Mini Kabibi Habibi

Current Path : C:/Program Files/SafeExamBrowser/Application/
Upload File :
Current File : C:/Program Files/SafeExamBrowser/Application/SafeExamBrowser.WindowsApi.pdb

Microsoft C/C++ MSF 7.00
DS�x��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������18�������������������18�������������������18R�����18T���� <@V<�E/C# - 4.9.0-3.24121.1+a98c90d56455379836dd5c845b35fa932b00cfa3�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� 7�
��Q;\Iѳ��.+(ܐ��z\;�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �).Z�w2�z����P�� �&������bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� ��+;0ze�L��}0�P%���O��o��u��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �Q��<f���C�u����Xӡ��쬭.�H�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �]Yt��5�/��#L�K����E���U"�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �P�/j�z^�
��Euq0��bT]A�d�������bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� LJ�s�F�\������K=�Dhz��~��&��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� 0�ހ`?x�
�z꿥�vP!��+ZɜL�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �n����8Ë���J��)W@�	Y�

J��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �͏XjAV(+e"m�
����K�M��S�f�ʝ�9�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� <)�c.����ǯ.;.���ړ�C��>U7̿C�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �u���5,P�Aki��$�g�刴Ovv摑X�i�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� ��� ﲪ�
3h�A�v%vt����
�����bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� E��ot�
�:�i��#&��w�w}x�q�
R��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� Cm֠���c�.�a��
�u�9�J|�z�Lrֹ��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �$�{��}�N��6�r�*��R�rNS�dU9��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� ���9>X��b���\3k��;�3&WJf�
����bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �0{Х���R��5���|�����^Xm�C�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �2k�%.�YP#�$�2GT������g���vK�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �Y@ԍ�����v
�Y�ndC�@�e�|F�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� D��M��V5OM�6��%f�H=N��$ci��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� -�BT��#���C�15d�K�%-���޷\��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �(2���2Cgs�����c�}U��� "V�W��a�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �����Kѻ���<���?]�N�4�ʦt��\��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �@�ٗ�8���^���V��Ω��P��+��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� Q�V��yJ��N�o�"'��w�f9�!z���P
�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� ;	��W��8�D��J���p}Hp��r�@.��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �2�K�R$�U27�3����S09���_��MEZ�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� ����ڞ��s4w�\��
�׏�uR��N\�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� J�?��Ĉ'�}����KJ���1���h_6�Py�$��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �L$����9F��H�m�Pq�q�8�r�sss�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� h؊|�CJ5�gCL/����%hwH�" -t"H���bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� ��VQx�[�[?�4)����Hf��0�*s�T�)�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� ���&B(���x�:��.�,��rk�8���bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �@F@�C�rj�;����XoT��ٳ�#�k�W�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �CȂ�n��؟b|IKġ/�{�A�
��bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� ��T�@m�u�9y#V�6�YbӀ.���^8�[���bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� |�cJ�6�6�w��px$C�Q�n'%(2ʄ�����bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� sz��"�4���w��u��}���������bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� ��kY`/�D�\��\��rr�[�tnh�DG�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� %f{��=ؽ���J�}��E ��@C��\�bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� �ٶ\�@W`]�C*�+b��|�Z�?�������bQ?���S�O���EK�����?�O����Zf��*�I��)��B��w��� %t����>L�ۏ�[��k�s�4�b�������.\SafeExamBrowser.WindowsApi\ExplorerShell.cs.\safeexambrowser.windowsapi\explorershell.cs.\SafeExamBrowser.WindowsApi\NativeMethods.cs.\safeexambrowser.windowsapi\nativemethods.cs.\SafeExamBrowser.WindowsApi\Types\Bounds.cs.\safeexambrowser.windowsapi\types\bounds.cs.\SafeExamBrowser.WindowsApi\Types\RECT.cs.\safeexambrowser.windowsapi\types\rect.cs.\SafeExamBrowser.WindowsApi\Types\StickyKeysState.cs.\safeexambrowser.windowsapi\types\stickykeysstate.cs.\SafeExamBrowser.WindowsApi\Types\Window.cs.\safeexambrowser.windowsapi\types\window.cs.\SafeExamBrowser.WindowsApi\Processes\Process.cs.\safeexambrowser.windowsapi\processes\process.cs.\SafeExamBrowser.WindowsApi\Processes\ProcessFactory.cs.\safeexambrowser.windowsapi\processes\processfactory.cs.\SafeExamBrowser.WindowsApi\Hooks\MouseHook.cs.\safeexambrowser.windowsapi\hooks\mousehook.cs.\SafeExamBrowser.WindowsApi\Hooks\SystemHook.cs.\safeexambrowser.windowsapi\hooks\systemhook.cs.\SafeExamBrowser.WindowsApi\Hooks\KeyboardHook.cs.\safeexambrowser.windowsapi\hooks\keyboardhook.cs.\SafeExamBrowser.WindowsApi\Desktops\Desktop.cs.\safeexambrowser.windowsapi\desktops\desktop.cs.\SafeExamBrowser.WindowsApi\Desktops\DesktopFactory.cs.\safeexambrowser.windowsapi\desktops\desktopfactory.cs.\SafeExamBrowser.WindowsApi\Desktops\DesktopMonitor.cs.\safeexambrowser.windowsapi\desktops\desktopmonitor.cs.\SafeExamBrowser.WindowsApi\Desktops\ObfuscatedDesktop.cs.\safeexambrowser.windowsapi\desktops\obfuscateddesktop.cs.\SafeExamBrowser.WindowsApi\Constants\AccessMask.cs.\safeexambrowser.windowsapi\constants\accessmask.cs.\SafeExamBrowser.WindowsApi\Constants\Constant.cs.\safeexambrowser.windowsapi\constants\constant.cs.\SafeExamBrowser.WindowsApi\Constants\HookType.cs.\safeexambrowser.windowsapi\constants\hooktype.cs.\SafeExamBrowser.WindowsApi\Constants\ShowWindowCommand.cs.\safeexambrowser.windowsapi\constants\showwindowcommand.cs.\SafeExamBrowser.WindowsApi\Constants\SPI.cs.\safeexambrowser.windowsapi\constants\spi.cs.\SafeExamBrowser.WindowsApi\Constants\SPIF.cs.\safeexambrowser.windowsapi\constants\spif.cs.\SafeExamBrowser.WindowsApi\Constants\StickyKeysFlags.cs.\safeexambrowser.windowsapi\constants\stickykeysflags.cs.\SafeExamBrowser.WindowsApi\Constants\SystemCommand.cs.\safeexambrowser.windowsapi\constants\systemcommand.cs.\SafeExamBrowser.WindowsApi\Constants\ThreadAccess.cs.\safeexambrowser.windowsapi\constants\threadaccess.cs.\SafeExamBrowser.WindowsApi\Constants\VirtualKeyCode.cs.\safeexambrowser.windowsapi\constants\virtualkeycode.cs.\SafeExamBrowser.WindowsApi\Delegates\EnumDesktopDelegate.cs.\safeexambrowser.windowsapi\delegates\enumdesktopdelegate.cs.\SafeExamBrowser.WindowsApi\Delegates\EnumWindowsDelegate.cs.\safeexambrowser.windowsapi\delegates\enumwindowsdelegate.cs.\SafeExamBrowser.WindowsApi\Delegates\EventDelegate.cs.\safeexambrowser.windowsapi\delegates\eventdelegate.cs.\SafeExamBrowser.WindowsApi\Delegates\HookDelegate.cs.\safeexambrowser.windowsapi\delegates\hookdelegate.cs.\SafeExamBrowser.WindowsApi\Kernel32.cs.\safeexambrowser.windowsapi\kernel32.cs.\SafeExamBrowser.WindowsApi\obj\x64\Release\.NETFramework,Version=v4.8.AssemblyAttributes.cs.\safeexambrowser.windowsapi\obj\x64\release\.netframework,version=v4.8.assemblyattributes.cs.\SafeExamBrowser.WindowsApi\Properties\AssemblyInfo.cs.\safeexambrowser.windowsapi\properties\assemblyinfo.cs.\SafeExamBrowser.WindowsApi\Types\EXECUTION_STATE.cs.\safeexambrowser.windowsapi\types\execution_state.cs.\SafeExamBrowser.WindowsApi\Types\KBDLLHOOKSTRUCT.cs.\safeexambrowser.windowsapi\types\kbdllhookstruct.cs.\SafeExamBrowser.WindowsApi\Types\KBDLLHOOKSTRUCTFlags.cs.\safeexambrowser.windowsapi\types\kbdllhookstructflags.cs.\SafeExamBrowser.WindowsApi\Types\MSLLHOOKSTRUCT.cs.\safeexambrowser.windowsapi\types\msllhookstruct.cs.\SafeExamBrowser.WindowsApi\Types\POINT.cs.\safeexambrowser.windowsapi\types\point.cs.\SafeExamBrowser.WindowsApi\Types\PROCESS_INFORMATION.cs.\safeexambrowser.windowsapi\types\process_information.cs.\SafeExamBrowser.WindowsApi\Types\STARTUPINFO.cs.\safeexambrowser.windowsapi\types\startupinfo.cs.\SafeExamBrowser.WindowsApi\Types\STICKYKEYS.cs.\safeexambrowser.windowsapi\types\stickykeys.cs.\SafeExamBrowser.WindowsApi\Types\WINDOWPLACEMENT.cs.\safeexambrowser.windowsapi\types\windowplacement.cs.\SafeExamBrowser.WindowsApi\User32.cs.\safeexambrowser.windowsapi\user32.cs.\SafeExamBrowser.WindowsApi\WinInet.cs.\safeexambrowser.windowsapi\wininet.cs���N�6z���f�2	i	����.�N_���?
f
�
BC/X��.
J�0b0�v�j��:�P��^�	�	���j���
�
��

P
8>yp���W�0�t,��?�+FS��/��/�(�0�Ksh^/�e�	(�0��h�	/�	e�(�0���h:/�e8(�0X�b�h/8e(�0�ږ�h�/e�(�0��cchf/�eC(�0���h/CeB(�0k9�Jh
/Be�(�0S�hN/�e.
(�0�7�;h�/.
e�(�0.h�/�e�(�0��7hj/�e�(�0ss?�h�/�e�(�0����h�/�e(�0����h�
/e(�0Z���h�/e(�0�b�hN/e(�0A���h�/e�(�0�ȷ�h�/�e�(�0Є��hv/�ei	(�0�2Jh2	/i	e�
(�0�}h�
/�
e�(�0�+#Kh�/�e�(�0����h�/�e?(�0/x�h/?e�(�0�8��h�/�e0(�0��h/0e(�0V&]h�/eb(�0ؐGh0/beP
(�0�K�,h
/P
e6(�0b�h/6e�(�0P�hz/�e�
(�0�or�hf
/�
e�(�0�khHhp/�e�(�0K���h�/�e�(�0^���hP/�e�(�0��}�h�/�eX(�0�k�Zh/XeJ(�0l,��h/Jey(�0����h>/ye�(�0��Íhj/�e(�0�B�]h�/e_(�0��n�h./_e:*@��get_StartupDesktop:*���set_StartupDesktop.*���.ctor�h�
$USystem$USystem.Collections.Generic$USystem.ComponentModel$USystem.Diagnostics$USystem.IO$USystem.Linq$USystem.Management"$USystem.Runtime.InteropServices2$USystem.Security.Cryptography.X509Certificates&$USafeExamBrowser.Logging.Contracts*$USafeExamBrowser.WindowsApi.Constants*$USafeExamBrowser.WindowsApi.Contracts&$USafeExamBrowser.WindowsApi.Types6�?�ƳY�I�%	���`MD2
6*����GetAllRunning��� processes names���" CS$<>8__locals04[ name" originalName path signature~�?�ƳY�I�%	���`MD2�PprocessIdnameoriginalNamepathsignaturenames2*���~StartNew�t�~ raw name" originalName signature process.�?�ƳY�I�%	���`MD2�2*k�TryGetById��k��? raw name" originalName path signature��!O e.�?�ƳY�I�%	���`MD2�>*T	
�vLoadAllProcessNames 	
v namesT��| searcher���� results���� process��s� name" originalName path 	processId 
signatureT	h e.�?�ƳY�I�%	���`MD2�>*D���LoadProcessNamesForX	�� name" originalName path signature�	�
�� searcher,
�
s� resultsd
�
\� processData�	&, e.�?�ƳY�I�%	���`MD2�2*�'�\LoggerFor.�?�ƳY�I�%	���`MD2�6*M��StartNormal.�?�ƳY�I�%	���`MD2�6* 
���StartOnDesktop��� commandLine processInfo startupInfo errorCode.�?�ƳY�I�%	���`MD2�>*�
�}TryLoadOriginalName.�?�ƳY�I�%	���`MD2�:*\)��TryLoadSignature�
()��
$� certificate.�?�ƳY�I�%	���`MD2��$��$0�$��15�<�0�!�
"�.����
�&�'�(�*�����!*�+,�@.�r0�����*��4�)<&#
3ai��~�
�9�;�=�%?�.��0C�9F�TG�hI��K�2<,&#F^R��k	xP�T�
U�-W�BX�DY�F[�c\�e^�=J[?(��v
!�c�g�h�j�#l�)��.l�7n�;p�Nq�Qr�ds�wt�zv��x��y��|��}��������l�����������������������������������Bu(B)5+?>(	5	/D6�P��D����	����
��)��2��@��R��d��l��v��������������������������������������������#'$�(F3=3-Q1�$\'��I�l�M`������'��3��E��L��39&.f���������$��,��9��R��p��r��~��������E0(11�O0n(�`}T������������J	#���)
�����
���������� ��!��#��H2	 ��h$<`x�����$<`x����8Pt��.*4��get_Id.*h��set_Id.*���.ctorl��
$USystem"$USystem.Runtime.InteropServices*$USafeExamBrowser.WindowsApi.Constants2$USafeExamBrowser.WindowsApi.Contracts.Events*$USafeExamBrowser.WindowsApi.Delegates&$USafeExamBrowser.WindowsApi.Types6�?�ƳY�I�%	���`MD2.*x=��Attach�D=�" moduleHandle.�?�ƳY�I�%	���`MD2�.*��&Detach.�?�ƳY�I�%	���`MD2�:*�s�2LowLevelMouseProc��s2�QE  mouseData  button  state  info.�?�ƳY�I�%	���`MD2�.*\��Ignore.�?�ƳY�I�%	���`MD2�2*�H��GetButton.�?�ƳY�I�%	���`MD2�2*hI�GetInfo�4I extraInfo.�?�ƳY�I�%	���`MD2�2*�D�IGetState.�?�ƳY�I�%	���`MD2��$���$��'�H�<��
��1�`�=T"�#�
$�)�'*�<+�A$C7Z�$&/�.�x2sl4�6�)7�78�E9�M;�]=�dA�0].,#'@�$�G�O�`�HT��>P�@S�BV�DY�F[� #!�`ITa�b�d�&e�7f�Hh�&5]�HID<��>s�@x�Bz�&'&�P���$8Ph�����0H`x����P���N�2	�	
�

z�:�f
�
>�v�N�j.*4��get_Id.*h��set_Id.*�8��.ctorld8�
$USystem$USystem.Threading*$USafeExamBrowser.WindowsApi.Constants2$USafeExamBrowser.WindowsApi.Contracts.Events*$USafeExamBrowser.WindowsApi.Delegates6�?�ƳY�I�%	���`MD2.*8��Attach.�?�ƳY�I�%	���`MD2�6*p*�AwaitDetach.�?�ƳY�I�%	���`MD2�.*��6Detach.�?�ƳY�I�%	���`MD2�:*D
�ULowLevelSystemProc.�?�ƳY�I�%	���`MD2��$���$��'�l�8`��
� �%!�,"�7#�@1@�<�80*�+�7,�:x�H*<0�1�2�)3�2%�<607�8�:�)�0U
$?�@��f8����4Ld�����2*8�Mget_Handle2*p�Tset_Handle2*��\get_Name2*��cset_Name.*��k.ctor��k
$USystem$USystem.ComponentModel"$USystem.Runtime.InteropServices*$USafeExamBrowser.WindowsApi.Contracts6�?�ƳY�I�%	���`MD22*H��Activate.�?�ƳY�I�%	���`MD2�.*���Close.�?�ƳY�I�%	���`MD2�2*��ToString.�?�ƳY�I�%	���`MD2��$M��$T�+�$\��$c�)�Hk<��
��-�H�<��
!�#�/;�H�<'�)�
+�-�.;�$�1�"�.@ 8Tl������(<Tl2*8cfget_Flags2*pdmset_Flags:*�euget_IsAvailable:*�f|set_IsAvailable6*,g�get_IsEnabled6*hh�set_IsEnabled:*�i�get_IsHotkeyActive:*�j�set_IsHotkeyActive�$f�$(�$m�)-�$u�!�$|�"/�$���$�� -�$�� $�$��%2�j@�����<Tp�����	.*���.ctorX�
$USystem6�?�ƳY�I�%	���`MD22*���ToString.�?�ƳY�I�%	���`MD2��H�<����j|-)�$��6�p4	H	`	x	F*|�6<DeregisterKeyboardHook>b__0.�?�ƳY�I�%	���`MD2��$6F�8F�^�	�	B*x�H<DeregisterMouseHook>b__0.�?�ƳY�I�%	���`MD2��$HW�5C�^�	�	J*��Z<DeregisterSystemEventHook>b__0.�?�ƳY�I�%	���`MD2��$Zh�6D�^
D
2*8Y�get_Left2*pZ�set_Left2*�[get_Top2*�\
set_Top2*]get_Right2*P^set_Right2*�_!get_Bottom2*�`(set_Bottom�$���$���$��$
��$��$��$!��$(� ��@\
t
�
�
�
�
�
4Ld|���:*��<Terminate>b__0T
$USystem$USystem.Collections.Generic$USystem.Diagnostics$USystem.IO$USystem.Linq$USystem.Threading&$USafeExamBrowser.Logging.Contracts*$USafeExamBrowser.WindowsApi.Contracts&$USafeExamBrowser.WindowsApi.Types2�?�ƳY�I�%	���`MD2	�$c�8I��2*8l�get_Handle2*pm�set_Handle2*�n�get_Title2*�o�set_Title�$�� �$��!%�$���$�� $�� 8Pl����:*<p�get_HasTerminated�
$USystem$USystem.Text&$USafeExamBrowser.Logging.Contracts*$USafeExamBrowser.WindowsApi.Contracts2$USafeExamBrowser.WindowsApi.Contracts.Events6�?�ƳY�I�%	���`MD2.*�q�get_Id.�?�ƳY�I�%	���`MD2p2*�r�get_Name:*s�get_OriginalName2*Pt�get_Path6*�u�get_Signature6*�x�add_Terminated.�?�ƳY�I�%	���`MD2p:*hy�remove_Terminated.�?�ƳY�I�%	���`MD2p.*�@z
.ctor.�?�ƳY�I�%	���`MD2p:*<�{E
GetAdditionalInfo.�?�ƳY�I�%	���`MD2p2*�r|�
TryClose@�r�
t�S e.�?�ƳY�I�%	���`MD2p2*�H}kTryKill�xHk,t� e.�?�ƳY�I�%	���`MD2p2*~�ToString.�?�ƳY�I�%	���`MD2p6*�1�IsTerminated�1�P�� e.�?�ƳY�I�%	���`MD2p:*@C�InitializeEvent.�?�ƳY�I�%	���`MD2p:*�G�CWaitForTermination.�?�ƳY�I�%	���`MD2p6*-��Process_Exited.�?�ƳY�I�%	���`MD2p�$��
 �$��
�$�"��$�#� $�$�$��$�%�!�<�0+�+�
+�
#$678�0�$,�,�
&'(�x
@l/�1�2�3�4�#5�+6�?7��%*�TE
�H;�=�D>��?��A�#oV\���
r
�H�I�K�&M�)O�9��;S�KV�ZX�[Z�l[�n]�p^�4-FB65��kH	xd�f�g�&i�0k�1m�Bn�Dp�Fq�3+0�$�u��l�1`|�~�����+��-��/��G�`CT������&��2��B��&(4�`CGT������*��+��F��5DH�<�-0����,��.,�0��

4
L
d
|
�
�
�
�
8Pp�����4Ld|����$DJ*L2�<GetOpenWindows>g__EnumWindows|02
$USystem"$USystem.Collections.Concurrent$USystem.Collections.Generic$USystem.ComponentModel$USystem.Linq"$USystem.Runtime.InteropServices$USystem.Text$USystem.Threading*$USafeExamBrowser.WindowsApi.Constants*$USafeExamBrowser.WindowsApi.Contracts2$USafeExamBrowser.WindowsApi.Contracts.Events&$USafeExamBrowser.WindowsApi.Hooks&$USafeExamBrowser.WindowsApi.Types2�?�ƳY�I�%	���`MD2
�<20��$��0��p�^\�B*�Q�F<RegisterKeyboardHook>b__0�QF (hook (sleepEvent.�?�ƳY�I�%	���`MD2��xFQl=�>�@�A�%B�<C�HG�OE�+0"�^��B*�Q��<RegisterMouseHook>b__0�Q� )hook )sleepEvent.�?�ƳY�I�%	���`MD2��x�QlZ�[�]�^�%_�<`�Hd�Ob�(0�^�B*�N��<RegisterSystemEvent>b__0|N� *hook.�?�ƳY�I�%	���`MD2��l�N`������$��;��G��M��2 �^(P.*4�bget_Id.*h�iset_Id.*��q.ctorl�q
$USystem"$USystem.Runtime.InteropServices*$USafeExamBrowser.WindowsApi.Constants2$USafeExamBrowser.WindowsApi.Contracts.Events*$USafeExamBrowser.WindowsApi.Delegates&$USafeExamBrowser.WindowsApi.Types6�?�ƳY�I�%	���`MD2.*x=��Attach�D=�" moduleHandle.�?�ƳY�I�%	���`MD2�.*���Detach.�?�ƳY�I�%	���`MD2�>*�b��LowLevelKeyboardProc��b� �O� !keyData !modifier !state.�?�ƳY�I�%	���`MD2�2*H,�5GetState.�?�ƳY�I�%	���`MD2�6*�r�aGetModifiersL�ra "modifier.�?�ƳY�I�%	���`MD2�:*�g��TrackCtrlAndAlt�dg� keyCode.�?�ƳY�I�%	���`MD2�2*�:IsPressed.�?�ƳY�I�%	���`MD2��$b��$i�'�Hq<��
��7�`�=T#�$�
%�*�'+�<,�A$C:]�$�0�.�l�b`5�7�8�)9�7;�L=�SA�]<,:@�H5,<��&J�(M�*O���ar	xU�W�
Y�+[�/^�7`�;c�le�ph�$%P!"�&���g
�m�o�q�$��&s�6u�Cx�X{�_|�f~�"f%	c$M�$:��M��Ph������$<Tx�����,D>*4�l<GetAllRunning>b__0�l
$USystem$USystem.Collections.Generic$USystem.ComponentModel$USystem.Diagnostics$USystem.IO$USystem.Linq$USystem.Management"$USystem.Runtime.InteropServices2$USystem.Security.Cryptography.X509Certificates&$USafeExamBrowser.Logging.Contracts*$USafeExamBrowser.WindowsApi.Constants*$USafeExamBrowser.WindowsApi.Contracts&$USafeExamBrowser.WindowsApi.Types6�?�ƳY�I�%	���`MD2
>*���<GetAllRunning>b__1.�?�ƳY�I�%	���`MD2��$l,�1�$�.�F_��\���.*T��.ctor�
$USystem$USystem.ComponentModel"$USystem.Runtime.InteropServices&$USafeExamBrowser.Logging.Contracts*$USafeExamBrowser.WindowsApi.Constants*$USafeExamBrowser.WindowsApi.Contracts6�?�ƳY�I�%	���`MD22*����CreateNewX��� #desktop.�?�ƳY�I�%	���`MD2�6*��oCreateRandom���o $name& $obfuscatedHandle" $obfuscatedName $desktop.�?�ƳY�I�%	���`MD2�2*8��GetCurrent� %threadId %handle %name %nameLength %namePointer %desktop.�?�ƳY�I�%	���`MD2�B*<^��GenerateRandomDesktopName<^� &length &name�A &letter.�?�ƳY�I�%	���`MD2��H�<��
��(�x��l�!�6#�C%�^'�i*�p,��.�Bu=;,=��o��3�5�6�28�?:�Z<�e?�~@��A��C��E�<+u@;?5XD����J�K�
L�M�O�"Q�=S�HV�cX�sZ�{[��]��_��a��d��e��g��i��k�13T;m_7vR;0%,H�x�^lp�q�s���u�Os�Ss�Wx�$ 	x*2(��(��0Ld���2*4�Finalize��
$USystem"$USystem.Collections.Concurrent$USystem.Collections.Generic$USystem.ComponentModel$USystem.Linq"$USystem.Runtime.InteropServices$USystem.Text$USystem.Threading*$USafeExamBrowser.WindowsApi.Constants*$USafeExamBrowser.WindowsApi.Contracts2$USafeExamBrowser.WindowsApi.Contracts.Events&$USafeExamBrowser.WindowsApi.Hooks&$USafeExamBrowser.WindowsApi.Types2�?�ƳY�I�%	���`MD2
6*�?�ActivateWindow8�?� placement.�?�ƳY�I�%	���`MD2>*�U�DeregisterKeyboardHook�xU�" 	CS$<>8__locals0 	hook.�?�ƳY�I�%	���`MD2>*|U6DeregisterMouseHook�HU6" 
CS$<>8__locals0 
hook.�?�ƳY�I�%	���`MD2B*PU�DeregisterSystemEventHook�U�" CS$<>8__locals0 hook.�?�ƳY�I�%	���`MD2:*R�DisableStickyKeysT�R� success state.�?�ƳY�I�%	���`MD26*�&2EmptyClipboard.�?�ƳY�I�%	���`MD2:*DOXEnableStickyKeys�OX success state.�?�ƳY�I�%	���`MD2:*�"�GetCursorPositionH�"� 
position.�?�ƳY�I�%	���`MD26*\@�GetOpenWindows.�?�ƳY�I�%	���`MD2:*		GetProcessIdFor`�	 processId.�?�ƳY�I�%	���`MD2>*|	GetShellWindowHandle.�?�ƳY�I�%	���`MD2:*(
 GetShellProcessId�	�	  processId.�?�ƳY�I�%	���`MD2:*�
70GetWallpaperPath,
�
70-�MAX_PATH buffer.�?�ƳY�I�%	���`MD26*�X gGetWindowIcon�
XXg icon.�?�ƳY�I�%	���`MD26*h*!�GetWindowTitle�4*� length�0� builder.�?�ƳY�I�%	���`MD26*
("�GetWorkingAreal�(� workingArea.�?�ƳY�I�%	���`MD2>*�
	#HasInternetConnection.�?�ƳY�I�%	���`MD22*�
$HideWindow.�?�ƳY�I�%	���`MD2>*`!%"MinimizeAllOpenWindows.�?�ƳY�I�%	���`MD2B*�(&CPostCloseMessageToShell.�?�ƳY�I�%	���`MD2>*La'kRegisterKeyboardHook.�?�ƳY�I�%	���`MD2:*�a(�RegisterMouseHook.�?�ƳY�I�%	���`MD2J*<	)-	RegisterSystemCaptureStartEvent.�?�ƳY�I�%	���`MD2F*�	*6	RegisterSystemForegroundEvent.�?�ƳY�I�%	���`MD2>*,h+?	RegisterSystemEvent.�?�ƳY�I�%	���`MD2:*�,�	RemoveWallpaper.�?�ƳY�I�%	���`MD26*
-�	RestoreWindow.�?�ƳY�I�%	���`MD26*�2.�	ResumeThread�2�	-�����FAILURE handle.�?�ƳY�I�%	���`MD2:*4/�	SendCloseMessageTo.�?�ƳY�I�%	���`MD2:*�!0
SetAlwaysOnState.�?�ƳY�I�%	���`MD26*1,
SetWallpaper.�?�ƳY�I�%	���`MD26*�W2D
SetWorkingArea�WD
 workingArea.�?�ƳY�I�%	���`MD26*t23�
SuspendThread�@2�
-�����FAILURE handle.�?�ƳY�I�%	���`MD2:* �4�
TryGetStickyKeysx���
 stickyKeys.�?�ƳY�I�%	���`MD2:*c5iTrySetStickyKeys$�ci success stickyKeys" stateWithFlags.�?�ƳY�I�%	���`MD2.*p(6�.ctor.�?�ƳY�I�%	���`MD2�,� $���$�&�$�)��2��3)�D��F)�L+�R)�\��e��f.�w��y.�0��.��������2��2�+
-
*
�x�?l6�8�9�;�#<�,>�5@�>B�*$'15CE�x�Ul��
F�*H�-J�3L�5N�@Q�TS�H!<,�x6Ul��
W�*Y�-[�3]�5_�@b�Td�E!<)�x�Ul��
h�*j�-l�3n�5p�@s�Tu�F!<*�l�R`y�	{�}� ~�4�H��P��2DG='�l2&`������������%��1'';�lXO`��	������2��E��M��2CF<'�<�"0������&$�`�@T������-��/��:��%?;�0	$��	��?�$��7�< 0������(N�`07T��������(��6��,f;9�`gXT����!��5��B��V��kjk�`�*T�������$�4-7�T�(H
���� �!^;"�$	�7�$�C�<"!0$�&� '�(\�TC(H.�/�1�3�'5�(N;��ka	x��9�:�+;�<K�CL�JM�OO�[Q�35#���a	x��V�W�+X�<h�Ci�Jj�Ol�[n�35#�$-		s�M�$6		x�K��?	h	x��}�&~�2�C��J��Q��V��b��35#�0�	$�����0�	
$��	��?���	2
���	����������%��(��/��0��Z0%"�0�	$����b�`
!T����
������ ��,?=-�H,
<��
������\;�TD
WH��>��I��K��V��v^;���
2
���	����������%��(��/��0��Z1%"�l�
�`������!��1��4����&;o��ic	x��
��*�7�H��J�a�&0</lJ�<�(0���|sv�^(��(@h�����4Tl�����4Lp�����,Ld�����4Lt����0Ht����4Ph�����0Hd|����.*L"�T.ctor"T
$USystem"$USystem.Runtime.InteropServices$USystem.Timers&$USafeExamBrowser.Logging.Contracts*$USafeExamBrowser.WindowsApi.Constants*$USafeExamBrowser.WindowsApi.Contracts6�?�ƳY�I�%	���`MD2.*�L�vStart.�?�ƳY�I�%	���`MD2�.*>��Stop.�?�ƳY�I�%	���`MD2�6*0��Timer_Elapsed�� 'handle 'name 'nameLengthP�� 'namePointer.�?�ƳY�I�%	���`MD2��HT"<��
�!�(!�`vLT!�#�$�*%�5'�K(�#:�H�><,�-�"/�=0�#:���4�	5�6�
8�:�-<�4=�??�AA�HB�ND�kF��G�����L��O�����S��V��W�S`8w2'QiE!<� ,DXp���.*�+.ctorH+
$USystem$USystem.Collections.Generic$USystem.Diagnostics$USystem.IO$USystem.Linq$USystem.Threading&$USafeExamBrowser.Logging.Contracts*$USafeExamBrowser.WindowsApi.Contracts&$USafeExamBrowser.WindowsApi.Types2�?�ƳY�I�%	���`MD2	6*x�+HideAllWindows�D�+�@`N handle�<YU window.�?�ƳY�I�%	���`MD2:*<��RestoreAllWindows|���A window.�?�ƳY�I�%	���`MD2.*��}Start@��} process" explorerPath.�?�ƳY�I�%	���`MD22*1?Terminate�1?-��THREE_SECONDS" CS$<>8__locals0 process4�/� elapsed.�?�ƳY�I�%	���`MD2:*��pKillExplorerShell��p" taskkillPath.�?�ƳY�I�%	���`MD2�`+T�����* �?E'/��+��$�&�!��#&�*(�O.�[/��&��������2��3��4��5�<9
"R2+8�����9�;���;�%=�7>�_;�i��r��sA�~B��C�6+
0U<��}��G�H�J�(L�4M�@N�LO�^P�eR�u��wV�~T��Y��Z��[��\�3r7,..f@?Q�P?1D��a�b�!c�3e�9g�Yh�di�tk�v��xm�k��k��p��q��s��u��x��z��|����������� ��0��6VKf-@
kxi($]eG��p��������'��B��N��Z��f��r�����������3qe9,..>f�0���4Tl�����2*�6b0ToBounds�60"$USystem.Runtime.InteropServices*$USafeExamBrowser.WindowsApi.Contracts6�?�ƳY�I�%	���`MD2�$06������	/�`	$%-�i����1����
���5���
i�e
����1EY
yQ)�95����e�5e�9�	�
��
I�
��y%	�5	�����e�)Ua	M����%
�����-�Mu��
��		Q5�5
����I1���u��I��	=U�QA�����m����]qu�y�i��q����5�m�
5U9a�
��M��5Q���
�e��e���}��M��=��mM
-�E	e)�q�}a�m
��U5��Em�!��	9�%�I	��a	�1�M��U��
�
u
��q%y	
�E
�9Q�MM�
]
=�}�=���y������i}
�]�=Q�U

@�`�  @
�@ � @@A�@
�� � 
J	�@�@0
@@

�D�   

H �@� #��� �@@T�@�@@A
	  �@@@  @���@$0<HT`lx���������,8DP\h�����������(4@LXdp|���������������� ,8DP\t��������(4@Ldp|����������$0<HT`lx����������,8DP\ht�����������(4@LXdp|����������			$	0	<	H	T	`	l	�	�	�	�	�	�	�	�	�	�	�	

 
,
8
D
P
\
h
t
�
�
�
�
�
�
�
�
�
�
(4LXdp|����������$0<Hl����������

 
,
8
D
P
\
h
t
�
�
�
�
�
�
�
�
�
�
�
"%get_StartupDesktop)06000083"%Dset_StartupDesktop)D06000084%�.ctor)�06000085%�GetAllRunning)�06000086%�StartNew)�06000087%�TryGetById)�06000088"%LoadAllProcessNames)06000089"%X	LoadProcessNamesFor)X	0600008a%HLoggerFor)H0600008b%�StartNormal����	/�)�0600008c%StartOnDesktop)0600008d"%$
TryLoadOriginalName)$
0600008e%�
TryLoadSignature)�
0600008f%	get_Id)	06000090%8	set_Id)8	06000091%l	.ctor)l	06000092%�	Attach)�	06000093%|	Detach)|	06000094%�	LowLevelMouseProc)�	06000095%�	Ignore)�	06000096%`	GetButton)`	06000097%�	GetInfo)�	06000098%l	GetState)l	06000099%
get_Id)
0600009a%8
set_Id)8
0600009b%l
.ctor)l
0600009c%�
Attach)�
0600009d%
AwaitDetach)
0600009e%t
Detach)t
0600009f"%�
LowLevelSystemProc)�
060000a0%get_Handle)060000ab%<set_Handle)<060000ac%tget_Name)t060000ad%�set_Name)�060000ae%�.ctor)�060000af%�Activate)�060000b0%LClose)L060000b1%�ToString)�060000b2%get_Flags)06000063%<set_Flags)<06000064%tget_IsAvailable)t06000065%�set_IsAvailable)�06000066%�get_IsEnabled)�06000067%0set_IsEnabled)006000068"%lget_IsHotkeyActive)l06000069"%�set_IsHotkeyActive)�0600006a%.ctor)060000bc%�ToString)�060000bd*%<DeregisterKeyboardHook>b__0)060000d9&%<DeregisterMouseHook>b__0)060000db.%<DeregisterSystemEventHook>b__0)060000dd%get_Left)06000059%<set_Left)<0600005a%tget_Top)t0600005b%�set_Top)�0600005c%�get_Right)�0600005d%set_Right)0600005e%Tget_Bottom)T0600005f%�set_Bottom)�06000060%<Terminate>b__0)060000cf%get_Handle)0600006c%<set_Handle)<0600006d%tget_Title)t0600006e%�set_Title)�0600006f%get_HasTerminated)06000070%@get_Id)@06000071%�get_Name)�06000072%�get_OriginalName)�06000073%get_Path)06000074%Tget_Signature)T06000075%�add_Terminated)�06000078%�remove_Terminated)�06000079%l.ctor)l0600007a%�GetAdditionalInfo)�0600007b%@TryClose)@0600007c%�TryKill)�0600007d%�ToString)�0600007e%IsTerminated)0600007f%�InitializeEvent)�06000080"%DWaitForTermination)D06000081%�Process_Exited)�06000082.%<GetOpenWindows>g__EnumWindows|0)060000d1*%<RegisterKeyboardHook>b__0)060000d3&%<RegisterMouseHook>b__0)060000d5&%<RegisterSystemEvent>b__0)060000d7%get_Id)060000a1%8set_Id)8060000a2%l.ctor)l060000a3%�Attach)�060000a4%|Detach)|060000a5"%�LowLevelKeyboardProc)�060000a6%�GetState)�060000a7%LGetModifiers)L060000a8%�TrackCtrlAndAlt)�060000a9%�IsPressed)�060000aa"%<GetAllRunning>b__0)060000df"%8<GetAllRunning>b__1)8060000e0%
.ctor)
060000b3%X
CreateNew)X
060000b4%�
CreateRandom)�
060000b5%
GetCurrent)
060000b6&%<
GenerateRandomDesktopName)<
060000b7%Finalize)06000012%8ActivateWindow)806000013&%�DeregisterKeyboardHook)�06000014"%�DeregisterMouseHook)�06000015&%�DeregisterSystemEventHook)�06000016%TDisableStickyKeys)T06000017%EmptyClipboard)06000018%�EnableStickyKeys)�06000019%HGetCursorPosition)H0600001a%�GetOpenWindows)�0600001b%`GetProcessIdFor)`0600001c"%	GetShellWindowHandle)	0600001d%�	GetShellProcessId)�	0600001e%,
GetWallpaperPath),
0600001f%�
GetWindowIcon)�
06000020%�GetWindowTitle)�06000021%lGetWorkingArea)l06000022"%
HasInternetConnection)
06000023%�
HideWindow)�
06000024&%�
MinimizeAllOpenWindows)�
06000025&%dPostCloseMessageToShell)d06000026"%�RegisterKeyboardHook)�06000027%PRegisterMouseHook)P06000028.%�RegisterSystemCaptureStartEvent)�06000029*%@RegisterSystemForegroundEvent)@0600002a"%�RegisterSystemEvent)�0600002b%0RemoveWallpaper)00600002c%�RestoreWindow)�0600002d%ResumeThread)0600002e"%�SendCloseMessageTo)�0600002f%8SetAlwaysOnState)806000030%�SetWallpaper)�06000031%SetWorkingArea)06000032%�SuspendThread)�06000033%xTryGetStickyKeys)x06000034%$TrySetStickyKeys)$06000035%.ctor)06000036%.ctor)060000b8%PStart)P060000b9%�Stop)�060000ba%Timer_Elapsed)060000bb%.ctor)06000003%�HideAllWindows)�06000004%|RestoreAllWindows)|06000005%@Start)@06000006%Terminate)06000007%KillExplorerShell)06000008%ToBounds)06000062����w	1O�P�wQ�l,
���������M��SafeExamBrowser.WindowsApi.ExplorerShellF36043CB��������Kt�SafeExamBrowser.WindowsApi.NativeMethods40411B09��������@�pSafeExamBrowser.WindowsApi.Types.Bounds9B18C64C��������N�<SafeExamBrowser.WindowsApi.Types.RECT77F0AE89��������;�pSafeExamBrowser.WindowsApi.Types.StickyKeysStateCDAA9C7B��������B��SafeExamBrowser.WindowsApi.Types.Window319A60F9��������C lSafeExamBrowser.WindowsApi.Processes.Process88783EBD��������6`�SafeExamBrowser.WindowsApi.Processes.ProcessFactory538BB25C��������7�SafeExamBrowser.WindowsApi.Hooks.MouseHookD7156965��������9H�SafeExamBrowser.WindowsApi.Hooks.SystemHook90F5D410��������H`SafeExamBrowser.WindowsApi.Hooks.KeyboardHook8032C25D��������:�SafeExamBrowser.WindowsApi.Desktops.DesktopFD2964A8��������J@SafeExamBrowser.WindowsApi.Desktops.DesktopFactoryAAE459D8��������L4(SafeExamBrowser.WindowsApi.Desktops.DesktopMonitor363BBAB0��������<�SafeExamBrowser.WindowsApi.Desktops.ObfuscatedDesktop9569421D��������A�<SafeExamBrowser.WindowsApi.ExplorerShell.<>c__DisplayClass7_0950864B2��������DPTSafeExamBrowser.WindowsApi.NativeMethods.<>c__DisplayClass12_0491D49CC��������E��SafeExamBrowser.WindowsApi.NativeMethods.<>c__DisplayClass24_011CBAD32��������F��SafeExamBrowser.WindowsApi.NativeMethods.<>c__DisplayClass25_0DA977E97��������G��SafeExamBrowser.WindowsApi.NativeMethods.<>c__DisplayClass28_066096D49��������=�<SafeExamBrowser.WindowsApi.NativeMethods.<>c__DisplayClass5_00FEB6613��������>|<SafeExamBrowser.WindowsApi.NativeMethods.<>c__DisplayClass6_0897F14BD��������?�<SafeExamBrowser.WindowsApi.NativeMethods.<>c__DisplayClass7_04223C718��������I�hSafeExamBrowser.WindowsApi.Processes.ProcessFactory.<>c__DisplayClass6_0E46FE633��������	\* CompilerInfo *86F52079��������8�<DanglingDocuments*223343bd-a859-41a3-90c0-9dfa101f1a95>7FBDA2D2-�.�++���}�?1p���?�U6U�U�R2&XO�"�@	 07gX�*�(	"!C(ka�a-		6		?	h�	�	
�	2�	
!,
D
W�
2�
�ic�(��
!(06fmu|����������������
@E
��
rkH��1CCG�-�����~�kv
��\'�M��}�)����=&2s��HIID�	�	�8	�8	*	6	U
	b
i
q
�=
�
�b
5,
ar
�g
:
MT\ck������o���^T"
vL
�>
�
��2FQ�Q�N6HZl�
�������������4	

�&T����9S�Ay��&&&&&&&i��@n��F��3j��)_��1k��+.\SafeExamBrowser.WindowsApi\Processes\ProcessFactory.cs.\SafeExamBrowser.WindowsApi\Hooks\MouseHook.cs.\SafeExamBrowser.WindowsApi\Constants\AccessMask.cs.\SafeExamBrowser.WindowsApi\Constants\Constant.cs.\SafeExamBrowser.WindowsApi\Constants\HookType.cs.\SafeExamBrowser.WindowsApi\Constants\ShowWindowCommand.cs.\SafeExamBrowser.WindowsApi\Constants\SPI.cs.\SafeExamBrowser.WindowsApi\Constants\SPIF.cs.\SafeExamBrowser.WindowsApi\Constants\StickyKeysFlags.cs.\SafeExamBrowser.WindowsApi\Constants\SystemCommand.cs.\SafeExamBrowser.WindowsApi\Constants\ThreadAccess.cs.\SafeExamBrowser.WindowsApi\Constants\VirtualKeyCode.cs.\SafeExamBrowser.WindowsApi\Delegates\EnumDesktopDelegate.cs.\SafeExamBrowser.WindowsApi\Delegates\EnumWindowsDelegate.cs.\SafeExamBrowser.WindowsApi\Delegates\EventDelegate.cs.\SafeExamBrowser.WindowsApi\Delegates\HookDelegate.cs.\SafeExamBrowser.WindowsApi\Kernel32.cs.\SafeExamBrowser.WindowsApi\obj\x64\Release\.NETFramework,Version=v4.8.AssemblyAttributes.cs.\SafeExamBrowser.WindowsApi\Properties\AssemblyInfo.cs.\SafeExamBrowser.WindowsApi\Types\EXECUTION_STATE.cs.\SafeExamBrowser.WindowsApi\Types\KBDLLHOOKSTRUCT.cs.\SafeExamBrowser.WindowsApi\Types\KBDLLHOOKSTRUCTFlags.cs.\SafeExamBrowser.WindowsApi\Types\MSLLHOOKSTRUCT.cs.\SafeExamBrowser.WindowsApi\Types\POINT.cs.\SafeExamBrowser.WindowsApi\Types\PROCESS_INFORMATION.cs.\SafeExamBrowser.WindowsApi\Types\STARTUPINFO.cs.\SafeExamBrowser.WindowsApi\Types\STICKYKEYS.cs.\SafeExamBrowser.WindowsApi\Types\WINDOWPLACEMENT.cs.\SafeExamBrowser.WindowsApi\User32.cs.\SafeExamBrowser.WindowsApi\WinInet.cs.\SafeExamBrowser.WindowsApi\Hooks\SystemHook.cs.\SafeExamBrowser.WindowsApi\Desktops\Desktop.cs.\SafeExamBrowser.WindowsApi\Types\StickyKeysState.cs.\SafeExamBrowser.WindowsApi\Desktops\ObfuscatedDesktop.cs.\SafeExamBrowser.WindowsApi\NativeMethods.cs.\SafeExamBrowser.WindowsApi\Types\Bounds.cs.\SafeExamBrowser.WindowsApi\ExplorerShell.cs.\SafeExamBrowser.WindowsApi\Types\Window.cs.\SafeExamBrowser.WindowsApi\Processes\Process.cs.\SafeExamBrowser.WindowsApi\Hooks\KeyboardHook.cs.\SafeExamBrowser.WindowsApi\Desktops\DesktopFactory.cs.\SafeExamBrowser.WindowsApi\Desktops\DesktopMonitor.cs.\SafeExamBrowser.WindowsApi\Types\RECT.cs�������������5�����������.1^��hz�᝙kk@�����;���
/LinkInfo/TMCache/names/src/headerblock/src/files/.\safeexambrowser.windowsapi\explorershell.cs/src/files/.\safeexambrowser.windowsapi\nativemethods.cs/src/files/.\safeexambrowser.windowsapi\types\bounds.cs/src/files/.\safeexambrowser.windowsapi\types\rect.cs/src/files/.\safeexambrowser.windowsapi\types\stickykeysstate.cs/src/files/.\safeexambrowser.windowsapi\types\window.cs/src/files/.\safeexambrowser.windowsapi\processes\process.cs/src/files/.\safeexambrowser.windowsapi\processes\processfactory.cs/src/files/.\safeexambrowser.windowsapi\hooks\mousehook.cs/src/files/.\safeexambrowser.windowsapi\hooks\systemhook.cs/src/files/.\safeexambrowser.windowsapi\hooks\keyboardhook.cs/src/files/.\safeexambrowser.windowsapi\desktops\desktop.cs/src/files/.\safeexambrowser.windowsapi\desktops\desktopfactory.cs/src/files/.\safeexambrowser.windowsapi\desktops\desktopmonitor.cs/src/files/.\safeexambrowser.windowsapi\desktops\obfuscateddesktop.cs/src/files/.\safeexambrowser.windowsapi\constants\accessmask.cs/src/files/.\safeexambrowser.windowsapi\constants\constant.cs/src/files/.\safeexambrowser.windowsapi\constants\hooktype.cs/src/files/.\safeexambrowser.windowsapi\constants\showwindowcommand.cs/src/files/.\safeexambrowser.windowsapi\constants\spi.cs/src/files/.\safeexambrowser.windowsapi\constants\spif.cs/src/files/.\safeexambrowser.windowsapi\constants\stickykeysflags.cs/src/files/.\safeexambrowser.windowsapi\constants\systemcommand.cs/src/files/.\safeexambrowser.windowsapi\constants\threadaccess.cs/src/files/.\safeexambrowser.windowsapi\constants\virtualkeycode.cs/src/files/.\safeexambrowser.windowsapi\delegates\enumdesktopdelegate.cs/src/files/.\safeexambrowser.windowsapi\delegates\enumwindowsdelegate.cs/src/files/.\safeexambrowser.windowsapi\delegates\eventdelegate.cs/src/files/.\safeexambrowser.windowsapi\delegates\hookdelegate.cs/src/files/.\safeexambrowser.windowsapi\kernel32.cs/src/files/.\safeexambrowser.windowsapi\obj\x64\release\.netframework,version=v4.8.assemblyattributes.cs/src/files/.\safeexambrowser.windowsapi\properties\assemblyinfo.cs/src/files/.\safeexambrowser.windowsapi\types\execution_state.cs/src/files/.\safeexambrowser.windowsapi\types\kbdllhookstruct.cs/src/files/.\safeexambrowser.windowsapi\types\kbdllhookstructflags.cs/src/files/.\safeexambrowser.windowsapi\types\msllhookstruct.cs/src/files/.\safeexambrowser.windowsapi\types\point.cs/src/files/.\safeexambrowser.windowsapi\types\process_information.cs/src/files/.\safeexambrowser.windowsapi\types\startupinfo.cs/src/files/.\safeexambrowser.windowsapi\types\stickykeys.cs/src/files/.\safeexambrowser.windowsapi\types\windowplacement.cs/src/files/.\safeexambrowser.windowsapi\user32.cs/src/files/.\safeexambrowser.windowsapi\wininet.cs/^���c
ᣑ�}8&} �){
3��,]':
2�	0��	1��
|F#�
4@
E	.�"�(�8|	/�%~�	-9�+
~+�$�@d�!L|=*�Q3R(�8�'8��`hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh(�@	�p8�����x���ppD�	(tL'��
(�,0���������������������������6789:;<=>?@ABC	

 !"#$%&'()*+,-./012345DEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~���������������������������������������������������������