read and write
52F400130000
direct allocation
page read and write
F6C002D4000
direct allocation
page read and write
50B0000
unkown
page write copy
61F000234000
direct allocation
page read and write
2F74000
unkown
page read and write
455C002FC000
direct allocation
page read and write
3C2C00750000
direct allocation
page read and write
7FF7FD713000
unkown
page readonly
472C000
unkown
page read and write
4184001A0000
direct allocation
page read and write
7E1FFFC000
stack
page read and write
3C2C0022C000
direct allocation
page read and write
1EDD165D000
heap
page read and write
D10A000
heap
page read and write
7DE800308000
direct allocation
page read and write
52A400314000
direct allocation
page read and write
1EDD166E000
heap
page read and write
A85E000
unkown
page read and write
180C005B0000
direct allocation
page read and write
1EDD1665000
heap
page read and write
180C0060C000
direct allocation
page read and write
1EDD163F000
heap
page read and write
E8000240000
direct allocation
page read and write
13F800220000
direct allocation
page read and write
347B1FE000
stack
page read and write
290000250000
direct allocation
page read and write
83D0000
trusted library allocation
page read and write
C0FB000
unkown
page read and write
15EC2E09000
heap
page read and write
180C00734000
direct allocation
page read and write
13F8002E4000
direct allocation
page read and write
7FF7FD580000
unkown
page readonly
5C580026C000
direct allocation
page read and write
1EDD166E000
heap
page read and write
1E493587000
heap
page read and write
274571B5000
unkown
page readonly
A6AE000
heap
page read and write
390002AC000
direct allocation
page read and write
6CF800088000
direct allocation
page read and write
A156000
unkown
page read and write
1EDD1632000
heap
page read and write
1C700000000
direct allocation
page readonly
7FF7FD581000
unkown
page execute read
27B3FD18000
heap
page read and write
1C100082000
direct allocation
page read and write
2601000
heap
page read and write
AE2B000
stack
page read and write
3C2C00CEC000
direct allocation
page read and write
180C00B8C000
direct allocation
page read and write
CE00000
trusted library allocation
page read and write
44B800324000
direct allocation
page read and write
180C00460000
direct allocation
page read and write
14600080000
direct allocation
page read and write
9CA000
heap
page read and write
44B80034C000
direct allocation
page read and write
2900002D8000
direct allocation
page read and write
8B8002A4000
direct allocation
page read and write
31200020000
direct allocation
page readonly
3C2C008A8000
direct allocation
page read and write
8200000
trusted library allocation
page read and write
6CF800230000
direct allocation
page read and write
A63C000
heap
page read and write
83D0000
trusted library allocation
page read and write
44B80026C000
direct allocation
page read and write
39E800352000
direct allocation
page read and write
9E1000
heap
page read and write
9EE000
heap
page read and write
44B800258000
direct allocation
page read and write
EE9A000
trusted library allocation
page read and write
1EDD165D000
heap
page read and write
1EDCFD9A000
heap
page read and write
3C2C00248000
direct allocation
page read and write
1EDD163C000
heap
page read and write
894000
unkown
page readonly
44B800324000
direct allocation
page read and write
3C2C00CEC000
direct allocation
page read and write
98A7FE000
unkown
page readonly
44B800408000
direct allocation
page read and write
7160000
unkown
page read and write
15EC44A2000
unkown
page readonly
5700001BC000
direct allocation
page read and write
332000300000
direct allocation
page read and write
7FF7FD775000
unkown
page readonly
180C0137C000
direct allocation
page read and write
7DE800808000
direct allocation
page read and write
52A400238000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
61F000264000
direct allocation
page read and write
83D0000
trusted library allocation
page read and write
15EC4810000
heap
page read and write
7FF7FD758000
unkown
page write copy
8B8002EC000
direct allocation
page read and write
180C00CB4000
direct allocation
page read and write
52A40040C000
direct allocation
page read and write
7FF7FD758000
unkown
page write copy
1EDD163F000
heap
page read and write
3C2C00930000
direct allocation
page read and write
44B800244000
direct allocation
page read and write
1FFFB9DE000
heap
page read and write
1BE6F320000
direct allocation
page read and write
2F81000
heap
page read and write
F800000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
7FF7FD758000
unkown
page write copy
5C58000A0000
direct allocation
page read and write
39000220000
direct allocation
page read and write
7C5000408000
direct allocation
page read and write
3C2C002F4000
direct allocation
page read and write
4184001F0000
direct allocation
page read and write
1E493557000
heap
page read and write
13F8002D4000
direct allocation
page read and write
129D000
heap
page read and write
180C010D4000
direct allocation
page read and write
1EDD1653000
heap
page read and write
3C2C00D60000
direct allocation
page read and write
1FF8235C000
heap
page read and write
A4B001C1000
direct allocation
page read and write
401000
unkown
page execute read
EEA000
stack
page read and write
13DF9469000
heap
page read and write
1EDD1665000
heap
page read and write
1EDD1639000
heap
page read and write
13FC00210000
direct allocation
page read and write
180C009A4000
direct allocation
page read and write
6B400210000
direct allocation
page read and write
7FF7FD775000
unkown
page readonly
1F4C00230000
direct allocation
page read and write
13FC00284000
direct allocation
page read and write
7FF7FD74C000
unkown
page write copy
CDBF000
trusted library allocation
page read and write
7FF7FD74C000
unkown
page write copy
73F0000
unkown
page read and write
1EDD164D000
heap
page read and write
13F80026C000
direct allocation
page read and write
1EDD1665000
heap
page read and write
DC70000
trusted library allocation
page read and write
3716000
direct allocation
page read and write
7E1EFFE000
stack
page read and write
47C6000
unkown
page read and write
2E50000
heap
page read and write
1EDD1665000
heap
page read and write
1EDD166E000
heap
page read and write
1B88CA50000
direct allocation
page readonly
146001C0000
direct allocation
page readonly
332000220000
direct allocation
page read and write
CD5F000
trusted library allocation
page read and write
10206000
trusted library allocation
page read and write
1EDD164B000
heap
page read and write
1BE6CA03000
heap
page read and write
1290000
heap
page read and write
C0F9000
unkown
page read and write
7FF7FD758000
unkown
page write copy
1BE6C690000
remote allocation
page read and write
77D0000
unkown
page read and write
13DF9303000
heap
page read and write
180C00470000
direct allocation
page read and write
7FF7FD581000
unkown
page execute read
10203000
trusted library allocation
page read and write
EEA8000
trusted library allocation
page read and write
1EDD165D000
heap
page read and write
A7BE000
heap
page read and write
1EDD165F000
heap
page read and write
290000230000
direct allocation
page read and write
6CF800001000
direct allocation
page read and write
2C00000
heap
page read and write
52F400001000
direct allocation
page read and write
180C009A4000
direct allocation
page read and write
13FC00268000
direct allocation
page read and write
3C2C005D4000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
2040036C000
direct allocation
page read and write
2B40000
heap
page read and write
39E800320000
direct allocation
page read and write
27B3FBA0000
heap
page read and write
1EDD165D000
heap
page read and write
BC10000
unkown
page read and write
8B30000
unkown
page read and write
9BE000
heap
page read and write
44B8002C8000
direct allocation
page read and write
83E0000
trusted library allocation
page read and write
1EDD163F000
heap
page read and write
3C2C00D78000
direct allocation
page read and write
13FC002A4000
direct allocation
page read and write
3C2C00970000
direct allocation
page read and write
7C50002AC000
direct allocation
page read and write
7FFADDEB1000
unkown
page execute read
D09C000
heap
page read and write
9C2000
heap
page read and write
7FF7FD77B000
unkown
page readonly
4514002A4000
direct allocation
page read and write
81E0000
trusted library allocation
page read and write
71100014C000
direct allocation
page read and write
9800000
trusted library allocation
page read and write
7FFADE8B1000
unkown
page execute read
DC67000
trusted library allocation
page read and write
CDA0000
trusted library allocation
page read and write
711000724000
direct allocation
page read and write
9E1F000
trusted library allocation
page read and write
1EDD164B000
heap
page read and write
CE09000
trusted library allocation
page read and write
7E217FE000
stack
page read and write
83D0000
trusted library allocation
page read and write
3C2C001BC000
direct allocation
page read and write
9D4000
heap
page read and write
180C0064C000
direct allocation
page read and write
7FF7FD581000
unkown
page execute read
904C000
unkown
page read and write
27B3FEC7000
unclassified section
page read and write
F6C00258000
direct allocation
page read and write
7E20FFE000
stack
page read and write
29000026C000
direct allocation
page read and write
384400234000
direct allocation
page read and write
180C0120C000
direct allocation
page read and write
F7F0000
trusted library allocation
page read and write
41840020C000
direct allocation
page read and write
6B4002A8000
direct allocation
page read and write
180C0030C000
direct allocation
page read and write
BFBF000
unkown
page read and write
860000
trusted library allocation
page read and write
1EDD1665000
heap
page read and write
81D0000
trusted library allocation
page read and write
9CDC000
stack
page read and write
77D0002B0000
direct allocation
page read and write
1EDCFD9C000
heap
page read and write
180C00388000
direct allocation
page read and write
27B3FAC0000
unclassified section
page readonly
570000230000
direct allocation
page read and write
8D68000
unkown
page read and write
EF13000
trusted library allocation
page read and write
3C2C0041C000
direct allocation
page read and write
1EDD163C000
heap
page read and write
9877FE000
unkown
page readonly
1EDD163F000
heap
page read and write
E2A1000
trusted library allocation
page read and write
1EDD163F000
heap
page read and write
1EDD163F000
heap
page read and write
3280000
heap
page read and write
455C002FC000
direct allocation
page read and write
1EDD165D000
heap
page read and write
1BE6C950000
heap
page read and write
1EDD166E000
heap
page read and write
290000150000
direct allocation
page read and write
1EDD1640000
heap
page read and write
180C0064C000
direct allocation
page read and write
3C2C00C64000
direct allocation
page read and write
7D8E000
stack
page read and write
2940000
heap
page read and write
9D30000
trusted library allocation
page read and write
61F0002C0000
direct allocation
page read and write
2901000
heap
page read and write
102CF000
heap
page read and write
5C5800118000
direct allocation
page read and write
7FFADCAB1000
unkown
page execute read
1EDD163F000
heap
page read and write
7FF7FD713000
unkown
page readonly
9800000
trusted library allocation
page read and write
180C006CC000
direct allocation
page read and write
180C0090C000
direct allocation
page read and write
3C2C0099C000
direct allocation
page read and write
52F400014000
direct allocation
page read and write
1EDD165F000
heap
page read and write
451D001E1000
direct allocation
page read and write
663000240000
direct allocation
page read and write
C584000
unkown
page read and write
CD5B000
trusted library allocation
page read and write
21000200000
direct allocation
page readonly
1EDD165F000
heap
page read and write
4718000
unkown
page read and write
A5B0000
trusted library allocation
page read and write
7E36DFE000
stack
page read and write
9580000
unkown
page readonly
3C2C00CE8000
direct allocation
page read and write
3C2C00918000
direct allocation
page read and write
180C014AC000
direct allocation
page read and write
EE60000
trusted library allocation
page read and write
3C2C00220000
direct allocation
page read and write
44B800318000
direct allocation
page read and write
1BE6D790000
unkown
page readonly
13FC00240000
direct allocation
page read and write
48B6000
trusted library allocation
page read and write
CE00000
trusted library allocation
page read and write
7DE800824000
direct allocation
page read and write
7FF7FD74C000
unkown
page write copy
9820000
trusted library allocation
page read and write
180C00968000
direct allocation
page read and write
8B80034D000
direct allocation
page read and write
180C00940000
direct allocation
page read and write
39000324000
direct allocation
page read and write
3C2C008D1000
direct allocation
page read and write
1EDD165F000
heap
page read and write
1EDD165F000
heap
page read and write
1EDD1665000
heap
page read and write
4184002F0000
direct allocation
page read and write
1C7AFC30000
unclassified section
page read and write
1EDD1665000
heap
page read and write
3900040C000
direct allocation
page read and write
1F4C002B0000
direct allocation
page read and write
C18A000
unkown
page read and write
3C2C00922000
direct allocation
page read and write
3C2C00975000
direct allocation
page read and write
739BFE000
stack
page read and write
1EDD165D000
heap
page read and write
13F800280000
direct allocation
page read and write
1C700020000
direct allocation
page readonly
4184001B4000
direct allocation
page read and write
15EC2FD0000
unkown
page readonly
9BF000
heap
page read and write
5C58001BC000
direct allocation
page read and write
3C2C00BBC000
direct allocation
page read and write
83D1000
trusted library allocation
page read and write
24E43FC000
stack
page read and write
52F400024000
direct allocation
page read and write
6B4002A4000
direct allocation
page read and write
204002EC000
direct allocation
page read and write
180C0064C000
direct allocation
page read and write
E13B000
stack
page read and write
280002B4000
direct allocation
page read and write
3C2C007CC000
direct allocation
page read and write
9F0000
unkown
page readonly
98EFFE000
stack
page read and write
24E6BFE000
stack
page read and write
3480000
direct allocation
page read and write
1EDD165D000
heap
page read and write
332000268000
direct allocation
page read and write
13DF92C0000
heap
page read and write
32D7000
unkown
page read and write
39000344000
direct allocation
page read and write
2900001C0000
direct allocation
page read and write
CDDA000
trusted library allocation
page read and write
A6B6000
heap
page read and write
180C00AD8000
direct allocation
page read and write
171C002A4000
direct allocation
page read and write
1EDD1665000
heap
page read and write
FD0000
unkown
page readonly
180C0060C000
direct allocation
page read and write
10216000
trusted library allocation
page read and write
717C000
unkown
page read and write
CD69000
trusted library allocation
page read and write
663000110000
direct allocation
page read and write
2040032F000
direct allocation
page read and write
81D0000
trusted library allocation
page read and write
13F800264000
direct allocation
page read and write
280002B0000
direct allocation
page read and write
4880000
unkown
page read and write
1020E000
trusted library allocation
page read and write
1EDD1637000
heap
page read and write
7FF7FD74C000
unkown
page write copy
1EDD1665000
heap
page read and write
5C58000B4000
direct allocation
page read and write
27B3FCC3000
heap
page read and write
663000230000
direct allocation
page read and write
10CB0000
trusted library allocation
page read and write
717A000
unkown
page read and write
A222000
unkown
page read and write
D420000
trusted library allocation
page read and write
7FF7FD580000
unkown
page readonly
CD62000
trusted library allocation
page read and write
13DF9670000
heap
page read and write
39000264000
direct allocation
page read and write
1C7ACBE0000
heap
page read and write
390002C8000
direct allocation
page read and write
20400244000
direct allocation
page read and write
A4B00201000
direct allocation
page read and write
6630000BC000
direct allocation
page read and write
6CF800074000
direct allocation
page read and write
2530000
direct allocation
page read and write
39E800340000
direct allocation
page read and write
1EDD165F000
heap
page read and write
1EDD166E000
heap
page read and write
9897FE000
unkown
page readonly
F6C00278000
direct allocation
page read and write
6630002F0000
direct allocation
page read and write
20400210000
direct allocation
page read and write
1F4C002C4000
direct allocation
page read and write
CE00000
trusted library allocation
page read and write
11530000
unkown
page read and write
180C0010C000
direct allocation
page read and write
7FF7FD74C000
unkown
page write copy
A6AB000
heap
page read and write
8ECE000
unkown
page read and write
8D72000
unkown
page read and write
5C5800220000
direct allocation
page read and write
7280002A4000
direct allocation
page read and write
1EDD1676000
heap
page read and write
61F00020C000
direct allocation
page read and write
1FFFB9A7000
heap
page read and write
418400230000
direct allocation
page read and write
2E48000
heap
page read and write
418400230000
direct allocation
page read and write
61F000220000
direct allocation
page read and write
180C00308000
direct allocation
page read and write
1EDD166E000
heap
page read and write
D0D6000
heap
page read and write
DF0000
heap
page read and write
D409000
trusted library allocation
page read and write
3C2C00DD8000
direct allocation
page read and write
7A4B000
stack
page read and write
3C2C00C54000
direct allocation
page read and write
44B80036C000
direct allocation
page read and write
15EC5930000
direct allocation
page readonly
5C580013D000
direct allocation
page read and write
455C0034A000
direct allocation
page read and write
44B800284000
direct allocation
page read and write
3C2C00D68000
direct allocation
page read and write
1EDD163F000
heap
page read and write
14600082000
direct allocation
page read and write
1EDD165F000
heap
page read and write
3C2C00962000
direct allocation
page read and write
13D0000
direct allocation
page read and write
87C000
unkown
page readonly
F7F0000
trusted library allocation
page read and write
15EC3E30000
unkown
page readonly
280002E4000
direct allocation
page read and write
13DF9476000
heap
page read and write
1EDD1637000
heap
page read and write
1EDD1665000
heap
page read and write
7C50002D4000
direct allocation
page read and write
52F400110000
direct allocation
page read and write
F6C00201000
direct allocation
page read and write
1E493575000
heap
page read and write
180C0154C000
direct allocation
page read and write
6630000F0000
direct allocation
page read and write
7E207FF000
stack
page read and write
1EDD165F000
heap
page read and write
F7F0000
trusted library allocation
page read and write
1EDD1653000
heap
page read and write
180C0064C000
direct allocation
page read and write
13FC00220000
direct allocation
page read and write
7C500030C000
direct allocation
page read and write
3C2C001A4000
direct allocation
page read and write
7FF7FD775000
unkown
page readonly
7B98000
stack
page read and write
B5AE000
stack
page read and write
15EC3FE0000
unkown
page readonly
44B800374000
direct allocation
page read and write
7E3C5FE000
unkown
page readonly
27B3FCF4000
heap
page read and write
1EDD164B000
heap
page read and write
27B3FC70000
trusted library allocation
page read and write
A23B000
unkown
page read and write
1EDD166E000
heap
page read and write
418400230000
direct allocation
page read and write
986FFE000
stack
page read and write
6CF8000C9000
direct allocation
page read and write
5C5800074000
direct allocation
page read and write
7FFADB6B0000
unkown
page readonly
A0DA000
unkown
page read and write
4184001B4000
direct allocation
page read and write
15EC4940000
direct allocation
page read and write
180C002C4000
direct allocation
page read and write
A1FD000
unkown
page read and write
3C2C00B30000
direct allocation
page read and write
180C0088C000
direct allocation
page read and write
9DE0000
trusted library allocation
page read and write
66300000C000
direct allocation
page read and write
7C5000344000
direct allocation
page read and write
9E19000
trusted library allocation
page read and write
267C00334000
direct allocation
page read and write
451400238000
direct allocation
page read and write
9DBE000
trusted library allocation
page read and write
180C00AEC000
direct allocation
page read and write
29000030C000
direct allocation
page read and write
5C5800154000
direct allocation
page read and write
180C00924000
direct allocation
page read and write
F6C002A0000
direct allocation
page read and write
1C700042000
direct allocation
page read and write
7C500033C000
direct allocation
page read and write
210001C0000
direct allocation
page readonly
FB0000
unkown
page read and write
8584000
heap
page read and write
663000001000
direct allocation
page read and write
C0F3000
unkown
page read and write
3C2C008F8000
direct allocation
page read and write
9E12000
trusted library allocation
page read and write
E2B5000
trusted library allocation
page read and write
39E80040C000
direct allocation
page read and write
11500000
unkown
page read and write
1EDD1644000
heap
page read and write
C20000
unkown
page read and write
3E14002A4000
direct allocation
page read and write
3350000
unkown
page readonly
1EDD165D000
heap
page read and write
9C2000
heap
page read and write
1BE6E210000
heap
page read and write
2840000
heap
page read and write
83E0000
trusted library allocation
page read and write
290000014000
direct allocation
page read and write
29000031C000
direct allocation
page read and write
1EDD163C000
heap
page read and write
34007FF000
stack
page read and write
1EDD165B000
heap
page read and write
D0FA000
heap
page read and write
29000020C000
direct allocation
page read and write
180C00AD8000
direct allocation
page read and write
A1AD000
trusted library allocation
page read and write
37C0000
direct allocation
page read and write
4734000
unkown
page read and write
180C00B8C000
direct allocation
page read and write
3042000
heap
page read and write
8D76000
unkown
page read and write
1EDD166E000
heap
page read and write
A5B0000
trusted library allocation
page read and write
332000310000
direct allocation
page read and write
1EDD166E000
heap
page read and write
6CF8000B8000
direct allocation
page read and write
9DE4000
trusted library allocation
page read and write
39000244000
direct allocation
page read and write
1EDD163A000
heap
page read and write
663000220000
direct allocation
page read and write
66300026C000
direct allocation
page read and write
267C0032C000
direct allocation
page read and write
61F000290000
direct allocation
page read and write
BEBF000
stack
page read and write
B4A6000
stack
page read and write
1BE6C640000
unclassified section
page readonly
1EDD163C000
heap
page read and write
1EDD1653000
heap
page read and write
A154000
unkown
page read and write
3C2C00DE0000
direct allocation
page read and write
6320000
trusted library allocation
page read and write
20400374000
direct allocation
page read and write
E280000
unkown
page read and write
39000318000
direct allocation
page read and write
451D00201000
direct allocation
page read and write
6CF800220000
direct allocation
page read and write
2640000
heap
page read and write
1EDD1665000
heap
page read and write
274571A6000
unkown
page readonly
5C580000C000
direct allocation
page read and write
DC6F000
trusted library allocation
page read and write
3C2C00D60000
direct allocation
page read and write
5C58001AE000
direct allocation
page read and write
CDDF000
trusted library allocation
page read and write
180C0060C000
direct allocation
page read and write
6CF800201000
direct allocation
page read and write
7FF7FD74C000
unkown
page write copy
A67B000
heap
page read and write
D14000
heap
page read and write
7C5000324000
direct allocation
page read and write
F800000
trusted library allocation
page read and write
52F4000DC000
direct allocation
page read and write
711000704000
direct allocation
page read and write
5C58001A0000
direct allocation
page read and write
1B889D80000
unclassified section
page readonly
6B400260000
direct allocation
page read and write
15EC2E00000
heap
page read and write
6EF00161000
direct allocation
page read and write
3C2C00C71000
direct allocation
page read and write
8B8002CC000
direct allocation
page read and write
5C58000D4000
direct allocation
page read and write
98E7FE000
unkown
page readonly
290000220000
direct allocation
page read and write
CCE4000
trusted library allocation
page read and write
1EDD1665000
heap
page read and write
864F000
stack
page read and write
180C0071C000
direct allocation
page read and write
88E0000
heap
page read and write
1EDD163C000
heap
page read and write
F6A000
stack
page read and write
1EDD1644000
heap
page read and write
3C2C002CC000
direct allocation
page read and write
24E33FD000
stack
page read and write
F8F0000
trusted library allocation
page read and write
8D70000
unkown
page read and write
7FF7FD768000
unkown
page readonly
7FF7FD713000
unkown
page readonly
418400250000
direct allocation
page read and write
180C00968000
direct allocation
page read and write
A7BE000
heap
page read and write
1EDD163C000
heap
page read and write
13F800248000
direct allocation
page read and write
3C2C00CE4000
direct allocation
page read and write
180C00230000
direct allocation
page read and write
529C00268000
direct allocation
page read and write
C2E4000
unkown
page read and write
418400220000
direct allocation
page read and write
1EDD165D000
heap
page read and write
15EC3EE0000
unkown
page readonly
3C2C01034000
direct allocation
page read and write
A692000
heap
page read and write
1C7AD5A7000
unkown
page readonly
8ED5000
unkown
page read and write
663000088000
direct allocation
page read and write
61F000201000
direct allocation
page read and write
1BE6C9C0000
unclassified section
page read and write
2880000
heap
page read and write
1EDD163F000
heap
page read and write
2FC3000
heap
page read and write
7E3BDFE000
stack
page read and write
10FD000
stack
page read and write
663000108000
direct allocation
page read and write
332000258000
direct allocation
page read and write
E2A0000
heap
page read and write
CE00000
trusted library allocation
page read and write
7BA000240000
direct allocation
page read and write
B040000
unkown
page readonly
C04F000
unkown
page read and write
A0FF000
unkown
page read and write
332000270000
direct allocation
page read and write
101F7000
trusted library allocation
page read and write
27456D76000
unkown
page readonly
418400154000
direct allocation
page read and write
24E00000000
direct allocation
page readonly
52A4002FC000
direct allocation
page read and write
204002AC000
direct allocation
page read and write
7D0E000
stack
page read and write
1EDD163F000
heap
page read and write
400000
unkown
page readonly
81D0000
trusted library allocation
page read and write
6EF001C8000
direct allocation
page read and write
1EDD163C000
heap
page read and write
180C0080C000
direct allocation
page read and write
7FF7FD581000
unkown
page execute read
711000714000
direct allocation
page read and write
2FC0000
heap
page read and write
2ED0000
heap
page read and write
3C2C0023C000
direct allocation
page read and write
3C2C002CC000
direct allocation
page read and write
180C002C4000
direct allocation
page read and write
3C2C0100C000
direct allocation
page read and write
A1D2000
trusted library allocation
page read and write
CD54000
trusted library allocation
page read and write
7E395FE000
unkown
page readonly
1EDD163C000
heap
page read and write
1EDD163C000
heap
page read and write
81E0000
trusted library allocation
page read and write
180C0026C000
direct allocation
page read and write
24E73FE000
stack
page read and write
3C2C00D90000
direct allocation
page read and write
10281000
heap
page read and write
1EDD1665000
heap
page read and write
180C006CC000
direct allocation
page read and write
180C006CC000
direct allocation
page read and write
7FF7FD581000
unkown
page execute read
27B3FC30000
unclassified section
page readonly
180C00AEC000
direct allocation
page read and write
2900002E4000
direct allocation
page read and write
1BE6C749000
heap
page read and write
F6C0024C000
direct allocation
page read and write
1EDD1665000
heap
page read and write
788D000
stack
page read and write
3140000
direct allocation
page read and write
15EC2D40000
heap
page read and write
20400258000
direct allocation
page read and write
1EDD163F000
heap
page read and write
570000230000
direct allocation
page read and write
37E8000
direct allocation
page read and write
1EDD165F000
heap
page read and write
13FC0020C000
direct allocation
page read and write
7FF7FD77B000
unkown
page readonly
61F000270000
direct allocation
page read and write
5C58002F0000
direct allocation
page read and write
3C2C008A9000
direct allocation
page read and write
180C0125C000
direct allocation
page read and write
6630000E8000
direct allocation
page read and write
15EC2D50000
heap
page read and write
9E1D000
trusted library allocation
page read and write
1EDD166E000
heap
page read and write
13FC002A4000
direct allocation
page read and write
2500000
heap
page read and write
1BE6E220000
heap
page read and write
7C50002C8000
direct allocation
page read and write
87C000
unkown
page readonly
9D34000
trusted library allocation
page read and write
332000234000
direct allocation
page read and write
290000028000
direct allocation
page read and write
41840030C000
direct allocation
page read and write
9DC2000
trusted library allocation
page read and write
39E800338000
direct allocation
page read and write
8810000
unkown
page readonly
9800000
trusted library allocation
page read and write
1443000
direct allocation
page read and write
8B800278000
direct allocation
page read and write
180C006D2000
direct allocation
page read and write
3C2C00D10000
direct allocation
page read and write
1EDCFD9A000
heap
page read and write
7E21FFE000
stack
page read and write
E1B9000
stack
page read and write
180C00C8C000
direct allocation
page read and write
663000038000
direct allocation
page read and write
2E01000
heap
page read and write
7FF7FD580000
unkown
page readonly
9805000
trusted library allocation
page read and write
180C0030C000
direct allocation
page read and write
3C2C00349000
direct allocation
page read and write
180C00470000
direct allocation
page read and write
1EDD165D000
heap
page read and write
BBC0000
unkown
page read and write
529C0023C000
direct allocation
page read and write
85A0000
unkown
page read and write
290000170000
direct allocation
page read and write
1F4C00220000
direct allocation
page read and write
30C2000
heap
page read and write
3C2C00962000
direct allocation
page read and write
44B80029C000
direct allocation
page read and write
1EDD1665000
heap
page read and write
2800000
heap
page read and write
3320002E0000
direct allocation
page read and write
180C0080C000
direct allocation
page read and write
C3A8000
unkown
page read and write
6CF80021C000
direct allocation
page read and write
1EDD163F000
heap
page read and write
1EDD1665000
heap
page read and write
A647000
heap
page read and write
2B00000
heap
page read and write
1EDD163E000
heap
page read and write
2E0A000
stack
page read and write
9DD8000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
1F4C002A4000
direct allocation
page read and write
1EDD165B000
heap
page read and write
180C00704000
direct allocation
page read and write
CD700181000
direct allocation
page read and write
85A6000
heap
page read and write
180C005B0000
direct allocation
page read and write
7FFADC0B1000
unkown
page execute read
1EDD163C000
heap
page read and write
1BE6C9D7000
unclassified section
page read and write
C642000
unkown
page read and write
1C7AFC50000
unclassified section
page read and write
1EDD1653000
heap
page read and write
3195000
stack
page read and write
7FF7FD713000
unkown
page readonly
347E9FE000
stack
page read and write
2A40000
heap
page read and write
663000220000
direct allocation
page read and write
CE00000
trusted library allocation
page read and write
13DF99C0000
unkown
page readonly
3766000
direct allocation
page read and write
267C0040C000
direct allocation
page read and write
7FF7FD580000
unkown
page readonly
8579000
heap
page read and write
8B800260000
direct allocation
page read and write
CDFB000
trusted library allocation
page read and write
C374000
unkown
page read and write
41840027C000
direct allocation
page read and write
13F800230000
direct allocation
page read and write
3C2C001B0000
direct allocation
page read and write
1EDD165F000
heap
page read and write
7BA000294000
direct allocation
page read and write
20400220000
direct allocation
page read and write
9C59000
stack
page read and write
2700000
heap
page read and write
7C5000356000
direct allocation
page read and write
44B8002C8000
direct allocation
page read and write
CD7001CD000
direct allocation
page read and write
15EC2E16000
heap
page read and write
DC67000
trusted library allocation
page read and write
7FF7FD77B000
unkown
page readonly
384400244000
direct allocation
page read and write
180C00CDC000
direct allocation
page read and write
451400298000
direct allocation
page read and write
7AEC002B0000
direct allocation
page read and write
13F8002C4000
direct allocation
page read and write
27B3FBC3000
heap
page read and write
3E1400294000
direct allocation
page read and write
1EDD1665000
heap
page read and write
7C5000319000
direct allocation
page read and write
180C002F0000
direct allocation
page read and write
6320000
trusted library allocation
page read and write
3C2C00184000
direct allocation
page read and write
1F4C00138000
direct allocation
page read and write
180C012FC000
direct allocation
page read and write
39000418000
direct allocation
page read and write
3C2C008BC000
direct allocation
page read and write
1EDCFAC0000
remote allocation
page read and write
6B400230000
direct allocation
page read and write
1EDD163F000
heap
page read and write
30700020000
direct allocation
page readonly
842F000
stack
page read and write
CD20000
trusted library allocation
page read and write
1EDD165F000
heap
page read and write
9810000
trusted library allocation
page read and write
E2B9000
trusted library allocation
page read and write
8511000
unkown
page read and write
3C2C008BC000
direct allocation
page read and write
1EDD166E000
heap
page read and write
663000078000
direct allocation
page read and write
13DF9210000
unclassified section
page readonly
1EDD164B000
heap
page read and write
1B889D70000
unclassified section
page readonly
13DF9400000
heap
page read and write
1EDD166E000
heap
page read and write
1EDD165F000
heap
page read and write
47C0000
unkown
page read and write
BC00000
unkown
page readonly
334002DC000
direct allocation
page read and write
1EDD1637000
heap
page read and write
451D001C8000
direct allocation
page read and write
4730000
unkown
page read and write
1EDD164A000
heap
page read and write
1EDD1665000
heap
page read and write
42A800238000
direct allocation
page read and write
1EDD166E000
heap
page read and write
F6C00230000
direct allocation
page read and write
180C00250000
direct allocation
page read and write
102C7000
heap
page read and write
9D30000
trusted library allocation
page read and write
EEF4000
trusted library allocation
page read and write
1EDD1641000
heap
page read and write
1299000
heap
page read and write
27B3FAB0000
unclassified section
page readonly
180C00728000
direct allocation
page read and write
1EDD165F000
heap
page read and write
1EDD1687000
heap
page read and write
9800000
trusted library allocation
page read and write
1EDD165F000
heap
page read and write
DC6F000
trusted library allocation
page read and write
9C2000
heap
page read and write
44B800220000
direct allocation
page read and write
5C5800127000
direct allocation
page read and write
6EF00221000
direct allocation
page read and write
27456E46000
unkown
page readonly
6B4002C8000
direct allocation
page read and write
7FF7FD768000
unkown
page readonly
6B400244000
direct allocation
page read and write
1FF81882000
heap
page read and write
7FF7FD775000
unkown
page readonly
A63A000
heap
page read and write
A62A000
heap
page read and write
3C2C0088C000
direct allocation
page read and write
D0D6000
heap
page read and write
20400310000
direct allocation
page read and write
13F800244000
direct allocation
page read and write
3320002E8000
direct allocation
page read and write
570000250000
direct allocation
page read and write
3C2C00D88000
direct allocation
page read and write
6EF001C1000
direct allocation
page read and write
7280002B0000
direct allocation
page read and write
88E2000
heap
page read and write
1EDD1665000
heap
page read and write
27B3FB60000
heap
page readonly
32C7000
unkown
page read and write
CE09000
trusted library allocation
page read and write
180C00CB4000
direct allocation
page read and write
A71A000
heap
page read and write
8D74000
unkown
page read and write
15EC2DB0000
unclassified section
page readonly
5C580020C000
direct allocation
page read and write
1EDD165F000
heap
page read and write
529C00201000
direct allocation
page read and write
20400201000
direct allocation
page read and write
455C0031C000
direct allocation
page read and write
1C7AFBF0000
unclassified section
page readonly
27B3FC89000
heap
page read and write
991000
heap
page read and write
332000344000
direct allocation
page read and write
84DC000
stack
page read and write
418400190000
direct allocation
page read and write
3900020C000
direct allocation
page read and write
44B800404000
direct allocation
page read and write
711000188000
direct allocation
page read and write
1EDD1646000
heap
page read and write
23FD000
heap
page read and write
180C0090C000
direct allocation
page read and write
15EC33F0000
unkown
page readonly
1EDD163F000
heap
page read and write
3C2C00BC8000
direct allocation
page read and write
39E8002C8000
direct allocation
page read and write
7276000
unkown
page read and write
290000150000
direct allocation
page read and write
5700001BC000
direct allocation
page read and write
8B800320000
direct allocation
page read and write
7DE800818000
direct allocation
page read and write
E670000
trusted library allocation
page read and write
9927FE000
unkown
page readonly
7C500040C000
direct allocation
page read and write
663000054000
direct allocation
page read and write
1C100042000
direct allocation
page read and write
663000024000
direct allocation
page read and write
798E000
stack
page read and write
CD7001A1000
direct allocation
page read and write
15EC3070000
unclassified section
page read and write
A642000
heap
page read and write
77B0000
unkown
page read and write
1EDD1665000
heap
page read and write
C3E7000
unkown
page read and write
1EDD166E000
heap
page read and write
989FFE000
stack
page read and write
C12D000
unkown
page read and write
81E0000
trusted library allocation
page read and write
180C00140000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
B7AA000
stack
page read and write
663000220000
direct allocation
page read and write
3C2C0094C000
direct allocation
page read and write
1C700040000
direct allocation
page read and write
A114000
unkown
page read and write
1EDD165F000
heap
page read and write
1EDD165D000
heap
page read and write
1EDD166E000
heap
page read and write
1EDD163C000
heap
page read and write
13F800234000
direct allocation
page read and write
180C00348000
direct allocation
page read and write
1EDD1665000
heap
page read and write
1B889E10000
heap
page read and write
1B889F10000
unclassified section
page readonly
1EDD1687000
heap
page read and write
E370000
unkown
page read and write
1EDD1665000
heap
page read and write
7909000
stack
page read and write
61F000244000
direct allocation
page read and write
52A400338000
direct allocation
page read and write
180C00AD8000
direct allocation
page read and write
1EDD1644000
heap
page read and write
8AE4000
unkown
page read and write
24E53FE000
stack
page read and write
1F4C00234000
direct allocation
page read and write
2040029C000
direct allocation
page read and write
3C2C01028000
direct allocation
page read and write
3C2C00258000
direct allocation
page read and write
347F9FD000
stack
page read and write
44B800319000
direct allocation
page read and write
52F4000D4000
direct allocation
page read and write
14600200000
direct allocation
page read and write
24E3BFE000
stack
page read and write
1F4C0026C000
direct allocation
page read and write
451D00221000
direct allocation
page read and write
1B88B0C0000
unkown
page readonly
1EDD1636000
heap
page read and write
5700002E4000
direct allocation
page read and write
2B80000
heap
page read and write
6CF800060000
direct allocation
page read and write
180C00CDC000
direct allocation
page read and write
9DF4000
trusted library allocation
page read and write
52A4002F1000
direct allocation
page read and write
3C2C00264000
direct allocation
page read and write
180C007A0000
direct allocation
page read and write
1EDD165F000
heap
page read and write
9CE000
heap
page read and write
1EDD166E000
heap
page read and write
52F400140000
direct allocation
page read and write
1EDD1665000
heap
page read and write
570000154000
direct allocation
page read and write
1C7ACC90000
heap
page read and write
8D6C000
unkown
page read and write
3C2C00CE0000
direct allocation
page read and write
7DE800344000
direct allocation
page read and write
1EDD163C000
heap
page read and write
3C2C008BC000
direct allocation
page read and write
7E1DFFF000
stack
page read and write
1EDD166E000
heap
page read and write
1EDD166E000
heap
page read and write
3C2C0094C000
direct allocation
page read and write
1EDD166E000
heap
page read and write
894000
unkown
page readonly
1EDD163C000
heap
page read and write
9D8E000
stack
page read and write
29000004C000
direct allocation
page read and write
7BA0002B0000
direct allocation
page read and write
718B000
unkown
page read and write
7C00000
unkown
page readonly
1EDD1665000
heap
page read and write
2F17000
heap
page read and write
1EDD1687000
heap
page read and write
83D0000
trusted library allocation
page read and write
14600020000
direct allocation
page readonly
1EDD166E000
heap
page read and write
1EDD166E000
heap
page read and write
A8CA000
unkown
page read and write
1F4C002D4000
direct allocation
page read and write
7C50002D4000
direct allocation
page read and write
1EDD163F000
heap
page read and write
76B0000
unkown
page read and write
61F0002A4000
direct allocation
page read and write
8591000
heap
page read and write
711000718000
direct allocation
page read and write
7FFADB6B1000
unkown
page execute read
E260000
unkown
page read and write
2FC0000
heap
page read and write
5C58000F0000
direct allocation
page read and write
44B800233000
direct allocation
page read and write
39000221000
direct allocation
page read and write
180C002E4000
direct allocation
page read and write
39000268000
direct allocation
page read and write
332000804000
direct allocation
page read and write
1EDD1637000
heap
page read and write
C632000
unkown
page read and write
6B400250000
direct allocation
page read and write
44B800330000
direct allocation
page read and write
52F400044000
direct allocation
page read and write
22C2000
heap
page read and write
61F00026C000
direct allocation
page read and write
CE00000
trusted library allocation
page read and write
2E40000
heap
page read and write
1B889F50000
heap
page read and write
44B8002E4000
direct allocation
page read and write
1BE6DEA2000
unkown
page readonly
1EDD165D000
heap
page read and write
8B8002ED000
direct allocation
page read and write
D3D1000
trusted library allocation
page read and write
7FFAE10B1000
unkown
page execute read
7DE800318000
direct allocation
page read and write
3C2C00DE8000
direct allocation
page read and write
736BFE000
stack
page read and write
180C006D7000
direct allocation
page read and write
5161000
unkown
page read and write
7FF7FD758000
unkown
page write copy
27456E2E000
unkown
page readonly
1EDD1665000
heap
page read and write
72FE000
unkown
page read and write
1EDD1665000
heap
page read and write
9CE000
heap
page read and write
180C0080C000
direct allocation
page read and write
32C9000
unkown
page read and write
52F400084000
direct allocation
page read and write
72C3000
unkown
page read and write
A129000
unkown
page read and write
C328000
unkown
page read and write
1EDD166E000
heap
page read and write
66300030C000
direct allocation
page read and write
3C2C009AC000
direct allocation
page read and write
DC74000
trusted library allocation
page read and write
3C2C001B0000
direct allocation
page read and write
180C00140000
direct allocation
page read and write
52F400040000
direct allocation
page read and write
6B4002D4000
direct allocation
page read and write
27456D51000
unkown
page readonly
4769000
unkown
page read and write
1EDD165D000
heap
page read and write
180C00240000
direct allocation
page read and write
8D60000
unkown
page read and write
290000114000
direct allocation
page read and write
27B3FC80000
heap
page read and write
120E000
stack
page read and write
88EA000
heap
page read and write
2900001BC000
direct allocation
page read and write
7FF7FD580000
unkown
page readonly
1EDD166D000
heap
page read and write
102C9000
heap
page read and write
13DF9270000
remote allocation
page read and write
1EDD164B000
heap
page read and write
332000210000
direct allocation
page read and write
7FF7FD713000
unkown
page readonly
1EDD1665000
heap
page read and write
27B40310000
unkown
page readonly
455C00314000
direct allocation
page read and write
1EDD166E000
heap
page read and write
71100014C000
direct allocation
page read and write
CE09000
trusted library allocation
page read and write
C24F000
unkown
page read and write
1EDD165D000
heap
page read and write
1F4C00210000
direct allocation
page read and write
79B0000
unkown
page read and write
180C006D7000
direct allocation
page read and write
22880027C000
direct allocation
page read and write
180C0043C000
direct allocation
page read and write
83E0000
trusted library allocation
page read and write
6CF800134000
direct allocation
page read and write
8DFE000
unkown
page read and write
C3AE000
unkown
page read and write
1EDD165F000
heap
page read and write
7FF7FD713000
unkown
page readonly
52F400078000
direct allocation
page read and write
3C2C00DD8000
direct allocation
page read and write
C1DB000
unkown
page read and write
37AC000
direct allocation
page read and write
180C007C8000
direct allocation
page read and write
83D0000
trusted library allocation
page read and write
570000198000
direct allocation
page read and write
8EEE000
unkown
page read and write
1EDD166E000
heap
page read and write
B72B000
stack
page read and write
1EDD1665000
heap
page read and write
3C2C00930000
direct allocation
page read and write
37ED000
direct allocation
page read and write
5C580013F000
direct allocation
page read and write
2C8E000
stack
page read and write
CDAD000
trusted library allocation
page read and write
1EDD1653000
heap
page read and write
20400408000
direct allocation
page read and write
180C00220000
direct allocation
page read and write
14A0000
heap
page read and write
1EDD165D000
heap
page read and write
6EF001A1000
direct allocation
page read and write
180C00144000
direct allocation
page read and write
2801000
heap
page read and write
3C2C00BC8000
direct allocation
page read and write
8B800364000
direct allocation
page read and write
27B3FCE6000
heap
page read and write
79A0000
unkown
page read and write
F7F0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
180C006D2000
direct allocation
page read and write
6B400254000
direct allocation
page read and write
2F80000
heap
page read and write
9E1000
heap
page read and write
180C00B8C000
direct allocation
page read and write
1EDD165F000
heap
page read and write
8EF5000
unkown
page read and write
1EDD1665000
heap
page read and write
1EDD166D000
heap
page read and write
3240000
heap
page read and write
27B3FD1D000
heap
page read and write
A850000
unkown
page read and write
29000011C000
direct allocation
page read and write
1EDD163C000
heap
page read and write
280002B0000
direct allocation
page read and write
7FFADD4B1000
unkown
page execute read
101FD000
trusted library allocation
page read and write
13FC002B0000
direct allocation
page read and write
A08D000
stack
page read and write
1D1474C0000
remote allocation
page read and write
1C7AC9C0000
heap
page read and write
3C2C00D10000
direct allocation
page read and write
15EC30A5000
heap
page read and write
3C2C00930000
direct allocation
page read and write
1EDD165F000
heap
page read and write
6630002D8000
direct allocation
page read and write
7FF7FD775000
unkown
page readonly
6B400284000
direct allocation
page read and write
52F40000C000
direct allocation
page read and write
7306000
unkown
page read and write
1EDD1665000
heap
page read and write
8390000
unkown
page read and write
3C2C00234000
direct allocation
page read and write
7AEC0027C000
direct allocation
page read and write
1BE6C6C0000
remote allocation
page read and write
6CF8000F4000
direct allocation
page read and write
32F3000
unkown
page read and write
810000
unkown
page readonly
3C2C00D60000
direct allocation
page read and write
1EDD1665000
heap
page read and write
2F84000
unkown
page read and write
3C2C0041C000
direct allocation
page read and write
3C2C008E4000
direct allocation
page read and write
13DF93E0000
heap
page read and write
66300040C000
direct allocation
page read and write
180C00AEC000
direct allocation
page read and write
F6C002C8000
direct allocation
page read and write
663000118000
direct allocation
page read and write
1EDD1649000
heap
page read and write
3C2C008D0000
direct allocation
page read and write
13DF9675000
heap
page read and write
1EDD166E000
heap
page read and write
3C2C00250000
direct allocation
page read and write
1020A000
trusted library allocation
page read and write
27B3FB80000
heap
page read and write
1EDD165F000
heap
page read and write
DC70000
trusted library allocation
page read and write
9DC4000
trusted library allocation
page read and write
52A40030B000
direct allocation
page read and write
180C00348000
direct allocation
page read and write
180C009A4000
direct allocation
page read and write
9E06000
trusted library allocation
page read and write
A858000
unkown
page read and write
1EDD164D000
heap
page read and write
CD60000
trusted library allocation
page read and write
995E000
stack
page read and write
180C007CA000
direct allocation
page read and write
EE8E000
trusted library allocation
page read and write
8582000
heap
page read and write
6630000B4000
direct allocation
page read and write
1EDD166E000
heap
page read and write
44B800344000
direct allocation
page read and write
1EDD1653000
heap
page read and write
180C00734000
direct allocation
page read and write
3C2C0021C000
direct allocation
page read and write
1C700020000
direct allocation
page readonly
3C2C00224000
direct allocation
page read and write
9810000
trusted library allocation
page read and write
384400298000
direct allocation
page read and write
2E41000
heap
page read and write
1EDD166E000
heap
page read and write
1EDD166E000
heap
page read and write
3B57000
direct allocation
page read and write
180C001D0000
direct allocation
page read and write
1EDD165D000
heap
page read and write
EE8A000
trusted library allocation
page read and write
15EC2D43000
heap
page read and write
7178000
unkown
page read and write
455C00238000
direct allocation
page read and write
811000
unkown
page execute read
1EDD165F000
heap
page read and write
14600042000
direct allocation
page read and write
180C00388000
direct allocation
page read and write
27B3FB50000
heap
page read and write
7DE800327000
direct allocation
page read and write
102C2000
heap
page read and write
7FF7FD74C000
unkown
page write copy
7FF7FD759000
unkown
page write copy
20400338000
direct allocation
page read and write
8BD9000
stack
page read and write
13F800294000
direct allocation
page read and write
44B8002AC000
direct allocation
page read and write
10DFF000
trusted library allocation
page read and write
9D6000
heap
page read and write
1EDD166E000
heap
page read and write
180C0026C000
direct allocation
page read and write
66300014C000
direct allocation
page read and write
384400254000
direct allocation
page read and write
4732000
unkown
page read and write
3C2C00254000
direct allocation
page read and write
39000408000
direct allocation
page read and write
39000356000
direct allocation
page read and write
1EDD1665000
heap
page read and write
180C0088C000
direct allocation
page read and write
418400240000
direct allocation
page read and write
3C2C0025C000
direct allocation
page read and write
2EC0000
heap
page read and write
180C006D2000
direct allocation
page read and write
24E23FE000
stack
page read and write
2E00000
heap
page read and write
7C5000324000
direct allocation
page read and write
1EDD1653000
heap
page read and write
6CF8000A4000
direct allocation
page read and write
1EDD163C000
heap
page read and write
2C06000
stack
page read and write
418400194000
direct allocation
page read and write
44B800221000
direct allocation
page read and write
8B8002F8000
direct allocation
page read and write
13DF92A0000
remote allocation
page read and write
52A4002B0000
direct allocation
page read and write
1020000
heap
page read and write
29000027C000
direct allocation
page read and write
1BE6D8E0000
unkown
page readonly
1EDD163F000
heap
page read and write
3741000
direct allocation
page read and write
4184001AE000
direct allocation
page read and write
894000
unkown
page readonly
3C2C0119C000
direct allocation
page read and write
1EDD163F000
heap
page read and write
29000010C000
direct allocation
page read and write
CD6B000
trusted library allocation
page read and write
6324000
trusted library allocation
page read and write
10190000
trusted library allocation
page read and write
1FFFB9D3000
heap
page read and write
280002B0000
direct allocation
page read and write
1F4C002C0000
direct allocation
page read and write
529C00258000
direct allocation
page read and write
1295000
heap
page read and write
1EDD1641000
heap
page read and write
1EDD163C000
heap
page read and write
7FF7FD580000
unkown
page readonly
1EDD164A000
heap
page read and write
7FF7FD775000
unkown
page readonly
3C2C00975000
direct allocation
page read and write
27456E6F000
unkown
page readonly
52F4000E8000
direct allocation
page read and write
180C0125C000
direct allocation
page read and write
102D4000
heap
page read and write
A118000
unkown
page read and write
7FF7FD581000
unkown
page execute read
77D00027C000
direct allocation
page read and write
1EDD165F000
heap
page read and write
10CB2000
trusted library allocation
page read and write
B070000
unkown
page read and write
38440029C000
direct allocation
page read and write
88C000
unkown
page read and write
570000220000
direct allocation
page read and write
1EDD1665000
heap
page read and write
46F6000
unkown
page read and write
384400274000
direct allocation
page read and write
1EDD1665000
heap
page read and write
3C2C0024C000
direct allocation
page read and write
21000020000
direct allocation
page readonly
5C58000E8000
direct allocation
page read and write
C1DF000
unkown
page read and write
1EDD1638000
heap
page read and write
3C2C00D3C000
direct allocation
page read and write
9810000
trusted library allocation
page read and write
384400210000
direct allocation
page read and write
10A5000
heap
page read and write
27456DFC000
unkown
page readonly
3C2C00922000
direct allocation
page read and write
F7A0000
trusted library allocation
page read and write
27B3FBC0000
heap
page read and write
1C7AC9F0000
heap
page read and write
41840031C000
direct allocation
page read and write
180C006D2000
direct allocation
page read and write
BF3F000
stack
page read and write
D1CA000
heap
page read and write
1EDD1641000
heap
page read and write
810000
unkown
page readonly
180C00710000
direct allocation
page read and write
290000240000
direct allocation
page read and write
2E81000
heap
page read and write
13DFADD0000
heap
page read and write
3E14002B0000
direct allocation
page read and write
1EDD1639000
heap
page read and write
2780000
heap
page read and write
9C7000
heap
page read and write
A0A8000
unkown
page read and write
39E800315000
direct allocation
page read and write
EF18000
trusted library allocation
page read and write
1EDD165D000
heap
page read and write
1EDD1658000
heap
page read and write
180C0090C000
direct allocation
page read and write
9E1B000
trusted library allocation
page read and write
1EDD1665000
heap
page read and write
4C2000
unkown
page write copy
1E493589000
heap
page read and write
3C2C008E4000
direct allocation
page read and write
A810000
unkown
page read and write
52A4002FC000
direct allocation
page read and write
90F2000
unkown
page read and write
CD47000
trusted library allocation
page read and write
27456D82000
unkown
page readonly
61F000294000
direct allocation
page read and write
2040035C000
direct allocation
page read and write
B080000
unkown
page read and write
1EDD165D000
heap
page read and write
3C2C0099C000
direct allocation
page read and write
663000028000
direct allocation
page read and write
13DFAA12000
unkown
page readonly
89C0000
unkown
page read and write
6320000
trusted library allocation
page read and write
81E0000
trusted library allocation
page read and write
2E8F000
heap
page read and write
290000230000
direct allocation
page read and write
F1D0000
trusted library allocation
page read and write
13DFAD80000
unclassified section
page readonly
1EDD166E000
heap
page read and write
2F17000
heap
page read and write
1EDD163F000
heap
page read and write
1EDD163F000
heap
page read and write
A215000
unkown
page read and write
CDD0000
trusted library allocation
page read and write
529C00234000
direct allocation
page read and write
BBE0000
unkown
page readonly
8570000
unkown
page readonly
7300000
unkown
page read and write
180C0064C000
direct allocation
page read and write
1EDD165F000
heap
page read and write
27456E6A000
unkown
page readonly
3450000
unkown
page read and write
7FF7FD758000
unkown
page write copy
9DA000
heap
page read and write
3C2C00363000
direct allocation
page read and write
2D40000
heap
page read and write
A286000
unkown
page read and write
13DF9600000
unkown
page readonly
83F0000
trusted library allocation
page read and write
10201000
trusted library allocation
page read and write
2F90000
unkown
page readonly
451D001C1000
direct allocation
page read and write
15EC2C40000
unclassified section
page readonly
6CF8000AC000
direct allocation
page read and write
1EDD166E000
heap
page read and write
1E493575000
heap
page read and write
1EDD166E000
heap
page read and write
52F4000D8000
direct allocation
page read and write
6CF800128000
direct allocation
page read and write
39000310000
direct allocation
page read and write
A632000
heap
page read and write
1060000
unkown
page read and write
290000140000
direct allocation
page read and write
180C009A4000
direct allocation
page read and write
418400220000
direct allocation
page read and write
180C00968000
direct allocation
page read and write
83D0000
trusted library allocation
page read and write
1EDD165F000
heap
page read and write
711000188000
direct allocation
page read and write
91D9000
stack
page read and write
27456DF7000
unkown
page readonly
3C2C01154000
direct allocation
page read and write
3C2C001BC000
direct allocation
page read and write
1EDD1665000
heap
page read and write
204002C8000
direct allocation
page read and write
1027B000
heap
page read and write
A6F7000
heap
page read and write
1EDD166E000
heap
page read and write
1EDD164D000
heap
page read and write
44B800418000
direct allocation
page read and write
C74000
heap
page read and write
E2A6000
trusted library allocation
page read and write
39E800221000
direct allocation
page read and write
9805000
trusted library allocation
page read and write
529C00220000
direct allocation
page read and write
3C2C00977000
direct allocation
page read and write
9CA000
heap
page read and write
E2C0000
trusted library allocation
page read and write
83E0000
trusted library allocation
page read and write
CD6F000
trusted library allocation
page read and write
180C0090C000
direct allocation
page read and write
180C00B8C000
direct allocation
page read and write
171C00288000
direct allocation
page read and write
418400044000
direct allocation
page read and write
7FF7FD581000
unkown
page execute read
2B01000
heap
page read and write
7DE800366000
direct allocation
page read and write
8B80040C000
direct allocation
page read and write
73C5000
stack
page read and write
1EDD165F000
heap
page read and write
3C2C00C59000
direct allocation
page read and write
DCA0000
trusted library allocation
page read and write
570000230000
direct allocation
page read and write
9847FE000
unkown
page readonly
267C002F4000
direct allocation
page read and write
13DF9280000
remote allocation
page read and write
CD5D000
trusted library allocation
page read and write
15EC2D70000
trusted library allocation
page read and write
3C2C00D50000
direct allocation
page read and write
1EDD163C000
heap
page read and write
CDB8000
trusted library allocation
page read and write
7FF7FD74C000
unkown
page write copy
CD700121000
direct allocation
page read and write
1EDD163C000
heap
page read and write
39E800320000
direct allocation
page read and write
9C16000
trusted library allocation
page read and write
1B889FD0000
heap
page read and write
28000244000
direct allocation
page read and write
44B800370000
direct allocation
page read and write
2480000
heap
page read and write
6CF800038000
direct allocation
page read and write
7FF7FD763000
unkown
page read and write
15F49930000
unclassified section
page read and write
7FF7FD77B000
unkown
page readonly
C59000
heap
page read and write
570000220000
direct allocation
page read and write
4800000
unkown
page read and write
1BE6D317000
unkown
page readonly
A4B001C8000
direct allocation
page read and write
267C0032C000
direct allocation
page read and write
180C00728000
direct allocation
page read and write
3440000
unkown
page readonly
66300027C000
direct allocation
page read and write
1EDD1632000
heap
page read and write
180C00AEC000
direct allocation
page read and write
5700001F0000
direct allocation
page read and write
1EDD164B000
heap
page read and write
1B889FF3000
heap
page read and write
52F4000CC000
direct allocation
page read and write
A4B00181000
direct allocation
page read and write
13DF9300000
heap
page read and write
3230000
unkown
page read and write
2E4F000
heap
page read and write
384400201000
direct allocation
page read and write
C063000
unkown
page read and write
13FC00270000
direct allocation
page read and write
3C2C0090C000
direct allocation
page read and write
27456D98000
unkown
page readonly
7E385FE000
unkown
page readonly
7FF7FD581000
unkown
page execute read
3C2C01160000
direct allocation
page read and write
7FF7FD581000
unkown
page execute read
180C0154C000
direct allocation
page read and write
267C00356000
direct allocation
page read and write
7C8C00234000
direct allocation
page read and write
1EDD163C000
heap
page read and write
7E34DFE000
stack
page read and write
7C5000333000
direct allocation
page read and write
3C2C00DE0000
direct allocation
page read and write
DCA0000
trusted library allocation
page read and write
CD700201000
direct allocation
page read and write
711000148000
direct allocation
page read and write
477D000
unkown
page read and write
39000240000
direct allocation
page read and write
9857FE000
unkown
page readonly
3C2C00D8C000
direct allocation
page read and write
1C700200000
direct allocation
page readonly
CD7001E1000
direct allocation
page read and write
A1A4000
trusted library allocation
page read and write
180C00734000
direct allocation
page read and write
F6C00234000
direct allocation
page read and write
9BF000
heap
page read and write
9800000
trusted library allocation
page read and write
7280002B0000
direct allocation
page read and write
3043000
heap
page read and write
9D30000
trusted library allocation
page read and write
3900033C000
direct allocation
page read and write
1EDD1665000
heap
page read and write
735BFE000
stack
page read and write
1EDD165F000
heap
page read and write
1B88A9F7000
unkown
page readonly
180C00940000
direct allocation
page read and write
1EDD165F000
heap
page read and write
8598000
heap
page read and write
B3AB000
stack
page read and write
7FF7FD581000
unkown
page execute read
A685000
heap
page read and write
8B800340000
direct allocation
page read and write
7FF7FD77B000
unkown
page readonly
2F41000
heap
page read and write
1FF823A1000
heap
page read and write
44B800315000
direct allocation
page read and write
13FC002C0000
direct allocation
page read and write
101FB000
trusted library allocation
page read and write
6B400234000
direct allocation
page read and write
663000250000
direct allocation
page read and write
1B88B120000
unkown
page readonly
3C2C00244000
direct allocation
page read and write
9D31000
trusted library allocation
page read and write
27B3FB3D000
remote allocation
page execute read
7FF7FD768000
unkown
page readonly
1EDD166E000
heap
page read and write
A1DD000
trusted library allocation
page read and write
10A0000
heap
page read and write
1EDD163C000
heap
page read and write
1EDD163C000
heap
page read and write
61F000268000
direct allocation
page read and write
81E0000
trusted library allocation
page read and write
180C006D2000
direct allocation
page read and write
39000240000
direct allocation
page read and write
3706000
direct allocation
page read and write
1BE6C6A0000
remote allocation
page read and write
7FF7FD77B000
unkown
page readonly
180C00230000
direct allocation
page read and write
180C006EC000
direct allocation
page read and write
180C007A0000
direct allocation
page read and write
7FF7FD74C000
unkown
page write copy
F6C00210000
direct allocation
page read and write
1EDD163F000
heap
page read and write
C214000
unkown
page read and write
7FF7FD77B000
unkown
page readonly
2F41000
heap
page read and write
11370000
unkown
page read and write
AD10000
unkown
page readonly
370F000
direct allocation
page read and write
716E000
unkown
page read and write
180C00388000
direct allocation
page read and write
902C000
unkown
page read and write
E2A3000
trusted library allocation
page read and write
81E0000
trusted library allocation
page read and write
83B0000
trusted library allocation
page read and write
290000250000
direct allocation
page read and write
400000
unkown
page readonly
1EDD166E000
heap
page read and write
6EF00141000
direct allocation
page read and write
3C2C00349000
direct allocation
page read and write
5C5800230000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
29000006D000
direct allocation
page read and write
2F17000
heap
page read and write
13DF9220000
unclassified section
page readonly
1023000
heap
page read and write
14600040000
direct allocation
page read and write
5C580030C000
direct allocation
page read and write
84E0000
unkown
page readonly
39000290000
direct allocation
page read and write
1EDD163F000
heap
page read and write
5C5800044000
direct allocation
page read and write
27B3FFC0000
heap
page read and write
83D0000
trusted library allocation
page read and write
455C00408000
direct allocation
page read and write
1EDD166E000
heap
page read and write
180C0088C000
direct allocation
page read and write
DCA0000
trusted library allocation
page read and write
1EDD1658000
heap
page read and write
1EDD163C000
heap
page read and write
8B800307000
direct allocation
page read and write
5700001B6000
direct allocation
page read and write
3C2C0089C000
direct allocation
page read and write
34B5000
direct allocation
page read and write
30700200000
direct allocation
page read and write
1FF82343000
heap
page read and write
F7F0000
trusted library allocation
page read and write
180C00450000
direct allocation
page read and write
1EDD163C000
heap
page read and write
2F7E000
unkown
page read and write
2FC0000
heap
page read and write
3C2C00178000
direct allocation
page read and write
15EC2D90000
heap
page read and write
DCB0000
trusted library allocation
page read and write
39000333000
direct allocation
page read and write
529C00210000
direct allocation
page read and write
3C2C00737000
direct allocation
page read and write
180C0030C000
direct allocation
page read and write
2C80000
heap
page read and write
1EDD1676000
heap
page read and write
E2B3000
trusted library allocation
page read and write
1EDD163F000
heap
page read and write
F7A0000
remote allocation
page read and write
1B88BA60000
direct allocation
page read and write
290000230000
direct allocation
page read and write
3249000
unkown
page read and write
20400240000
direct allocation
page read and write
61F0002A4000
direct allocation
page read and write
CE37000
trusted library allocation
page read and write
1EDD165F000
heap
page read and write
663000060000
direct allocation
page read and write
EF3B000
trusted library allocation
page read and write
33200028C000
direct allocation
page read and write
98DFFD000
stack
page read and write
1FF81880000
heap
page read and write
10CB6000
trusted library allocation
page read and write
3C2C00918000
direct allocation
page read and write
1C7ACA82000
heap
page read and write
4820000
unkown
page read and write
27456DE7000
unkown
page readonly
1E493579000
heap
page read and write
5C5800230000
direct allocation
page read and write
7393FF000
stack
page read and write
2530000
direct allocation
page read and write
39E8002D4000
direct allocation
page read and write
180C00C0C000
direct allocation
page read and write
1FF82356000
heap
page read and write
1F4C00258000
direct allocation
page read and write
3470000
direct allocation
page read and write
71FC000
unkown
page read and write
180C00734000
direct allocation
page read and write
5C580020C000
direct allocation
page read and write
8DA6000
unkown
page read and write
267C00314000
direct allocation
page read and write
1EDD165D000
heap
page read and write
44B8002D4000
direct allocation
page read and write
711000188000
direct allocation
page read and write
72FC000
unkown
page read and write
1BE6C740000
heap
page read and write
1EDD166E000
heap
page read and write
1EDD166E000
heap
page read and write
1EDD1665000
heap
page read and write
27B3FB40000
unclassified section
page readonly
1EDD1653000
heap
page read and write
1C100000000
direct allocation
page readonly
180C00CB4000
direct allocation
page read and write
1BE6CD50000
unkown
page readonly
180C0071C000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
CDDA000
trusted library allocation
page read and write
1EDD165F000
heap
page read and write
1EDCFD9A000
heap
page read and write
9810000
trusted library allocation
page read and write
180C00150000
direct allocation
page read and write
EE72000
trusted library allocation
page read and write
10DB0000
trusted library allocation
page read and write
20400404000
direct allocation
page read and write
180C0060C000
direct allocation
page read and write
1EDD166E000
heap
page read and write
1EDCFD9C000
heap
page read and write
66300026C000
direct allocation
page read and write
1C7ACA1A000
heap
page read and write
180C006EC000
direct allocation
page read and write
5C5800110000
direct allocation
page read and write
180C0064C000
direct allocation
page read and write
13FC002A4000
direct allocation
page read and write
9917FE000
unkown
page readonly
9C14000
trusted library allocation
page read and write
1F4C000FC000
direct allocation
page read and write
81D0000
trusted library allocation
page read and write
DA0000
heap
page read and write
1BE6E320000
direct allocation
page read and write
EEEC000
trusted library allocation
page read and write
570000308000
direct allocation
page read and write
52F400120000
direct allocation
page read and write
1EDD164B000
heap
page read and write
CE09000
trusted library allocation
page read and write
10B0000
unkown
page readonly
180C00710000
direct allocation
page read and write
37C4000
direct allocation
page read and write
3C2C00D88000
direct allocation
page read and write
52F400028000
direct allocation
page read and write
4184001BC000
direct allocation
page read and write
1EDD165F000
heap
page read and write
8820000
unkown
page readonly
52F400040000
direct allocation
page read and write
1EDD165F000
heap
page read and write
1EDD163C000
heap
page read and write
5C5800220000
direct allocation
page read and write
57E8002B0000
direct allocation
page read and write
280002B4000
direct allocation
page read and write
5C5800038000
direct allocation
page read and write
1EDD1665000
heap
page read and write
204002FC000
direct allocation
page read and write
6D8000
unkown
page write copy
9F8F000
stack
page read and write
3C2C00C54000
direct allocation
page read and write
7FF7FD713000
unkown
page readonly
1EDD166E000
heap
page read and write
8B800334000
direct allocation
page read and write
3C2C005D4000
direct allocation
page read and write
39E800338000
direct allocation
page read and write
180C00704000
direct allocation
page read and write
991FFE000
stack
page read and write
1EDD165D000
heap
page read and write
347C9FE000
stack
page read and write
81D0000
trusted library allocation
page read and write
DCA5000
trusted library allocation
page read and write
1C7ACFE0000
unkown
page readonly
71100014C000
direct allocation
page read and write
332000201000
direct allocation
page read and write
24E5BFE000
stack
page read and write
4785000
unkown
page read and write
44B800344000
direct allocation
page read and write
3C2C00970000
direct allocation
page read and write
1B88A410000
heap
page read and write
1EDCFD9A000
heap
page read and write
13FC00234000
direct allocation
page read and write
3C2C007E4000
direct allocation
page read and write
1EDD1665000
heap
page read and write
1EDD165F000
heap
page read and write
20400320000
direct allocation
page read and write
1EDD165D000
heap
page read and write
9800000
trusted library allocation
page read and write
3C2C00440000
direct allocation
page read and write
529C00290000
direct allocation
page read and write
180C00250000
direct allocation
page read and write
39E80032F000
direct allocation
page read and write
7333F8000
stack
page read and write
52F400138000
direct allocation
page read and write
5C5800194000
direct allocation
page read and write
1EDD166D000
heap
page read and write
BBD0000
unkown
page readonly
7FF7FD768000
unkown
page readonly
8B800404000
direct allocation
page read and write
15EC4820000
heap
page read and write
6CF8000C4000
direct allocation
page read and write
20400290000
direct allocation
page read and write
180C00728000
direct allocation
page read and write
171C00294000
direct allocation
page read and write
1EDD163C000
heap
page read and write
81E0000
trusted library allocation
page read and write
1B88B930000
heap
page read and write
CD73000
trusted library allocation
page read and write
910000
unkown
page readonly
9810000
trusted library allocation
page read and write
27456DC6000
unkown
page readonly
2E86000
stack
page read and write
180C00160000
direct allocation
page read and write
180C0020C000
direct allocation
page read and write
29000003C000
direct allocation
page read and write
24E80000000
unclassified section
page read and write
3C2C00DD0000
direct allocation
page read and write
982FFB000
stack
page read and write
9805000
trusted library allocation
page read and write
663000044000
direct allocation
page read and write
180C009A4000
direct allocation
page read and write
1EDD165D000
heap
page read and write
1EDD1665000
heap
page read and write
9D4000
heap
page read and write
451400294000
direct allocation
page read and write
7FF7FD758000
unkown
page write copy
390002D4000
direct allocation
page read and write
14600200000
direct allocation
page readonly
DC70000
trusted library allocation
page read and write
E60000
unkown
page readonly
3C2C00554000
direct allocation
page read and write
1EDD166E000
heap
page read and write
71A4000
unkown
page read and write
3900034C000
direct allocation
page read and write
1299000
heap
page read and write
240D000
heap
page read and write
2900002F0000
direct allocation
page read and write
10CB8000
trusted library allocation
page read and write
570000240000
direct allocation
page read and write
9F0E000
stack
page read and write
1EDD163C000
heap
page read and write
A4B001E1000
direct allocation
page read and write
717E000
unkown
page read and write
663000150000
direct allocation
page read and write
CD56000
trusted library allocation
page read and write
1C700200000
direct allocation
page read and write
4F840023C000
direct allocation
page read and write
39000319000
direct allocation
page read and write
180C006D7000
direct allocation
page read and write
204002BC000
direct allocation
page read and write
811000
unkown
page execute read
6CF8000D8000
direct allocation
page read and write
44B8002FC000
direct allocation
page read and write
6F3000
unkown
page readonly
1EDD1665000
heap
page read and write
C072000
unkown
page read and write
1B889DD0000
remote allocation
page read and write
6CF800044000
direct allocation
page read and write
9800000
trusted library allocation
page read and write
98F7FE000
unkown
page readonly
B82A000
stack
page read and write
1F4C00294000
direct allocation
page read and write
3C2C009BC000
direct allocation
page read and write
180C00220000
direct allocation
page read and write
1EDD163F000
heap
page read and write
1C100200000
direct allocation
page readonly
2288002B0000
direct allocation
page read and write
81E0000
trusted library allocation
page read and write
180C0090C000
direct allocation
page read and write
32DB000
unkown
page read and write
180C0031C000
direct allocation
page read and write
180C0020C000
direct allocation
page read and write
1EDD1637000
heap
page read and write
C06D000
unkown
page read and write
1EDD1665000
heap
page read and write
5C580031C000
direct allocation
page read and write
1B88CA60000
direct allocation
page read and write
6630000D2000
direct allocation
page read and write
180C010D4000
direct allocation
page read and write
2E80000
heap
page read and write
332000404000
direct allocation
page read and write
5C5800230000
direct allocation
page read and write
13DF9420000
trusted library allocation
page read and write
EE94000
trusted library allocation
page read and write
44B800268000
direct allocation
page read and write
347C1FE000
stack
page read and write
1EDD1665000
heap
page read and write
180C00728000
direct allocation
page read and write
EE70000
trusted library allocation
page read and write
5C5800240000
direct allocation
page read and write
1F4C002B0000
direct allocation
page read and write
8B800350000
direct allocation
page read and write
1441000
unkown
page readonly
7FF7FD77B000
unkown
page readonly
57000030C000
direct allocation
page read and write
8B800220000
direct allocation
page read and write
204002E4000
direct allocation
page read and write
1EDD166D000
heap
page read and write
1EDD1665000
heap
page read and write
EEC0000
trusted library allocation
page read and write
180C0140C000
direct allocation
page read and write
180C00AEC000
direct allocation
page read and write
3C2C0090C000
direct allocation
page read and write
DC71000
trusted library allocation
page read and write
728000290000
direct allocation
page read and write
1EDD1638000
heap
page read and write
1EDD165F000
heap
page read and write
180C0080C000
direct allocation
page read and write
98FFFE000
stack
page read and write
38440028C000
direct allocation
page read and write
39000370000
direct allocation
page read and write
C04B000
unkown
page read and write
1EDD164B000
heap
page read and write
1BE6C910000
heap
page read and write
7FF7FD713000
unkown
page readonly
9E2000
heap
page read and write
1EDD163C000
heap
page read and write
A0B9000
unkown
page read and write
8B80023C000
direct allocation
page read and write
A7CE000
heap
page read and write
1EDD1665000
heap
page read and write
88C000
unkown
page write copy
61F000284000
direct allocation
page read and write
913F000
unkown
page read and write
1EDD165D000
heap
page read and write
1EDD165F000
heap
page read and write
15EC2C30000
unclassified section
page readonly
9E1000
heap
page read and write
180C0090C000
direct allocation
page read and write
384400270000
direct allocation
page read and write
E740000
unkown
page read and write
CC7C000
trusted library allocation
page read and write
39000284000
direct allocation
page read and write
3900033C000
direct allocation
page read and write
20400370000
direct allocation
page read and write
418400154000
direct allocation
page read and write
81E0000
trusted library allocation
page read and write
27B3FBE0000
trusted library allocation
page read and write
A683000
heap
page read and write
1B88B940000
heap
page read and write
180C00114000
direct allocation
page read and write
6630000A0000
direct allocation
page read and write
529C002A0000
direct allocation
page read and write
66300020C000
direct allocation
page read and write
13F8002B0000
direct allocation
page read and write
F800000
trusted library allocation
page read and write
1220000
heap
page read and write
2701000
heap
page read and write
180C0030C000
direct allocation
page read and write
455C0040C000
direct allocation
page read and write
2A01000
heap
page read and write
180C01154000
direct allocation
page read and write
180C00998000
direct allocation
page read and write
1EDD165D000
heap
page read and write
C1DD000
unkown
page read and write
8D4B000
stack
page read and write
2900000
heap
page read and write
27456CC2000
unkown
page readonly
2F40000
heap
page read and write
9D6000
heap
page read and write
7FF7FD74C000
unkown
page read and write
B628000
stack
page read and write
9C15000
trusted library allocation
page read and write
1EDD165F000
heap
page read and write
1EDD166E000
heap
page read and write
27456E32000
unkown
page readonly
3C2C007E4000
direct allocation
page read and write
3C2C0097C000
direct allocation
page read and write
67F0000
trusted library allocation
page read and write
13DFA5B0000
unkown
page readonly
180C00470000
direct allocation
page read and write
1E493589000
heap
page read and write
7FF7FD768000
unkown
page readonly
27456D71000
unkown
page readonly
3C2C00268000
direct allocation
page read and write
8586000
heap
page read and write
13FC00201000
direct allocation
page read and write
2401000
heap
page read and write
3220000
unkown
page readonly
F6C0020C000
direct allocation
page read and write
8F4D000
unkown
page read and write
3C2C00D68000
direct allocation
page read and write
1029D000
heap
page read and write
7FF7FD768000
unkown
page readonly
570000154000
direct allocation
page read and write
A6FB000
heap
page read and write
1BE6C6F0000
heap
page readonly
3C2C00D4C000
direct allocation
page read and write
1446000
direct allocation
page read and write
52F400018000
direct allocation
page read and write
3320002D0000
direct allocation
page read and write
CD78000
trusted library allocation
page read and write
7C5000221000
direct allocation
page read and write
1EDD1665000
heap
page read and write
180C00728000
direct allocation
page read and write
29000000C000
direct allocation
page read and write
900000
unkown
page readonly
1EDD1665000
heap
page read and write
102D9000
heap
page read and write
1B889E19000
heap
page read and write
15EC4040000
unkown
page readonly
1B88A430000
unkown
page readonly
13FC00248000
direct allocation
page read and write
7E3B5FE000
unkown
page readonly
1EDD165D000
heap
page read and write
14600000000
direct allocation
page readonly
180C0064C000
direct allocation
page read and write
6CF800054000
direct allocation
page read and write
42A8002A4000
direct allocation
page read and write
90DB000
unkown
page read and write
6B400280000
direct allocation
page read and write
7FF7FD74C000
unkown
page write copy
877000
heap
page read and write
10292000
heap
page read and write
20400340000
direct allocation
page read and write
98C7FE000
unkown
page readonly
1EDD163F000
heap
page read and write
20400338000
direct allocation
page read and write
87C000
unkown
page readonly
1EDD166E000
heap
page read and write
20400264000
direct allocation
page read and write
180C00348000
direct allocation
page read and write
9A7000
heap
page read and write
88A0000
unkown
page read and write
711000184000
direct allocation
page read and write
5C5800120000
direct allocation
page read and write
8210000
trusted library allocation
page read and write
2D20000
unkown
page readonly
8B8002F8000
direct allocation
page read and write
1EDD1632000
heap
page read and write
CE00000
trusted library allocation
page read and write
1EDD1649000
heap
page read and write
1EDD165F000
heap
page read and write
2E4F000
heap
page read and write
384400220000
direct allocation
page read and write
13F8002C0000
direct allocation
page read and write
3C2C00230000
direct allocation
page read and write
3470000
direct allocation
page read and write
6EF001CD000
direct allocation
page read and write
7FF7FD758000
unkown
page write copy
10DC6000
trusted library allocation
page read and write
13DFA4B0000
unkown
page readonly
8B800368000
direct allocation
page read and write
52F4000A4000
direct allocation
page read and write
7FF7FD77B000
unkown
page readonly
24C0000
heap
page read and write
38440020D000
direct allocation
page read and write
1EDD163C000
heap
page read and write
180C00230000
direct allocation
page read and write
180C00CB4000
direct allocation
page read and write
CD9B000
trusted library allocation
page read and write
7BA000290000
direct allocation
page read and write
61F0002A4000
direct allocation
page read and write
7E3CDFE000
stack
page read and write
7FF7FD580000
unkown
page readonly
1EDD166E000
heap
page read and write
6CF800064000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
3C2C00363000
direct allocation
page read and write
41840020C000
direct allocation
page read and write
C23A000
unkown
page read and write
13DFAEC0000
unclassified section
page read and write
2680000
heap
page read and write
3701000
direct allocation
page read and write
4781000
unkown
page read and write
1EDD1641000
heap
page read and write
1EDD166E000
heap
page read and write
3C2C001B0000
direct allocation
page read and write
1EDD1642000
heap
page read and write
5C58000CD000
direct allocation
page read and write
451D00181000
direct allocation
page read and write
CD59000
trusted library allocation
page read and write
3640000
direct allocation
page read and write
98BFFE000
stack
page read and write
3001000
heap
page read and write
529C00274000
direct allocation
page read and write
3C2C001B0000
direct allocation
page read and write
8B800408000
direct allocation
page read and write
529C00284000
direct allocation
page read and write
332000233000
direct allocation
page read and write
1EDD166D000
heap
page read and write
1EDD165F000
heap
page read and write
3C2C00BBC000
direct allocation
page read and write
5C58000D8000
direct allocation
page read and write
5C580027C000
direct allocation
page read and write
6CF800260000
direct allocation
page read and write
101F0000
trusted library allocation
page read and write
1EDD163F000
heap
page read and write
2F20000
unkown
page readonly
180C0064C000
direct allocation
page read and write
733BFE000
stack
page read and write
6EF00181000
direct allocation
page read and write
27B408D7000
unkown
page readonly
EEA2000
trusted library allocation
page read and write
2040026C000
direct allocation
page read and write
6EF00201000
direct allocation
page read and write
418400001000
direct allocation
page read and write
CD7001C8000
direct allocation
page read and write
8B80036C000
direct allocation
page read and write
51E3000
unkown
page read and write
6B400294000
direct allocation
page read and write
DCA0000
trusted library allocation
page read and write
C554000
unkown
page read and write
E280000
trusted library allocation
page read and write
90C9000
unkown
page read and write
1FFFB9DB000
heap
page read and write
8B40000
unkown
page read and write
180C009A4000
direct allocation
page read and write
1EDD165D000
heap
page read and write
9907FE000
unkown
page readonly
418400250000
direct allocation
page read and write
8B800298000
direct allocation
page read and write
F071000
trusted library allocation
page read and write
663000420000
direct allocation
page read and write
7FF7FD580000
unkown
page readonly
347D9FC000
stack
page read and write
455C0031C000
direct allocation
page read and write
EEE6000
trusted library allocation
page read and write
1EDD165C000
heap
page read and write
6320000
trusted library allocation
page read and write
C00000
heap
page read and write
1C7AC9D0000
heap
page readonly
180C006CC000
direct allocation
page read and write
418400118000
direct allocation
page read and write
204002D4000
direct allocation
page read and write
451D00141000
direct allocation
page read and write
874E000
stack
page read and write
EEFC000
trusted library allocation
page read and write
8B800418000
direct allocation
page read and write
1EDD166E000
heap
page read and write
2F09000
stack
page read and write
1EDD163F000
heap
page read and write
1EDD1653000
heap
page read and write
44B800310000
direct allocation
page read and write
7E1D7FE000
stack
page read and write
1EDD163C000
heap
page read and write
A1BB000
trusted library allocation
page read and write
C1E9000
unkown
page read and write
2E8F000
heap
page read and write
CE09000
trusted library allocation
page read and write
7E39DFD000
stack
page read and write
27B3FC98000
heap
page read and write
83EB000
trusted library allocation
page read and write
B42F000
stack
page read and write
F6C002C0000
direct allocation
page read and write
384400298000
direct allocation
page read and write
1EDD165F000
heap
page read and write
2C04000
stack
page read and write
1EDD1646000
heap
page read and write
39E8002C8000
direct allocation
page read and write
8B800318000
direct allocation
page read and write
2D0B000
stack
page read and write
CDF8000
trusted library allocation
page read and write
C091000
unkown
page read and write
6B400220000
direct allocation
page read and write
C3ED000
unkown
page read and write
A615000
heap
page read and write
3C2C0020C000
direct allocation
page read and write
101F2000
trusted library allocation
page read and write
A0BF000
unkown
page read and write
C50000
heap
page read and write
418400308000
direct allocation
page read and write
1E493557000
heap
page read and write
8B8002D4000
direct allocation
page read and write
1EDD1665000
heap
page read and write
7C500033C000
direct allocation
page read and write
332000348000
direct allocation
page read and write
7185000
unkown
page read and write
A4B001CD000
direct allocation
page read and write
2E47000
heap
page read and write
1EDD165D000
heap
page read and write
7FF7FD775000
unkown
page readonly
204002C8000
direct allocation
page read and write
44B80033C000
direct allocation
page read and write
34AD000
direct allocation
page read and write
52F40014C000
direct allocation
page read and write
8D80000
unkown
page read and write
32C4000
unkown
page read and write
2ECF000
heap
page read and write
3900029C000
direct allocation
page read and write
3C2C00962000
direct allocation
page read and write
C31000
unkown
page readonly
180C00388000
direct allocation
page read and write
7FF7FD580000
unkown
page readonly
6630002E4000
direct allocation
page read and write
F6C0028C000
direct allocation
page read and write
101F5000
trusted library allocation
page read and write
180C00CDC000
direct allocation
page read and write
290000230000
direct allocation
page read and write
CD64000
trusted library allocation
page read and write
A8DE000
unkown
page read and write
267C00314000
direct allocation
page read and write
1EDD166E000
heap
page read and write
C6D000
heap
page read and write
3C2C0094C000
direct allocation
page read and write
1B88AFC0000
unkown
page readonly
9800000
trusted library allocation
page read and write
728000294000
direct allocation
page read and write
7C70000
unkown
page readonly
61F000210000
direct allocation
page read and write
1F4C0027C000
direct allocation
page read and write
1C1001C0000
direct allocation
page readonly
13CF000
stack
page read and write
711000740000
direct allocation
page read and write
3B33000
direct allocation
page read and write
1F4C0027C000
direct allocation
page read and write
3040000
heap
page read and write
347E1FE000
stack
page read and write
F6C00268000
direct allocation
page read and write
A0A5000
unkown
page read and write
27B3FFC4000
heap
page read and write
1EDD163A000
heap
page read and write
5700001A8000
direct allocation
page read and write
3C2C00D68000
direct allocation
page read and write
46F0000
unkown
page read and write
180C0088C000
direct allocation
page read and write
267C002C8000
direct allocation
page read and write
14A8000
heap
page read and write
9086000
unkown
page read and write
7FF7FD760000
unkown
page read and write
D1D0000
heap
page read and write
1EDD1656000
heap
page read and write
7FF7FD768000
unkown
page readonly
13DF9F87000
unkown
page readonly
1C100200000
direct allocation
page read and write
9052000
unkown
page read and write
204002AC000
direct allocation
page read and write
180C007A0000
direct allocation
page read and write
2ED0000
heap
page read and write
1C7ACA10000
heap
page read and write
3320002C8000
direct allocation
page read and write
6320000
trusted library allocation
page read and write
8F09000
unkown
page read and write
3C2C00B98000
direct allocation
page read and write
C5C6000
unkown
page read and write
1EDD166E000
heap
page read and write
3776000
direct allocation
page read and write
663000094000
direct allocation
page read and write
1C7AFDA0000
heap
page read and write
2040040C000
direct allocation
page read and write
3C2C00D60000
direct allocation
page read and write
F7F0000
trusted library allocation
page read and write
9E1000
heap
page read and write
1EDD1665000
heap
page read and write
8EB8000
unkown
page read and write
1C7ACA81000
heap
page read and write
A218000
unkown
page read and write
1EDCFD9A000
heap
page read and write
8B800310000
direct allocation
page read and write
CD700221000
direct allocation
page read and write
1EDCFD9C000
heap
page read and write
20400352000
direct allocation
page read and write
7C5000344000
direct allocation
page read and write
7FF7FD580000
unkown
page readonly
1E493589000
heap
page read and write
2D10000
unkown
page read and write
8340000
trusted library allocation
page read and write
1EDD165F000
heap
page read and write
810000
unkown
page readonly
A5B0000
trusted library allocation
page read and write
1EDD1640000
heap
page read and write
8B800244000
direct allocation
page read and write
7BA0002C0000
direct allocation
page read and write
1B88AF10000
unkown
page readonly
9E7000
heap
page read and write
6B40023C000
direct allocation
page read and write
10277000
heap
page read and write
7FF7FD77B000
unkown
page readonly
EF0C000
trusted library allocation
page read and write
711000724000
direct allocation
page read and write
36CA000
direct allocation
page read and write
44B8002AC000
direct allocation
page read and write
20400221000
direct allocation
page read and write
180C00AD8000
direct allocation
page read and write
1EDD165F000
heap
page read and write
38440027C000
direct allocation
page read and write
8B8002C0000
direct allocation
page read and write
1BE6DA40000
unkown
page readonly
180C002C4000
direct allocation
page read and write
1EDD1634000
heap
page read and write
A1A6000
trusted library allocation
page read and write
1027D000
heap
page read and write
180C0060C000
direct allocation
page read and write
1EDD163F000
heap
page read and write
1EDD163F000
heap
page read and write
13F80020C000
direct allocation
page read and write
1EDD163F000
heap
page read and write
9D30000
trusted library allocation
page read and write
52A40034A000
direct allocation
page read and write
180C00940000
direct allocation
page read and write
267C002A0000
direct allocation
page read and write
1EDD1655000
heap
page read and write
F7F5000
trusted library allocation
page read and write
1EDD163C000
heap
page read and write
267C00323000
direct allocation
page read and write
1EDD166E000
heap
page read and write
180C0090C000
direct allocation
page read and write
90CF000
unkown
page read and write
33200032C000
direct allocation
page read and write
290000220000
direct allocation
page read and write
1C7AFC49000
unclassified section
page read and write
9800000
trusted library allocation
page read and write
1BE6C930000
trusted library allocation
page read and write
42A800298000
direct allocation
page read and write
10CBC000
trusted library allocation
page read and write
7FF7FD775000
unkown
page readonly
7E10000
unkown
page read and write
8B800318000
direct allocation
page read and write
52F40011C000
direct allocation
page read and write
663000250000
direct allocation
page read and write
180C00470000
direct allocation
page read and write
332000248000
direct allocation
page read and write
6CF800240000
direct allocation
page read and write
711000718000
direct allocation
page read and write
3E14002A4000
direct allocation
page read and write
529C0020C000
direct allocation
page read and write
52A40031C000
direct allocation
page read and write
3C2C00940000
direct allocation
page read and write
7FF7FD581000
unkown
page execute read
8F27000
unkown
page read and write
39000258000
direct allocation
page read and write
66300015C000
direct allocation
page read and write
1EDD163F000
heap
page read and write
83D0000
trusted library allocation
page read and write
1BE6C756000
heap
page read and write
15EC30A0000
heap
page read and write
15EC2CD0000
unclassified section
page readonly
1EDD166D000
heap
page read and write
52A400328000
direct allocation
page read and write
1EDD163F000
heap
page read and write
180C006CC000
direct allocation
page read and write
180C001CC000
direct allocation
page read and write
3460000
unkown
page read and write
180C01574000
direct allocation
page read and write
1F4C00201000
direct allocation
page read and write
3C2C00958000
direct allocation
page read and write
7383FE000
stack
page read and write
1EDD166E000
heap
page read and write
52A400408000
direct allocation
page read and write
171C00234000
direct allocation
page read and write
7173000
unkown
page read and write
7E22FFE000
stack
page read and write
52F400128000
direct allocation
page read and write
9852000
unkown
page read and write
8EC5000
unkown
page read and write
1EDD163C000
heap
page read and write
7FE25000
direct allocation
page read and write
9800000
trusted library allocation
page read and write
1C100020000
direct allocation
page readonly
5700002F0000
direct allocation
page read and write
663000230000
direct allocation
page read and write
1F4C0020C000
direct allocation
page read and write
85A6000
heap
page read and write
6CF80020C000
direct allocation
page read and write
F6C0023C000
direct allocation
page read and write
CDEE000
trusted library allocation
page read and write
180C00CDC000
direct allocation
page read and write
7E345FE000
unkown
page readonly
3C2C006E4000
direct allocation
page read and write
9D6000
heap
page read and write
57000031C000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
24E63FE000
stack
page read and write
7FFADFCB1000
unkown
page execute read
C2D3000
unkown
page read and write
66300015C000
direct allocation
page read and write
1EDD163F000
heap
page read and write
180C002D8000
direct allocation
page read and write
32E3000
unkown
page read and write
1EDD163C000
heap
page read and write
E2B1000
trusted library allocation
page read and write
1B889E3C000
heap
page read and write
855E000
heap
page read and write
274571D9000
unkown
page readonly
1B889DE0000
remote allocation
page read and write
9D3000
heap
page read and write
180C005B0000
direct allocation
page read and write
1EDD165D000
heap
page read and write
D0FA000
heap
page read and write
CDBB000
trusted library allocation
page read and write
1EDD165F000
heap
page read and write
20400418000
direct allocation
page read and write
418400038000
direct allocation
page read and write
455C0030B000
direct allocation
page read and write
3C2C0016C000
direct allocation
page read and write
39000344000
direct allocation
page read and write
1FFFB9C5000
heap
page read and write
21000200000
direct allocation
page read and write
D410000
trusted library allocation
page read and write
7FF7FD758000
unkown
page write copy
1E493581000
heap
page read and write
13DFAF10000
direct allocation
page read and write
41840026C000
direct allocation
page read and write
15EC2CF0000
heap
page readonly
6CF800114000
direct allocation
page read and write
33200080C000
direct allocation
page read and write
A4B001A1000
direct allocation
page read and write
7FB40000
direct allocation
page read and write
711000730000
direct allocation
page read and write
CE09000
trusted library allocation
page read and write
9D30000
trusted library allocation
page read and write
61F000248000
direct allocation
page read and write
102A7000
heap
page read and write
1BE6C6D0000
unclassified section
page readonly
1E493583000
heap
page read and write
1EDD163C000
heap
page read and write
44B800333000
direct allocation
page read and write
8B80034D000
direct allocation
page read and write
1FF81888000
heap
page read and write
CE45000
trusted library allocation
page read and write
1EDD163C000
heap
page read and write
1EDD1632000
heap
page read and write
6B400298000
direct allocation
page read and write
66300008C000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
8B800210000
direct allocation
page read and write
347B9FE000
stack
page read and write
1EDD1665000
heap
page read and write
DC5B000
trusted library allocation
page read and write
39E800418000
direct allocation
page read and write
DCB0000
trusted library allocation
page read and write
66300016C000
direct allocation
page read and write
7373FE000
stack
page read and write
8B800270000
direct allocation
page read and write
15EC2E34000
heap
page read and write
1EDD165F000
heap
page read and write
9E0000
heap
page read and write
1EDD1665000
heap
page read and write
7169000
unkown
page read and write
4184002E4000
direct allocation
page read and write
1EDD1653000
heap
page read and write
C22B000
unkown
page read and write
180C0090C000
direct allocation
page read and write
180C0088C000
direct allocation
page read and write
27B3FD08000
heap
page read and write
267C00309000
direct allocation
page read and write
3E14002C0000
direct allocation
page read and write
180C006D2000
direct allocation
page read and write
8200000
trusted library allocation
page read and write
44B80035C000
direct allocation
page read and write
3C2C00178000
direct allocation
page read and write
451D001A1000
direct allocation
page read and write
2243000
heap
page read and write
3C2C00714000
direct allocation
page read and write
EEA0000
trusted library allocation
page read and write
A618000
heap
page read and write
1C7ADA20000
unkown
page readonly
347F1FE000
stack
page read and write
1EDD165D000
heap
page read and write
D1CA000
heap
page read and write
4184002D8000
direct allocation
page read and write
2F0F000
heap
page read and write
180C00AEC000
direct allocation
page read and write
27456CC0000
unkown
page readonly
7C50002C8000
direct allocation
page read and write
61F0002B0000
direct allocation
page read and write
377A000
direct allocation
page read and write
9800000
trusted library allocation
page read and write
570000118000
direct allocation
page read and write
418400024000
direct allocation
page read and write
529C00270000
direct allocation
page read and write
1EDD1676000
heap
page read and write
1B889E00000
remote allocation
page read and write
3025000
stack
page read and write
3320002B4000
direct allocation
page read and write
6DF000
unkown
page readonly
33200023C000
direct allocation
page read and write
CDA0000
trusted library allocation
page read and write
3C2C00DE0000
direct allocation
page read and write
31200200000
direct allocation
page read and write
7DE800354000
direct allocation
page read and write
44B80020C000
direct allocation
page read and write
A1DC000
trusted library allocation
page read and write
180C007CA000
direct allocation
page read and write
29000026C000
direct allocation
page read and write
83A0000
unkown
page readonly
1F4C00248000
direct allocation
page read and write
E23B000
stack
page read and write
37B1000
direct allocation
page read and write
2F00000
heap
page read and write
711000718000
direct allocation
page read and write
180C006EC000
direct allocation
page read and write
F6C00248000
direct allocation
page read and write
734BFE000
stack
page read and write
A22F000
unkown
page read and write
180C00C8C000
direct allocation
page read and write
180C002C4000
direct allocation
page read and write
1EDD164A000
heap
page read and write
7FF7FD77B000
unkown
page readonly
1FF8188D000
heap
page read and write
1EDD1635000
heap
page read and write
8D86000
unkown
page read and write
1EDD164D000
heap
page read and write
180C0090C000
direct allocation
page read and write
1BE6D9E0000
unkown
page readonly
13F800210000
direct allocation
page read and write
20400320000
direct allocation
page read and write
1EDD163C000
heap
page read and write
1E493581000
heap
page read and write
9050000
unkown
page read and write
988FFD000
stack
page read and write
1EDD1641000
heap
page read and write
CE00000
trusted library allocation
page read and write
7E03000
stack
page read and write
3C2C00AC0000
direct allocation
page read and write
1FFFB983000
heap
page read and write
13FC00290000
direct allocation
page read and write
A6DA000
heap
page read and write
7FF7FD580000
unkown
page readonly
7FF7FD581000
unkown
page execute read
CDEE000
trusted library allocation
page read and write
27456D88000
unkown
page readonly
2F40000
heap
page read and write
7FF7FD758000
unkown
page write copy
5C5800130000
direct allocation
page read and write
1EDD165D000
heap
page read and write
CE09000
trusted library allocation
page read and write
1EDD1665000
heap
page read and write
3241000
heap
page read and write
A698000
heap
page read and write
290000072000
direct allocation
page read and write
34BF000
direct allocation
page read and write
570000108000
direct allocation
page read and write
4830000
unkown
page read and write
384400278000
direct allocation
page read and write
15EC39B7000
unkown
page readonly
8B800234000
direct allocation
page read and write
3763000
direct allocation
page read and write
57000027C000
direct allocation
page read and write
7E1CFF8000
stack
page read and write
1EDD163C000
heap
page read and write
13F8002B0000
direct allocation
page read and write
13F80027C000
direct allocation
page read and write
711000700000
direct allocation
page read and write
1EDD165B000
heap
page read and write
7E33DFE000
stack
page read and write
529C00290000
direct allocation
page read and write
20400315000
direct allocation
page read and write
36F4000
direct allocation
page read and write
1B889DFA000
remote allocation
page execute read
A6A1000
heap
page read and write
7FF7FD713000
unkown
page readonly
1EDD163C000
heap
page read and write
3844002B4000
direct allocation
page read and write
267C00334000
direct allocation
page read and write
CD7001C1000
direct allocation
page read and write
180C00704000
direct allocation
page read and write
20400240000
direct allocation
page read and write
1EDD165F000
heap
page read and write
1EDD165F000
heap
page read and write
20400340000
direct allocation
page read and write
13E7000
direct allocation
page read and write
1EDD163C000
heap
page read and write
5C5800150000
direct allocation
page read and write
1C7ACC10000
trusted library allocation
page read and write
180C006D2000
direct allocation
page read and write
1EDD163F000
heap
page read and write
1EDD166E000
heap
page read and write
30C3000
heap
page read and write
CD48000
trusted library allocation
page read and write
52A400314000
direct allocation
page read and write
13F800258000
direct allocation
page read and write
1FFFB9C5000
heap
page read and write
6CF800250000
direct allocation
page read and write
180C00CDC000
direct allocation
page read and write
180C0064C000
direct allocation
page read and write
13FC002B0000
direct allocation
page read and write
5C5800150000
direct allocation
page read and write
44B800264000
direct allocation
page read and write
5C58001B4000
direct allocation
page read and write
1EDD163F000
heap
page read and write
13DF92B0000
unclassified section
page readonly
1EDD163C000
heap
page read and write
728000240000
direct allocation
page read and write
6B400270000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
1EDD165F000
heap
page read and write
1EDD165F000
heap
page read and write
44B800210000
direct allocation
page read and write
27456E42000
unkown
page readonly
1C7ACA80000
heap
page read and write
290000140000
direct allocation
page read and write
1EDD1687000
heap
page read and write
1C100020000
direct allocation
page readonly
61F000290000
direct allocation
page read and write
5C5800110000
direct allocation
page read and write
8B80028C000
direct allocation
page read and write
1C700080000
direct allocation
page read and write
3C2C001A6000
direct allocation
page read and write
180C00704000
direct allocation
page read and write
3C2C00BBC000
direct allocation
page read and write
1EDD1665000
heap
page read and write
10208000
trusted library allocation
page read and write
A66D000
heap
page read and write
1EDD163F000
heap
page read and write
9C1000
heap
page read and write
1EDD166E000
heap
page read and write
1EDD1644000
heap
page read and write
7E355FE000
unkown
page readonly
73D0000
unkown
page read and write
290000308000
direct allocation
page read and write
24E2BFE000
stack
page read and write
C10B000
unkown
page read and write
290000068000
direct allocation
page read and write
663000308000
direct allocation
page read and write
1BE6C630000
unclassified section
page readonly
3213000
stack
page read and write
21000042000
direct allocation
page read and write
9E03000
trusted library allocation
page read and write
2D80000
heap
page read and write
1B889F30000
heap
page readonly
5C5800094000
direct allocation
page read and write
F7A0000
remote allocation
page read and write
1B889F20000
heap
page read and write
83D0000
trusted library allocation
page read and write
7FF7FD77B000
unkown
page readonly
3C2C00734000
direct allocation
page read and write
180C0030C000
direct allocation
page read and write
180C0137C000
direct allocation
page read and write
290000144000
direct allocation
page read and write
7FF7FD581000
unkown
page execute read
1EDD1665000
heap
page read and write
1EDD166E000
heap
page read and write
7280002C0000
direct allocation
page read and write
455C00314000
direct allocation
page read and write
A280000
unkown
page read and write
A1C9000
trusted library allocation
page read and write
8C58000
stack
page read and write
1B88B8F0000
unclassified section
page readonly
83D0000
trusted library allocation
page read and write
1BE6C6E0000
heap
page read and write
1EDD166E000
heap
page read and write
3C2C002CC000
direct allocation
page read and write
6CF800090000
direct allocation
page read and write
1EDD165B000
heap
page read and write
EECA000
trusted library allocation
page read and write
3C2C00348000
direct allocation
page read and write
C3B3000
unkown
page read and write
3E1400290000
direct allocation
page read and write
3C2C00D68000
direct allocation
page read and write
7FF7FD768000
unkown
page readonly
180C00230000
direct allocation
page read and write
13FC00294000
direct allocation
page read and write
570000220000
direct allocation
page read and write
C233000
unkown
page read and write
A87A000
unkown
page read and write
1EDD1658000
heap
page read and write
180C006CC000
direct allocation
page read and write
8B800346000
direct allocation
page read and write
A635000
heap
page read and write
2E8F000
heap
page read and write
347D1FE000
stack
page read and write
1EDD166E000
heap
page read and write
66300020C000
direct allocation
page read and write
81D0000
trusted library allocation
page read and write
F6C0029C000
direct allocation
page read and write
3900035C000
direct allocation
page read and write
46E0000
unkown
page read and write
7BC1000
unkown
page read and write
180C00AD8000
direct allocation
page read and write
5C58000F8000
direct allocation
page read and write
CDFA000
trusted library allocation
page read and write
13FC00258000
direct allocation
page read and write
9B5000
stack
page read and write
1C7ACC94000
heap
page read and write
3C2C00918000
direct allocation
page read and write
13DFA400000
unkown
page readonly
39000233000
direct allocation
page read and write
332000274000
direct allocation
page read and write
A231000
unkown
page read and write
3320002A4000
direct allocation
page read and write
B52D000
stack
page read and write
1EDD1653000
heap
page read and write
811000
unkown
page execute read
F6C00220000
direct allocation
page read and write
180C010AC000
direct allocation
page read and write
3C2C00D4C000
direct allocation
page read and write
6CF800124000
direct allocation
page read and write
44B8002D4000
direct allocation
page read and write
570000250000
direct allocation
page read and write
38440023C000
direct allocation
page read and write
1B88B582000
unkown
page readonly
1EDD166E000
heap
page read and write
13F8002A4000
direct allocation
page read and write
3C2C00D08000
direct allocation
page read and write
1EDD1653000
heap
page read and write
9D30000
trusted library allocation
page read and write
3C2C00D08000
direct allocation
page read and write
A60C000
heap
page read and write
663000230000
direct allocation
page read and write
2040032C000
direct allocation
page read and write
1E49355A000
heap
page read and write
7FF7FD758000
unkown
page write copy
88C000
unkown
page write copy
1B889F70000
heap
page read and write
7A50000
unkown
page readonly
13DF9560000
unkown
page readonly
1EDD165F000
heap
page read and write
1BE6CA00000
heap
page read and write
1EDD164B000
heap
page read and write
3B36000
direct allocation
page read and write
280002BC000
direct allocation
page read and write
180C005B0000
direct allocation
page read and write
332000298000
direct allocation
page read and write
481D000
trusted library allocation
page read and write
280002D8000
direct allocation
page read and write
3000000
heap
page read and write
180C00388000
direct allocation
page read and write
451D00161000
direct allocation
page read and write
1EDD1665000
heap
page read and write
180C00348000
direct allocation
page read and write
1EDD1665000
heap
page read and write
7343FF000
stack
page read and write
DEE000
stack
page read and write
1EDD165F000
heap
page read and write
21000082000
direct allocation
page read and write
1EDD1643000
heap
page read and write
8B800354000
direct allocation
page read and write
1EDD164B000
heap
page read and write
1BE6C970000
unclassified section
page readonly
F7A0000
remote allocation
page read and write
1B889FD5000
heap
page read and write
3744000
direct allocation
page read and write
1020C000
trusted library allocation
page read and write
83D0000
trusted library allocation
page read and write
3C2C00975000
direct allocation
page read and write
3C2C0060C000
direct allocation
page read and write
A110000
unkown
page read and write
81F0000
trusted library allocation
page read and write
27B3FC00000
heap
page read and write
7FF7FD775000
unkown
page readonly
390002EC000
direct allocation
page read and write
7FF7FD581000
unkown
page execute read
57000020C000
direct allocation
page read and write
5C5800154000
direct allocation
page read and write
290000001000
direct allocation
page read and write
1EDD163F000
heap
page read and write
7A60000
unkown
page readonly
267C00408000
direct allocation
page read and write
14600020000
direct allocation
page readonly
F8F0000
trusted library allocation
page read and write
180C00220000
direct allocation
page read and write
7FFAE06B1000
unkown
page execute read
1EDD166E000
heap
page read and write
A694000
heap
page read and write
81E0000
trusted library allocation
page read and write
5C58001F0000
direct allocation
page read and write
52F400064000
direct allocation
page read and write
5C5800054000
direct allocation
page read and write
B1A0000
unkown
page read and write
15EC2CE0000
heap
page read and write
1EDD1665000
heap
page read and write
32B9000
unkown
page read and write
390002C8000
direct allocation
page read and write
3C2C00260000
direct allocation
page read and write
A1A9000
trusted library allocation
page read and write
10DF4000
trusted library allocation
page read and write
570000108000
direct allocation
page read and write
CE61000
trusted library allocation
page read and write
9013000
unkown
page read and write
E2B7000
trusted library allocation
page read and write
529C00294000
direct allocation
page read and write
715C000
unkown
page read and write
81F0000
trusted library allocation
page read and write
8530000
unkown
page readonly
8B800310000
direct allocation
page read and write
1EDD163F000
heap
page read and write
3E1400240000
direct allocation
page read and write
39E800304000
direct allocation
page read and write
3C2C002F7000
direct allocation
page read and write
570000230000
direct allocation
page read and write
1EDD163F000
heap
page read and write
8262000
heap
page read and write
180C00CB4000
direct allocation
page read and write
1EDD166E000
heap
page read and write
180C0071C000
direct allocation
page read and write
2D01000
heap
page read and write
7E1F7FE000
stack
page read and write
455C00338000
direct allocation
page read and write
180C00388000
direct allocation
page read and write
3C2C00D68000
direct allocation
page read and write
1EDD165D000
heap
page read and write
3C2C00CE8000
direct allocation
page read and write
1EDD163C000
heap
page read and write
8D6A000
unkown
page read and write
52F400044000
direct allocation
page read and write
A1C7000
trusted library allocation
page read and write
CD4C000
trusted library allocation
page read and write
6CF800104000
direct allocation
page read and write
2E8F000
heap
page read and write
6B4002BC000
direct allocation
page read and write
9E2E000
trusted library allocation
page read and write
57000026C000
direct allocation
page read and write
663000074000
direct allocation
page read and write
83D0000
trusted library allocation
page read and write
61F000240000
direct allocation
page read and write
29000008C000
direct allocation
page read and write
1C7001C0000
direct allocation
page readonly
15EC2CB9000
remote allocation
page execute read
29000020C000
direct allocation
page read and write
A4B00221000
direct allocation
page read and write
6630000D8000
direct allocation
page read and write
332000338000
direct allocation
page read and write
171C00284000
direct allocation
page read and write
7FF7FD768000
unkown
page readonly
390002FC000
direct allocation
page read and write
34D1000
direct allocation
page read and write
3C2C00194000
direct allocation
page read and write
13DFAED7000
unclassified section
page read and write
6CF800130000
direct allocation
page read and write
9800000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
1EDD164D000
heap
page read and write
1EDD165D000
heap
page read and write
10290000
heap
page read and write
3C2C00178000
direct allocation
page read and write
44B800201000
direct allocation
page read and write
2F17000
heap
page read and write
7FF7FD713000
unkown
page readonly
7FF7FD75B000
unkown
page read and write
6CF8000EC000
direct allocation
page read and write
1F4C000F0000
direct allocation
page read and write
F072000
trusted library allocation
page read and write
6C6000
unkown
page write copy
180C0064C000
direct allocation
page read and write
6CF800078000
direct allocation
page read and write
44B800240000
direct allocation
page read and write
24E4BFE000
stack
page read and write
15EC2E32000
heap
page read and write
10296000
heap
page read and write
6CF800094000
direct allocation
page read and write
CD6D000
trusted library allocation
page read and write
1E493583000
heap
page read and write
1EDD165D000
heap
page read and write
529C00248000
direct allocation
page read and write
180C0027C000
direct allocation
page read and write
1EDD165F000
heap
page read and write
A873000
unkown
page read and write
7FF7FD768000
unkown
page readonly
1EDD165D000
heap
page read and write
1EDD163C000
heap
page read and write
6CF80026C000
direct allocation
page read and write
39000330000
direct allocation
page read and write
34017FE000
stack
page read and write
455C00328000
direct allocation
page read and write
7BA0002A4000
direct allocation
page read and write
267C002D4000
direct allocation
page read and write
7FF7FD768000
unkown
page readonly
A877000
unkown
page read and write
CD60000
trusted library allocation
page read and write
1EDD166E000
heap
page read and write
27B3FCC8000
heap
page read and write
1C100040000
direct allocation
page read and write
1EDD165D000
heap
page read and write
1EDD163F000
heap
page read and write
3C2C00977000
direct allocation
page read and write
3C2C00B98000
direct allocation
page read and write
4810000
unkown
page read and write
13FC00264000
direct allocation
page read and write
2481000
heap
page read and write
274571B8000
unkown
page readonly
267C002C8000
direct allocation
page read and write
1EDD1655000
heap
page read and write
39000201000
direct allocation
page read and write
1EDD1659000
heap
page read and write
2619000
direct allocation
page read and write
1EDD163F000
heap
page read and write
1EDD165D000
heap
page read and write
2F80000
heap
page read and write
3E14002B0000
direct allocation
page read and write
1F4C00244000
direct allocation
page read and write
9810000
trusted library allocation
page read and write
1B889FA0000
trusted library allocation
page read and write
24E00010000
direct allocation
page read and write
9CA0000
trusted library allocation
page read and write
52A40031C000
direct allocation
page read and write
711000709000
direct allocation
page read and write
1EDD1665000
heap
page read and write
180C0090C000
direct allocation
page read and write
180C00B8C000
direct allocation
page read and write
280002C8000
direct allocation
page read and write
529C0024C000
direct allocation
page read and write
1EDD166E000
heap
page read and write
290000160000
direct allocation
page read and write
52F400034000
direct allocation
page read and write
44B8002BC000
direct allocation
page read and write
332000284000
direct allocation
page read and write
61F000258000
direct allocation
page read and write
3C2C0089C000
direct allocation
page read and write
B010000
unkown
page readonly
2F4E000
heap
page read and write
F7F0000
trusted library allocation
page read and write
1B889E26000
heap
page read and write
7DE80080C000
direct allocation
page read and write
180C006CC000
direct allocation
page read and write
390002D4000
direct allocation
page read and write
180C00CB4000
direct allocation
page read and write
2F17000
heap
page read and write
13F800201000
direct allocation
page read and write
1EDD1655000
heap
page read and write
1EDD163F000
heap
page read and write
3C2C00C13000
direct allocation
page read and write
711000704000
direct allocation
page read and write
F7F0000
trusted library allocation
page read and write
1EDD166E000
heap
page read and write
451D001CD000
direct allocation
page read and write
13DFADC0000
heap
page read and write
57000019C000
direct allocation
page read and write
1F4C00264000
direct allocation
page read and write
2040020C000
direct allocation
page read and write
2E40000
heap
page read and write
1EDD1653000
heap
page read and write
44B800240000
direct allocation
page read and write
1EDD165D000
heap
page read and write
29000007C000
direct allocation
page read and write
7FF7FD580000
unkown
page readonly
7E32DFB000
stack
page read and write
3844002A8000
direct allocation
page read and write
4840000
unkown
page read and write
663000110000
direct allocation
page read and write
984FFE000
stack
page read and write
E2BD000
trusted library allocation
page read and write
6B400201000
direct allocation
page read and write
3C2C00922000
direct allocation
page read and write
1EDD163F000
heap
page read and write
3900030C000
direct allocation
page read and write
711000718000
direct allocation
page read and write
2E50000
heap
page read and write
3C2C005D4000
direct allocation
page read and write
3C2C00940000
direct allocation
page read and write
2D00000
heap
page read and write
7363FC000
stack
page read and write
E270000
unkown
page read and write
1EDD1665000
heap
page read and write
180C007C8000
direct allocation
page read and write
DCB0000
trusted library allocation
page read and write
27456D4C000
unkown
page readonly
1BE6C9B0000
heap
page read and write
180C002C4000
direct allocation
page read and write
1EDD1655000
heap
page read and write
451D00121000
direct allocation
page read and write
A672000
heap
page read and write
1EDD163F000
heap
page read and write
1EDD166E000
heap
page read and write
A62C000
heap
page read and write
33400244000
direct allocation
page read and write
663000108000
direct allocation
page read and write
1EDD1632000
heap
page read and write
180C00170000
direct allocation
page read and write
13DF9440000
heap
page read and write
A0BD000
unkown
page read and write
1EDD166E000
heap
page read and write
13DF92D0000
heap
page readonly
3C2C00D8C000
direct allocation
page read and write
A0FC000
unkown
page read and write
3900026C000
direct allocation
page read and write
3400FFE000
stack
page read and write
5700002D8000
direct allocation
page read and write
332000808000
direct allocation
page read and write
1EDD163C000
heap
page read and write
8D7A000
unkown
page read and write
1028B000
heap
page read and write
1EDD163B000
heap
page read and write
711000148000
direct allocation
page read and write
7E227FE000
stack
page read and write
663000230000
direct allocation
page read and write
1EDD165F000
heap
page read and write
6630000C8000
direct allocation
page read and write
2A80000
heap
page read and write
81D0000
trusted library allocation
page read and write
1EDD165D000
heap
page read and write
1EDD163C000
heap
page read and write
4C4000
unkown
page readonly
2C01000
heap
page read and write
716B000
unkown
page read and write
7FF7FD768000
unkown
page readonly
418400230000
direct allocation
page read and write
52F400054000
direct allocation
page read and write
180C006D2000
direct allocation
page read and write
51F9000
unkown
page read and write
83D0000
trusted library allocation
page read and write
418400220000
direct allocation
page read and write
9DC0000
trusted library allocation
page read and write
3C2C00C54000
direct allocation
page read and write
5C5800220000
direct allocation
page read and write
1C700082000
direct allocation
page read and write
3844002A8000
direct allocation
page read and write
3C2C005D4000
direct allocation
page read and write
1EDD1641000
heap
page read and write
6630000F8000
direct allocation
page read and write
3002000
heap
page read and write
5C5800164000
direct allocation
page read and write
1C7AFC47000
unclassified section
page read and write
1EDD1665000
heap
page read and write
9D30000
trusted library allocation
page read and write
7280002A4000
direct allocation
page read and write
D3C000
stack
page read and write
961A000
stack
page read and write
3C2C0016C000
direct allocation
page read and write
3320002DC000
direct allocation
page read and write
8B8002B8000
direct allocation
page read and write
1EDD165F000
heap
page read and write
1EDD163F000
heap
page read and write
47EE000
unkown
page read and write
A85A000
unkown
page read and write
5C5800118000
direct allocation
page read and write
29280023C000
direct allocation
page read and write
15EC3087000
unclassified section
page read and write
29000040C000
direct allocation
page read and write
D3B0000
trusted library allocation
page read and write
EEE0000
trusted library allocation
page read and write
1BE6C710000
heap
page read and write
20400348000
direct allocation
page read and write
180C00150000
direct allocation
page read and write
2740000
heap
page read and write
332000320000
direct allocation
page read and write
1EDD165D000
heap
page read and write
77C0000
unkown
page read and write
3082000
heap
page read and write
180C00470000
direct allocation
page read and write
9800000
trusted library allocation
page read and write
13FC002B0000
direct allocation
page read and write
529C0026C000
direct allocation
page read and write
C3F7000
unkown
page read and write
10471000
heap
page read and write
15EC2CC0000
remote allocation
page read and write
1EDD1665000
heap
page read and write
3C2C00977000
direct allocation
page read and write
7E3ADFE000
stack
page read and write
1B88AE70000
unkown
page readonly
180C00308000
direct allocation
page read and write
61F0002B0000
direct allocation
page read and write
ADAF000
stack
page read and write
711000709000
direct allocation
page read and write
E2BF000
trusted library allocation
page read and write
A654000
heap
page read and write
9DF0000
trusted library allocation
page read and write
1EDD163F000
heap
page read and write
3C2C00CA4000
direct allocation
page read and write
24E1BFE000
stack
page read and write
57000026C000
direct allocation
page read and write
1EDD163C000
heap
page read and write
5C5800024000
direct allocation
page read and write
180C006EC000
direct allocation
page read and write
330A000
unkown
page read and write
27B3FD29000
heap
page read and write
3C2C003A4000
direct allocation
page read and write
52F4000BC000
direct allocation
page read and write
83D0000
trusted library allocation
page read and write
20400268000
direct allocation
page read and write
9820000
trusted library allocation
page read and write
3C2C00AF4000
direct allocation
page read and write
C244000
unkown
page read and write
7353FD000
stack
page read and write
7FFADF2B1000
unkown
page execute read
27456DC3000
unkown
page readonly
1EDD166E000
heap
page read and write
9820000
trusted library allocation
page read and write
10CBA000
trusted library allocation
page read and write
1EDD164E000
heap
page read and write
101F9000
trusted library allocation
page read and write
86CE000
stack
page read and write
1FFFB9BD000
heap
page read and write
6CF800076000
direct allocation
page read and write
13FC0026C000
direct allocation
page read and write
57E80027C000
direct allocation
page read and write
13DF9493000
heap
page read and write
CCF6000
trusted library allocation
page read and write
5C5800001000
direct allocation
page read and write
6EF00121000
direct allocation
page read and write
180C00710000
direct allocation
page read and write
CE00000
trusted library allocation
page read and write
267C00234000
direct allocation
page read and write
4B7000
unkown
page write copy
1EDD163C000
heap
page read and write
52F4000AC000
direct allocation
page read and write
A5B0000
trusted library allocation
page read and write
3C2C00348000
direct allocation
page read and write
2F01000
heap
page read and write
6CF8000D4000
direct allocation
page read and write
7E375FE000
unkown
page readonly
3C2C005D4000
direct allocation
page read and write
180C0071C000
direct allocation
page read and write
1EDD166E000
heap
page read and write
AFFF000
stack
page read and write
13FC00290000
direct allocation
page read and write
5C5800060000
direct allocation
page read and write
1EDD164D000
heap
page read and write
A1CF000
trusted library allocation
page read and write
347A9F8000
stack
page read and write
1EDD1665000
heap
page read and write
1EDD166E000
heap
page read and write
44B8002EC000
direct allocation
page read and write
9E42000
trusted library allocation
page read and write
1EDD1653000
heap
page read and write
180C006CC000
direct allocation
page read and write
9E0F000
stack
page read and write
290000079000
direct allocation
page read and write
66300017C000
direct allocation
page read and write
1EDD1653000
heap
page read and write
9D4000
heap
page read and write
290000058000
direct allocation
page read and write
9C16000
trusted library allocation
page read and write
101FF000
trusted library allocation
page read and write
39E800408000
direct allocation
page read and write
455C002F1000
direct allocation
page read and write
E2BB000
trusted library allocation
page read and write
1EDD166E000
heap
page read and write
204002D4000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
39E8002AC000
direct allocation
page read and write
711000740000
direct allocation
page read and write
180C00B8C000
direct allocation
page read and write
4C6000
unkown
page readonly
180C00AEC000
direct allocation
page read and write
3C2C002F4000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
6EF001E1000
direct allocation
page read and write
7FF7FD77B000
unkown
page readonly
A1D5000
trusted library allocation
page read and write
A131000
unkown
page read and write
1EDD165D000
heap
page read and write
3C2C00240000
direct allocation
page read and write
1B88BA30000
unclassified section
page read and write
180C00AD8000
direct allocation
page read and write
290000220000
direct allocation
page read and write
1BE6C9B5000
heap
page read and write
1EDD163F000
heap
page read and write
1EDD1644000
heap
page read and write
F7F0000
trusted library allocation
page read and write
9BF000
heap
page read and write
EE9B000
trusted library allocation
page read and write
47DB000
unkown
page read and write
CD700161000
direct allocation
page read and write
332000818000
direct allocation
page read and write
6630001E0000
direct allocation
page read and write
5C5800150000
direct allocation
page read and write
CE09000
trusted library allocation
page read and write
6CF800028000
direct allocation
page read and write
39000315000
direct allocation
page read and write
180C00710000
direct allocation
page read and write
A1DF000
trusted library allocation
page read and write
7FF7FD713000
unkown
page readonly
390002BC000
direct allocation
page read and write
9D30000
trusted library allocation
page read and write
6CF80000C000
direct allocation
page read and write
13F800268000
direct allocation
page read and write
711000724000
direct allocation
page read and write
3081000
heap
page read and write
39000374000
direct allocation
page read and write
3C2C0097C000
direct allocation
page read and write
A225000
unkown
page read and write
9E38000
trusted library allocation
page read and write
44B800356000
direct allocation
page read and write
10271000
heap
page read and write
A1CF000
trusted library allocation
page read and write
7FF7FD713000
unkown
page readonly
C101000
unkown
page read and write
2F17000
heap
page read and write
7E3A5FE000
unkown
page readonly
267C00340000
direct allocation
page read and write
663000104000
direct allocation
page read and write
3C2C00958000
direct allocation
page read and write
44B800290000
direct allocation
page read and write
9800000
trusted library allocation
page read and write
3C2C008A8000
direct allocation
page read and write
20400358000
direct allocation
page read and write
7FF7FD775000
unkown
page readonly
401000
unkown
page execute read
1EDD163C000
heap
page read and write
A65D000
heap
page read and write
7803000
unkown
page read and write
6CF80001C000
direct allocation
page read and write
390002AC000
direct allocation
page read and write
BFD0000
unkown
page read and write
3C2C0041C000
direct allocation
page read and write
180C007C8000
direct allocation
page read and write
A637000
heap
page read and write
9E8E000
stack
page read and write
2C40000
heap
page read and write
2581000
heap
page read and write
2981000
heap
page read and write
983FFD000
stack
page read and write
42A800294000
direct allocation
page read and write
44B80030C000
direct allocation
page read and write
41840026C000
direct allocation
page read and write
6CF8000FC000
direct allocation
page read and write
180C006D7000
direct allocation
page read and write
13FC00244000
direct allocation
page read and write
81D0000
trusted library allocation
page read and write
B050000
unkown
page read and write
13DF9460000
heap
page read and write
384400250000
direct allocation
page read and write
5C5800308000
direct allocation
page read and write
CDA5000
trusted library allocation
page read and write
7DE800244000
direct allocation
page read and write
1EDD1665000
heap
page read and write
7FF7FD775000
unkown
page readonly
8258000
heap
page read and write
3C2C001A4000
direct allocation
page read and write
3C2C00970000
direct allocation
page read and write
180C006D7000
direct allocation
page read and write
7A80000
unkown
page readonly
1F4C00280000
direct allocation
page read and write
3C2C008E5000
direct allocation
page read and write
7E37DFE000
stack
page read and write
CD66000
trusted library allocation
page read and write
C10000
unkown
page read and write
7FF7FD580000
unkown
page readonly
7E05000
stack
page read and write
180C00138000
direct allocation
page read and write
1BE6D830000
unkown
page readonly
CD9B000
trusted library allocation
page read and write
3900036C000
direct allocation
page read and write
15EC2CA0000
remote allocation
page read and write
1EDD163F000
heap
page read and write
1EDD163C000
heap
page read and write
There are 3265 hidden memdumps, click here to show them.