Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BrowserUpdateTool.exe

Overview

General Information

Sample name:BrowserUpdateTool.exe
Analysis ID:1501393
MD5:9e89fefaa6e3d99c3824d5e68dc8d3a2
SHA1:d11ea624bdc348af474128d338f012b7caf4b2d3
SHA256:162e4277a4cb2e3703df74529d83d47b66a5b46b0a93b3ac902b56da3e588fe9
Tags:ClickFixexe
Infos:

Detection

Score:19
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Found strings related to Crypto-Mining
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • BrowserUpdateTool.exe (PID: 7536 cmdline: "C:\Users\user\Desktop\BrowserUpdateTool.exe" MD5: 9E89FEFAA6E3D99C3824D5E68DC8D3A2)
    • msedgewebview2.exe (PID: 7624 cmdline: "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=BrowserUpdateTool.exe --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=7536.7584.8340987022922056471 MD5: 9909D978B39FB7369F511D8506C17CA0)
      • msedgewebview2.exe (PID: 7648 cmdline: "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdfb1c8e88,0x7ffdfb1c8e98,0x7ffdfb1c8ea8 MD5: 9909D978B39FB7369F511D8506C17CA0)
      • msedgewebview2.exe (PID: 7912 cmdline: "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1788 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2 MD5: 9909D978B39FB7369F511D8506C17CA0)
      • msedgewebview2.exe (PID: 7936 cmdline: "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2780 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:3 MD5: 9909D978B39FB7369F511D8506C17CA0)
      • msedgewebview2.exe (PID: 7968 cmdline: "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3020 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:8 MD5: 9909D978B39FB7369F511D8506C17CA0)
      • msedgewebview2.exe (PID: 7984 cmdline: "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1724954327302821 --launch-time-ticks=4335514542 --mojo-platform-channel-handle=3508 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:1 MD5: 9909D978B39FB7369F511D8506C17CA0)
      • msedgewebview2.exe (PID: 5720 cmdline: "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4536 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2 MD5: 9909D978B39FB7369F511D8506C17CA0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Bitcoin Miner

barindex
Source: msedgewebview2.exe, 00000002.00000002.2934535244.00004C640304C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: jsecoin.com/
Source: msedgewebview2.exe, 00000002.00000002.2934535244.00004C640304C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: coinhive.com/
Source: BrowserUpdateTool.exeStatic PE information: certificate valid
Source: BrowserUpdateTool.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: MpGear.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: BTR.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: KSLDriver.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: KSLD.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/Microsoft.CodeAnalysis.CSharp/Release/net7.0/Microsoft.CodeAnalysis.CSharp.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/Microsoft.CodeAnalysis.CSharp/Release/net7.0/Microsoft.CodeAnalysis.CSharp.pdbSHA256C source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: offreg.pdbH source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: KSLDriver.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: MsMpEngCP.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF330000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: BTR.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: MsMpEngSvc.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: mpengine.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: MsMpEngSvc.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: Microsoft.CodeAnalysis.CSharp.ni.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: MsMpEngCP.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF330000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: offreg.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: KSLD.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: MpGear.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: output file name with .pdb extension) source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: mpengine.pdbOGPS source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\3ac53f57-dfab-444d-a69f-4fabb3044db1.tmpJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\SCT Auditing Pending ReportsJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\Jump to behavior
Source: Joe Sandbox ViewIP Address: 162.159.61.3 162.159.61.3
Source: Joe Sandbox ViewIP Address: 185.199.111.133 185.199.111.133
Source: Joe Sandbox ViewIP Address: 172.64.41.3 172.64.41.3
Source: Joe Sandbox ViewIP Address: 151.101.130.137 151.101.130.137
Source: Joe Sandbox ViewIP Address: 151.101.130.137 151.101.130.137
Source: global trafficHTTP traffic detected: GET /jquery-3.7.1.min.js HTTP/1.1Host: code.jquery.comConnection: keep-aliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47 wails.iosec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117", "Microsoft Edge WebView2";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: http://wails.localhost/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /n3r4zzurr0/svg-spinners/main/preview/90-ring-with-bg-black-36.svg HTTP/1.1Host: raw.githubusercontent.comConnection: keep-aliveAccept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47 wails.iosec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117", "Microsoft Edge WebView2";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: http://wails.localhost/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /jquery-3.7.1.min.js HTTP/1.1Host: code.jquery.comConnection: keep-aliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47 wails.iosec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117", "Microsoft Edge WebView2";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: http://wails.localhost/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /n3r4zzurr0/svg-spinners/main/preview/90-ring-with-bg-black-36.svg HTTP/1.1Host: raw.githubusercontent.comConnection: keep-aliveAccept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47 wails.iosec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117", "Microsoft Edge WebView2";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: http://wails.localhost/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: msedgewebview2.exe, 00000002.00000002.2937017514.00004C64036F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ?www.facebook.com equals www.facebook.com (Facebook)
Source: msedgewebview2.exe, 00000002.00000002.2937165871.00004C6403724000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: dLwww.facebook.com equals www.facebook.com (Facebook)
Source: msedgewebview2.exe, 00000008.00000003.1682298933.00004C18008A4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.2344807362.00004C18008A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1676983955.00004C18008A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://microsoftstart.msn.cn/*https://rewards.microsoft.com/*https://www.microsoftnews.com/*https://www.facebook.com/*www.staging-bing-int.comaction.getBadgeTextColorbrowserAction.openPopupmanifest:browser_action@ equals www.facebook.com (Facebook)
Source: msedgewebview2.exe, 00000002.00000002.2930853182.00004C64026B4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1682298933.00004C18008A4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.2344807362.00004C18008A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/* equals www.facebook.com (Facebook)
Source: msedgewebview2.exe, 00000002.00000002.2927782050.00004C64022D4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2937165871.00004C6403724000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2937017514.00004C64036F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
Source: global trafficDNS traffic detected: DNS query: code.jquery.com
Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
Source: global trafficDNS traffic detected: DNS query: chrome.cloudflare-dns.com
Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: unknownHTTP traffic detected: POST /dns-query HTTP/1.1Host: chrome.cloudflare-dns.comConnection: keep-aliveContent-Length: 128Accept: application/dns-messageAccept-Language: *User-Agent: ChromeAccept-Encoding: identityContent-Type: application/dns-message
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://.ocx.cabhtml:file::LowTelemetry
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671847131.00000A7400150000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/1423136
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/2162
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/2517
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/2970
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/2970r
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3078
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3078P
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3205
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3205c
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3206
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3452
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3452Q
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3498
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3498n
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3502
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3502W
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3577
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3584
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3586
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3586i
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934760720.00004C64030D4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919224282.00000A74000A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3623
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934760720.00004C64030D4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919224282.00000A74000A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3624
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934760720.00004C64030D4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919224282.00000A74000A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3625
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3832
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3862
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3965
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/3970
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4324
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4324y
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4384
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4405
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4428
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4428B
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4551
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4633
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4633=
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4722
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4722X
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4836
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4901
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4901T
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4937
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/4937Z
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2927124013.00004C640221C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671847131.00000A7400150000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5007
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5055
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5061
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5061(
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5281
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5371
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5375
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5375S
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5421
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5430
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5535
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5658
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5750
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5881
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5881&
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5901
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/59013
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5906
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5906#
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/5906.
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/59061
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6041
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6048
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6141
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6248
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6439
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6651
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6692
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6755
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6755g
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6860
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/68605
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6876
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6876R
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6878
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6929
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6929H
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/6953
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2930294080.00004C64025DC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671847131.00000A7400150000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7036
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7047
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7047:
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7172
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7279
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7370
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7370o
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7406
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7406;
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7488
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7553
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7556
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2927124013.00004C640221C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671847131.00000A7400150000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7724
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671847131.00000A7400150000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7760
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/7761
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8162
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8162K
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8215
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8215O
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8229
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8229Y
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2927124013.00004C640221C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anglebug.com/8280
Source: BrowserUpdateTool.exe, 00000000.00000002.2913919025.000000C000C00000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000BE2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
Source: BrowserUpdateTool.exe, 00000000.00000002.2913919025.000000C000C00000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crlhttp://crl.dhimyotis.com/certignarootca.crl
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C0001EA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl091
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A4A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl0
Source: BrowserUpdateTool.exe, 00000000.00000002.2913919025.000000C000C00000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000BE2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000509000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crlEntrust.net
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A4A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A4A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl=
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A4A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C0001EA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crlGo
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordDigest
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000509000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://earth.google.com/kml/2.0
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000509000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://earth.google.com/kml/2.1
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000509000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://earth.google.com/kml/2.2
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://issuetracker.google.com/200067929
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A70000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es0
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.esTWCA
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://onsi.github.io/ginkgo/#%s
Source: msedgewebview2.exe, 00000002.00000002.2931159496.00004C640273C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://playinfo.gomlab.com/ending_browser.gom?product=GOMPLAYER
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C00083A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
Source: BrowserUpdateTool.exe, 00000000.00000002.2929630610.0000619000244000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2930944054.00006190006F8000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2929459975.0000619000220000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2917172639.000000C000DF0000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2929518614.0000619000230000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1698629405.00004C640076C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2918286922.0000019D0A527000.00000004.08000000.00040000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934018054.00004C6402E90000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934176396.00004C6402EF8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2912053743.0000785800070000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2911931844.0000785800060000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2916085503.000078580023C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2912533142.00007858000B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2911794989.0000785800054000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000007.00000002.2900246129.0000408400024000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000002.2895372254.000001E782BB7000.00000004.10000000.00040000.00000000.sdmp, data_1.6.drString found in binary or memory: http://wails.localhost
Source: BrowserUpdateTool.exe, 00000000.00000002.2917172639.000000C000DF0000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933875020.00004C6402E5C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2932491826.00004C6402B84000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934866795.00004C6403104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933062655.00004C6402C80000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934796071.00004C64030EC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2928410425.00004C6402384000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1679353468.00004C64032F8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1698751840.00004C6402450000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2929780617.00004C640249F000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933288615.00004C6402D0C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.2258233470.00004C64032ED000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2930294080.00004C64025DC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1679285905.00004C640321C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2927124013.00004C640221C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2928716071.00004C64023D4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1679329198.00004C64030E0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934057311.00004C6402EA4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2930853182.00004C64026B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/
Source: msedgewebview2.exe, 00000002.00000002.2934866795.00004C6403104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934796071.00004C64030EC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1679329198.00004C64030E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost//newsbar
Source: msedgewebview2.exe, 00000002.00000002.2934796071.00004C64030EC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1679329198.00004C64030E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/83a6a7c59200
Source: msedgewebview2.exe, 00000002.00000002.2931825028.00004C6402AA0000.00000004.00000800.00020000.00000000.sdmp, History.2.drString found in binary or memory: http://wails.localhost/Browser
Source: msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/Char
Source: msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/CharB
Source: msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/CharX
Source: BrowserUpdateTool.exe, 00000000.00000002.2913919025.000000C000C00000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/Internal
Source: msedgewebview2.exe, 00000002.00000002.2928410425.00004C6402384000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2929629224.00004C6402460000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/Ld
Source: msedgewebview2.exe, 00000002.00000002.2933875020.00004C6402E5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/P
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/TranslateMessageDispatchMessageWUser-Agent
Source: msedgewebview2.exe, 00000002.00000002.2928410425.00004C6402384000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2929629224.00004C6402460000.00000004.00000800.00020000.00000000.sdmp, ce7a59cbee8b4379_0.2.drString found in binary or memory: http://wails.localhost/assets/index.25ad37ba.js
Source: BrowserUpdateTool.exe, 00000000.00000002.2919669132.0000019BCC8BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/brave.svga
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E88000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/brave.svghttp://wails.localhost/brave.svg
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/chrome-beta.svg
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/chrome-beta.svghttp://wails.localhost/chromium.svgInternal
Source: BrowserUpdateTool.exe, 00000000.00000002.2913919025.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1692541612.0000019BCC8BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/chrome.svg
Source: BrowserUpdateTool.exe, 00000000.00000002.2913919025.000000C000C00000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/chrome.svgInternal
Source: BrowserUpdateTool.exe, 00000000.00000003.1692541612.0000019BCC8BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/chrome.svgs
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000003.1696087200.000078580038C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1697435546.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1698087246.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696826623.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696636671.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.2344856112.00004C18010BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/chromium.svg
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/chromium.svgbackend.App.GetBrowsers-2302447986
Source: BrowserUpdateTool.exe, 00000000.00000003.1692541612.0000019BCC8BE000.00000004.00000020.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E88000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2919669132.0000019BCC8BD000.00000004.00000020.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1697435546.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1698087246.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696826623.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696636671.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.2344856112.00004C18010BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/edge.svg
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E88000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/edge.svghttp://wails.localhost/edge.svg
Source: msedgewebview2.exe, 00000002.00000002.2933875020.00004C6402E5C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934866795.00004C6403104000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/erPolicy
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2919669132.0000019BCC8BD000.00000004.00000020.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2932491826.00004C6402B84000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933654153.00004C6402DD0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934176396.00004C6402EF8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2931941203.00004C6402ABC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.2098078642.00004C1801500000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000002.2895372254.000001E782BB7000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://wails.localhost/favicon.ico
Source: msedgewebview2.exe, 00000002.00000002.2933654153.00004C6402DD0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2931941203.00004C6402ABC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/favicon.ico2
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/favicon.icoInternal
Source: BrowserUpdateTool.exe, 00000000.00000002.2930356511.00006190002D0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2918286922.0000019D0A527000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://wails.localhost/favicon.icofmethodcGETgheaders
Source: BrowserUpdateTool.exe, 00000000.00000003.1692541612.0000019BCC8BE000.00000004.00000020.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1697435546.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1698087246.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696826623.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696636671.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.2344856112.00004C18010BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/firefox.svg
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/firefox.svgInternal
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/http://wails.localhost/
Source: msedgewebview2.exe, 00000002.00000002.2933288615.00004C6402D0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/ipe
Source: BrowserUpdateTool.exe, 00000000.00000002.2930356511.00006190002D0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2918286922.0000019D0A527000.00000004.08000000.00040000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2928028384.00004C6402328000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/jUser-Agentx
Source: BrowserUpdateTool.exe, 00000000.00000002.2919669132.0000019BCC834000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/n
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1697435546.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1698087246.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696826623.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696636671.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.2344856112.00004C18010BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/opera-gx.svg
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/opera-gx.svgInternal
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/opera-gx.svghttp://wails.localhost/chrome-beta.svgInternal
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E88000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/opera.svghttp://wails.localhost/opera.svg
Source: msedgewebview2.exe, 00000002.00000002.2932491826.00004C6402B84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/oratorOnPMSequenceify
Source: BrowserUpdateTool.exe, 00000000.00000002.2917172639.000000C000DF0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/pW%
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://wails.localhost/runtime.WindowReload();msSmartScreenProtectiononly
Source: msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/w
Source: msedgewebview2.exe, 00000002.00000003.1679353468.00004C64032F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/wails/ipc.js
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000582000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933288615.00004C6402D0C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1679285905.00004C640321C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2930853182.00004C64026B4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2932372135.00004C6402B4C000.00000004.00000800.00020000.00000000.sdmp, 1afe9cacc9803fd2_0.2.drString found in binary or memory: http://wails.localhost/wails/runtime.js
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000582000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/wails/runtime.jsInternal
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000582000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/wails/runtime.jshttp://wails.localhost/assets/index.25ad37ba.jsInternal
Source: msedgewebview2.exe, 00000002.00000002.2934866795.00004C6403104000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost/windows/newsbar
Source: msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wails.localhost:80
Source: BrowserUpdateTool.exe, 00000000.00000002.2917172639.000000C000DF0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://wails.localhostpW%
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.4399.com/flash/32979.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.4399.com/flash/48399.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.4399.com/flash/seer.htm
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A70000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A70000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A70000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A70000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0B1
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A70000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A70000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es00
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000B18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000436000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.collada.org/2005/11/COLLADASchema
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C0000A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000036000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.garmin.com/xmlschemas/TrainingCenterDatabase/v2
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=webreferrerEvalError
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd%v:
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000509000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.opengis.net/gml
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000509000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.opengis.net/gml/3.2
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000036000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000509000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.opengis.net/gml/3.3/exr
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000509000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.opengis.net/kml/2.2
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C00083A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C0000A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000036000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000509000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.topografix.com/GPX/1/1
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://If-MatchInfinityCancelIotext/xmltext/csv.geojsontext/rtftext/vtttext/rssfont/ttffont/otf.tor
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/4830
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/4966
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/5845
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/6574
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7161
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7162
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7246
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7308
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7308E
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7319
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7319h
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7320
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7369
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/73697
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7369F
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7369J
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7382
Source: msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/73826
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7489
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7604
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7714
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7847
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://anglebug.com/7899
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000BE2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.cloudflare.com/client/v4
Source: msedgewebview2.exe, 00000002.00000002.2929022814.00004C640240C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://azureedge.net/
Source: msedgewebview2.exe, 00000002.00000002.2930420867.00004C640260C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://baduk.hangame.com/?utm_source=baduk&utm_medium=icon&utm_campaign=shortcut
Source: msedgewebview2.exe, 00000002.00000002.2929288055.00004C6402434000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.designerapp.osi.office.net/
Source: msedgewebview2.exe, 00000002.00000002.2929288055.00004C6402434000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.edog.designerapp.osi.office.net/
Source: msedgewebview2.exe, 00000002.00000002.2929288055.00004C6402434000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.int.designerapp.osi.office.net/
Source: BrowserUpdateTool.exe, 00000000.00000002.2917172639.000000C000DB8000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675867905.0000619000398000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675759587.0000619000644000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1677666100.0000019BCC890000.00000004.00000020.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675914297.00006190006D0000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675288454.00006190006B4000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675450421.000061900067C000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675124142.0000619000398000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675815983.000061900060C000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2917172639.000000C000D88000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000942000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675192944.00006190003B4000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2917172639.000000C000DF0000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675221871.00006190003B4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1677371751.00004C64032A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2928716071.00004C64023D4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1677415384.00004C640328C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2929629224.00004C6402460000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1677476928.00004C6403238000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://code.jquery.com/jquery-3.7.1.min.js
Source: BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://code.jquery.com/jquery-3.7.1.min.jshttp://wails.localhost/firefox.svgInternal
Source: msedgewebview2.exe, 00000002.00000002.2932741360.00004C6402BE0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1711111569.00004C6403308000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2913208128.00007858000E4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000003.2270950364.000078580028A000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000003.1708284697.0000785800388000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2911794989.0000785800054000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2912634435.00007858000CA000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000003.2270950364.0000785800288000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000003.1727208342.00007858002AA000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000003.1706017081.0000785800388000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1709270172.00004C1800C4C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000002.2895998296.000001E782BFD000.00000004.10000000.00040000.00000000.sdmp, data_2.6.drString found in binary or memory: https://csp.withgoogle.com/csp/apps-themes
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://daringfireball.net/projects/markdown/).
Source: msedgewebview2.exe, 00000002.00000002.2929288055.00004C6402434000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2928626686.00004C64023C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://designerapp-dogfood.azurewebsites.net/
Source: msedgewebview2.exe, 00000002.00000002.2929288055.00004C6402434000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2928626686.00004C64023C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://designerapp-int.azurewebsites.net/
Source: msedgewebview2.exe, 00000002.00000002.2929288055.00004C6402434000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2928626686.00004C64023C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://designerapp.azurewebsites.net/
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://doi.org/GetPartitions:
Source: msedgewebview2.exe, 00000002.00000002.2935912672.00004C64032D4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2929965812.00004C64024C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://edge-conumer-static.azureedge.net/static/edropstatic/2023/09/13/2/static/js/main.2c5481de.js
Source: BrowserUpdateTool.exe, 00000000.00000003.1674672079.0000619000338000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675867905.0000619000398000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1674541119.0000619000320000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675759587.0000619000644000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675036155.0000619000350000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C0001BC000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675914297.00006190006D0000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675288454.00006190006B4000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675450421.000061900067C000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1674307964.0000619000314000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675124142.0000619000398000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675815983.000061900060C000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2917172639.000000C000D88000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000942000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675192944.00006190003B4000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A0E000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1674882235.0000619000344000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2917172639.000000C000DF0000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1674647869.000061900032C000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000003.1675221871.00006190003B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://esm.run/
Source: BrowserUpdateTool.exe, 00000000.00000002.2930944054.00006190006F8000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2929459975.0000619000220000.00000004.00000800.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2929518614.0000619000230000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2918286922.0000019D0A527000.00000004.08000000.00040000.00000000.sdmp, msedgewebview2.exe, 00000008.00000002.2895372254.000001E782BB7000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/
Source: BrowserUpdateTool.exe, 00000000.00000002.2913919025.000000C000C5C000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2919669132.0000019BCC834000.00000004.00000020.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2911931844.0000785800060000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.2298208397.00004C1800DD8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1685248498.00004C1800788000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1685095470.00004C1800DD8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696826623.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696636671.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, data_1.6.drString found in binary or memory: https://fonts.googleapis.com/css2?family=Roboto:wght
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000036000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2919669132.0000019BCC8C4000.00000004.00000020.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2911931844.0000785800060000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2912533142.00007858000B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000002.2895372254.000001E782BB7000.00000004.10000000.00040000.00000000.sdmp, data_1.6.drString found in binary or memory: https://fonts.gstatic.com/s/roboto/v32/KFOlCnqEu92Fr1MmEU9fBBc4.woff2
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000036000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com/s/roboto/v32/KFOlCnqEu92Fr1MmEU9fBBc4.woff2https://fonts.gstatic.com/s/rob
Source: msedgewebview2.exe, 00000002.00000002.2928410425.00004C6402384000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2912533142.00007858000B0000.00000004.00000800.00020000.00000000.sdmp, data_1.6.drString found in binary or memory: https://fonts.gstatic.com/s/roboto/v32/KFOlCnqEu92Fr1MmWUlfBBc4.woff2
Source: BrowserUpdateTool.exe, 00000000.00000002.2919669132.0000019BCC87D000.00000004.00000020.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000036000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2911931844.0000785800060000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2912533142.00007858000B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000002.2895372254.000001E782BB7000.00000004.10000000.00040000.00000000.sdmp, data_1.6.drString found in binary or memory: https://fonts.gstatic.com/s/roboto/v32/KFOmCnqEu92Fr1Mu4mxK.woff2
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000036000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com/s/roboto/v32/KFOmCnqEu92Fr1Mu4mxK.woff2https://fonts.gstatic.com/s/roboto/
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EFD3C000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/dotnet/roslyn
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/go-sql-driver/mysql/wiki/strict-modeChannel
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000014000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000071000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signature
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000071000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureC:
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000014000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureMozilla
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000014000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000071000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/master/CHANGELOG.md#deprecated-cli-app-action-signature
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000014000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/master/CHANGELOG.md#deprecated-cli-app-action-signaturewindow.wai
Source: msedgewebview2.exe, 00000002.00000002.2929022814.00004C640240C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://google.com/
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://gorm.io/docs/hooks.htmlAn
Source: msedgewebview2.exe, 00000002.00000002.2931159496.00004C640273C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://hao123-static.cdn.bcebos.com/manual-res/jump_index.html
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000308000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://iamcrede/v1/projects/-/s:generateAccessT-.09AZ__az-.09AZ__az-.09AZ__az-.09AZ__az-.09AZ__az-.
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C00045E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://iamcredentials./v1/projects/-/serviceAccounts/:generateAccessTokenThe
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A70000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://iamcredentials.X-Appengine-Api-TicketX-Google-DappertraceinfoX-Appengine-User-IpX-Appengine-
Source: BrowserUpdateTool.exe, 00000000.00000002.2913919025.000000C000C00000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://iamcredentials.X-Appengine-Current-NamespaceX-Google-Rpc-Service-EndpointX-Google-Rpc-Servic
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/161903006
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/166809097
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/184850002
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/187425444
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/220069903
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/229267970
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/250706693
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/253522366
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/255411748
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/258207403
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/274859104
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/284462263
Source: msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934725094.00004C64030C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918348926.00000A7400024000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://issuetracker.google.com/issues/166475273
Source: msedgewebview2.exe, 00000002.00000002.2927305335.00004C6402258000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2914587041.0000019D050F4000.00000004.00000020.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2919197827.0000019D0B932000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://login.microsoftonline.com/google.protobuf.Struct.FieldsEntryccm:
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://login.microsoftonline.us/cockroach.errorspb.EncodedWrappercockroach.errorspb.StringsPayload&
Source: msedgewebview2.exe, 00000002.00000002.2929022814.00004C640240C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://msn.cn/
Source: msedgewebview2.exe, 00000002.00000002.2929022814.00004C640240C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://msn.com/
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://news.4399.com/aoyazhiguang/
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C00083A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
Source: msedgewebview2.exe, 00000002.00000002.2929022814.00004C640240C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://office.net/
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://onsi.github.io/gomega/#adjusting-output
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://onsi.github.io/gomega/#eventually
Source: msedgewebview2.exe, 00000002.00000002.2932952723.00004C6402C3C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2927124013.00004C640221C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2928626686.00004C64023C0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2916085503.000078580023C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://permanently-removed.invalid/
Source: msedgewebview2.exe, 00000002.00000002.2932251345.00004C6402B1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://permanently-removed.invalid/Logout?source=ChromiumBrowser&continue=https://permanently-remov
Source: msedgewebview2.exe, 00000002.00000002.2927305335.00004C6402258000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://permanently-removed.invalid/encryption/unlock/desktop?kdi=CAIaDgoKY2hyb21lc3luYxAB
Source: msedgewebview2.exe, 00000002.00000002.2930794775.00004C64026A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://permanently-removed.invalid/v1:GetHints
Source: BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C0001A2000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2912533142.00007858000B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000003.1691619209.000078580038C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.2298208397.00004C1800DD8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1697435546.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1709270172.00004C1800C4C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1698087246.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1685248498.00004C1800788000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1685095470.00004C1800DD8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696826623.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.1696636671.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000008.00000003.2344856112.00004C18010BC000.00000004.00000800.00020000.00000000.sdmp, data_1.6.drString found in binary or memory: https://raw.githubusercontent.com/n3r4zzurr0/svg-spinners/main/preview/90-ring-with-bg-black-36.svg
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/100030_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/10305_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/10379.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/10379_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/107884_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/109832_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/110975_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/112689_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/115339_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/117227_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/117945_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/118852_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/122099_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/12669_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/127539_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/130389_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/130396.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/130396_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/132028.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/133630_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/134302_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/136516_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/137116_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/137953_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/1382_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/145991_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/151915_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/155283_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/155476_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/15548_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/160944_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/163478_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/171322_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/173634_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/177937_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/17801_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/18012.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/18012_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/180977_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/18169_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/187040_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/187228_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/188593.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/188739_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/189558_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/191203_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/195673_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/195673_4.htmhttps://www.4399.com/flash/191203_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/195990_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/198491_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/198637_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/198660_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/199408_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/202061_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/202574_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/202604_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/202692_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/202724_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/202785.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/202819_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/202828_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/202901_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/202907_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/202911_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203018_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203093_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203152.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203153_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203154.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203166_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203178_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203215_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203231_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203369_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203371_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203404_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203453_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203476_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203481_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203495_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203515_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203564_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203682_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/203768_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204044_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204056_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204206.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204255_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204290_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204422_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204429_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204562_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204650_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204685_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204886_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204926_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204952_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/204989_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/205090_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/205147.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/205165.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/205182.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/205235_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/205325_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/205341_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/205462_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/205536_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/205551_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/205845_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/206114_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/20660_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/206724_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/206724_3.htmhttps://www.4399.com/flash/20660_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/207195_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/207717_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/208107_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/209567_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/210650_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/212767_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/21552_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/216417_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/21674_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/217370_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/217603_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/217622_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/217629_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/217706_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/217815_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/217844_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/217855_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/217926_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/218066_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/218162_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/218717_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/218860_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/218939_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/220266_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/221162_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/221700_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/221839_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/222061_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/222151_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/222442_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/22287_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/223745.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/223745_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/225193_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/227465_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/230446_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/231814_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/27924.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/27924_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/32979_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/35538.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/35538_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/3881_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/3883_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/39379_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/40779_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/41193_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/42760_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/43689_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/43841_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/47931_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/48272_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/48504.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/48504_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/55146_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/59227_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/60369_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/6232_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/63805_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/65731_2.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/69112_4.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/69156_1.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/93398_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/93551_3.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/yzzrhj.htm
Source: msedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/zmhj.htm
Source: msedgewebview2.exe, 00000002.00000002.2931159496.00004C640273C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.4399.com/flash/zmhj.htm#search3-6407
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.apple.com/appleca/0
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000582000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2928028384.00004C6402328000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel
Source: BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000582000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel05
Source: BrowserUpdateTool.exe, 00000000.00000000.1643024414.00007FF6EC1F9000.00000008.00000001.01000000.00000003.sdmp, BrowserUpdateTool.exe, 00000000.00000000.1643024414.00007FF6EC2EC000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.googleapis.com/auth/cloud-platform
Source: BrowserUpdateTool.exe, 00000000.00000000.1643024414.00007FF6EC2EC000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.googleapis.com/auth/cloud-platform.read-only
Source: BrowserUpdateTool.exe, 00000000.00000000.1643024414.00007FF6EC1F9000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.googleapis.com/auth/datastoreB
Source: BrowserUpdateTool.exe, 00000000.00000000.1643024414.00007FF6EC2EC000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.googleapis.com/auth/devstorage.full_control
Source: BrowserUpdateTool.exe, 00000000.00000000.1643024414.00007FF6EC2EC000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.googleapis.com/auth/devstorage.read_only
Source: BrowserUpdateTool.exe, 00000000.00000000.1643024414.00007FF6EC2EC000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.googleapis.com/auth/devstorage.read_writeB
Source: msedgewebview2.exe, 00000002.00000002.2931159496.00004C640273C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ludashi.com/cms/server/monitor.php?id=
Source: msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2927124013.00004C640221C000.00000004.00000800.00020000.00000000.sdmp, Top Sites.2.drString found in binary or memory: https://www.office.com/
Source: msedgewebview2.exe, 00000002.00000002.2936057775.00004C64032F8000.00000004.00000800.00020000.00000000.sdmp, Top Sites.2.drString found in binary or memory: https://www.office.com/Office
Source: msedgewebview2.exe, 00000002.00000002.2936057775.00004C64032F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/Office8
Source: msedgewebview2.exe, 00000002.00000002.2936057775.00004C64032F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/OfficeeEATE
Source: msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/wdL
Source: msedgewebview2.exe, 00000002.00000002.2931159496.00004C640273C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.so.com/s?ie=
Source: BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000BE2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: GetRawInputDatamemstr_396dedc1-7
Source: BrowserUpdateTool.exeStatic PE information: Resource name: BINARY type: PE32+ executable (DLL) (console) x86-64, for MS Windows
Source: BrowserUpdateTool.exeStatic PE information: Resource name: BINARY type: PE32+ executable (DLL) (console) x86-64, for MS Windows
Source: BrowserUpdateTool.exeStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
Source: BrowserUpdateTool.exeStatic PE information: Number of sections : 12 > 10
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMsMpEngCP.exeZ vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMsMpEngSvc.dllZ vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamempengine.dllZ vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMpGear.dllZ vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.CodeAnalysis.CSharp.dll\ vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF330000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameKSLD.sysZ vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: \Unknown member: doshdr.%spevars not availableUnknown member: pehdr.%sInvalid index in DataDirectory: %dInvalid index in opclog: %dInvalid index in fopclog2: %dInvalid index in epcode: %dInvalid index in fopclog: %dUnknown member: peattributes.%sInvalid section %d or bigger than NumberOfSection=%d!__mmap_ex() failedpe_fofs_to_mofs failed!__mmap_ex(%d) failedmmap_patch(): buffer is emptymmap_patch_buff() failedpe_mofs_to_fofs(%d) failedUfsSeekRead(%d) failedImageName is NULLStringCchCopyA failedFileDescriptionInternalNameCompanyNamepe.get_versioninfo() failed to create the StringVersionIterator: %sInvalid sigattr_head indexpe.vm_search: mask_size != buffer_sizeInvalid index in netmetadata.tokens: %dpe.get_fixedversioninfo() failed to create the StringVersionIterator: %sFileVersionFileTypeFileSubtypeFileDateOriginalFilenameProductVersionFileFlagsMaskFileFlagsFileOSpe.metadata_decode: decode failed for 0x%xInvalid index in v->imps: %dfnrvape.metadata_decode: Invalid field index %d (should be 1-based)9m vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: ClearOriginalFileName vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: $OFNAllowIdenticalNamesClearOriginalFileName vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: mZOriginalFileNameMaintenanceWindow vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: mZOriginalFileNameMaintenanceWindowprocessed%zd files in Moac, %zd skipped (cached), %zd filename setOriginalFileName Maintenance:HintENG:OFNPROCESSED:) vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: .?AVCMaintenanceOriginalFileNameTask@@ vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBTR.sysZ vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameoffreg.dllj% vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameKSLDriver.sysZ vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: GetOriginalFileName vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SetOriginalFileName vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: ENG:OFNSET:SetOriginalFileNameProcess:process:// vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameCreatorProcessId<Process ProcessId="%u" ProcessCreationTime="%llu" CreatorProcessId="%u" CreatorProcessCreationTime="%llu" Name="%s" IsExcluded="%u" IsFriendly="%u"> vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SecondParameterBM_RegistryKeyDeleteBM_RegistryKeyRenameBM_RegistryDeleteValueBM_RegistrySetValueBM_OpenFileBM_DeleteFileBM_RegistryKeyCreateBM_FileMetaDataBM_ProcessCreateBM_RawWriteBM_NetworkDetectionBM_ProcessStartBM_NetworkDataSendBM_NetworkConnectBM_RemoteThreadCreateBM_BootSectorChangeBM_Etw_PsSetLoadImageNotifyRoutineBM_EngineInternalBM_Etw_SetEventHookBM_Etw_TerminateProcessBM_ModuleLoadBM_ArDetectionBM_RegistryBlockDeleteBM_RegistryBlockSetBM_Etw_OpenThreadBM_Etw_OpenProcessBM_Etw_RegisterShutdownBM_Etw_RegisterLastShutdownBM_Etw_NtAdjustPrivilegesBM_Etw_RegisterInputDevicesBM_Etw_WriteMemoryBM_Etw_SetThreadContextBM_RegistryBlockReplaceBM_RegistryBlockRestoreBM_DesktopBM_VolumeMountBM_RegistryRestoreBM_Etw_CreateLinkBM_RegistryBlockRenameBM_RegistryReplaceBM_Etw_SetWindowsHookBM_Etw_BlockExploitBM_CreateFolderBM_Etw_GetAsyncKeyStateBM_BlockOpenProcessBM_OpenProcessBM_Etw_CodeInjectionBM_RegistryBlockCreateBM_EnumFolderBM_Etw_WMIExecMethodBM_Etw_OCTAGON_PROCESS_TOKEN_TAMPERING_ENFORCEBM_RenameFolderBM_Etw_DirEnumBM_Etw_AllocVmLocalBM_Etw_WMIActivityNewBM_Etw_ClearLogBM_Etw_OCTAGON_DANGEROUS_DEVICE_PRESENT_AUDITBM_Etw_OCTAGON_DRIVER_DISPATCH_REDIRECTION_AUDITBM_HardLinkFileBM_Etw_OCTAGON_RUNTIME_CI_FAILURE_AUDITBM_Etw_OCTAGON_DANGEROUS_DEVICE_PRESENT_ENFORCEBM_Etw_OCTAGON_DRIVER_DISPATCH_REDIRECTION_ENFORCEBM_Etw_OCTAGON_PROCESS_TOKEN_TAMPERING_AUDITBM_Etw_OCTAGON_RUNTIME_CI_FAILURE_ENFORCEBM_Etw_CredEnumerateBM_Etw_CredReadCredentialsBM_Etw_CredFindBestCredentialBM_Etw_CredReadDomainCredentialsBM_DLPBM_CopyFileBM_Etw_OCTAGON_PROCESS_TAMPERING_AUDITBM_Etw_OCTAGON_PROCESS_TAMPERING_ENFORCEBM_TaintBM_Etw_VaultGetUniqueCredentialBM_Amsi_MatchBM_Amsi_ScanBM_Etw_CredBackupCredentialsBM_Etw_CredReadByTokenHandleBM_Etw_VaultEnumerateCredentialsBM_Etw_VaultFindCredentialsBM_Etw_LogonFailureBM_Etw_LogonSuccessBM_Etw_AccountPasswordChangedBM_Etw_UserAccountChangedBM_Etw_BITSCreateBM_Etw_LDAPSearchBM_Etw_ScheduledTaskUpdateBM_Etw_ScheduledTaskCreateBM_Etw_ExploitProtectionBM_Etw_UserAccountCreatedBM_Network_VolumeBM_Network_PortOpenBM_Etw_HiveHistoryClearBM_Etw_AccountPasswordResetBM_SignatureTriggerBM_OriginalFileNameBM_Etw_UnloadDriverBM_Etw_LoadDriverBM_Etw_UnloadDeviceBM_Etw_LoadDeviceBM_Etw_ResumeThreadBM_Etw_SuspendThreadBM_Etw_ResumeProcessBM_Etw_SuspendProcessBM_Etw_ServiceHostStartedBM_Etw_ServiceChangeAccountInfoBM_Network_FailureBM_Etw_ServiceStartedBM_Etw_ServiceStopBM_Etw_ProtectVmLocalBM_Etw_ServiceChangeBinaryPathBM_Etw_ServiceChangeStartTypeAL""L"%ls""%hS"BM_Etw_AllocVmRemoteBM_Etw_ProtectVmRemoteBM_Etw_V2CodeInjectionBM_Etw_ReadVmRemoteATTR_%08lxSigSeqThreatName{0, %ls, __attr_none__, %ls, %ls}0x%lXError while processing Event, i.e you're missing an event.Error while processing Event: ID = [%d], HR = [%lx]IsPePlusIsPeFileInfoIsPacked vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCompanyNameCommentsLegalCopyrightProductNameFileDescriptionLegalTrademarksPeStaticCRC3LengthCRC1IatSkipCRC3CRC2CopyrightCommentsArchitectureTrademarksFileVersionPeStaticsEpSecSectionKCRC2KCRC1KCRC3InternalNameFileDescriptionOriginalFileNamePEUnknownx86ia64x64 vs BrowserUpdateTool.exe
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ED5F7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: h2EgHM.VbpMsfk
Source: classification engineClassification label: clean19.mine.winEXE@14/149@9/5
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile created: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exeJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeMutant created: NULL
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile created: C:\Users\user\AppData\Local\Temp\f89a6234-c655-4792-86ba-7884a20c76f4.tmpJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeFile opened: C:\Windows\system32\ed0b56060be0ad26fb474772af3ea508b402b8615416d4a32c035ed7ca52f20bAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
Source: BrowserUpdateTool.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT 1 FROM SQLITE_MASTER WHERE type=? AND name=? LIMIT 1;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO FileLowFiAsync(Key, FileName, SigSeq, SigSha, SigIsSync, InstanceTimeStamp) VALUES(?, ? , ? , ? , ? , ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM ProcessBlockHistory WHERE ProcessPath = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO AnomalyInfo(Key, UnbiasedTime) VALUES (?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(13, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM AutoFeatureControl;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT DISTINCT TableName FROM AnomalyTables;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM FileHashes WHERE FileHashes.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM RansomwareDetections;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.%s SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM NetworkIpFirewallRules;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO RollingQueuesValues(EntryTable, EntryKey, EntryValue, InsertTime, ExpireTime) VALUES(? , ? , ? , ? , ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key, VSN, FileID, USN, InstanceTimeStamp, SHA1, MD5, SHA256, LSHASH, LSHASHS, CTPH, PartialCRC1, PartialCRC2, PartialCRC3, KCRC1, KCRC2, KCRC3, KCRC3n FROM FileHashes WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ProcessPath, TimeStamp, TargetPath, RuleId, IsAudit, Action, ProcessTaintReason, ProcessIntegrity FROM ProcessBlockHistory WHERE ProcessPath = ? ORDER BY TimeStamp DESC;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT COUNT(1) FROM FileLowFiAsync;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID from RecordIdentifier WHERE Key = ? AND RecordTimeStamp = ? ;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM SystemFileCache WHERE CleanFileShaHash = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(6, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(14, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM DynSigRevisions WHERE DynSigRevisions.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ProcessPath, TimeStamp, TargetPath, RuleId, IsAudit, Action, ProcessTaintReason, ProcessIntegrity FROM ProcessBlockHistory WHERE ProcessPath = ? AND TimeStamp = ? ORDER BY TimeStamp DESC;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ProcessPath, TimeStamp, TargetPath, RuleId, IsAudit, Action, ProcessTaintReason, ProcessIntegrity FROM ProcessBlockHistory WHERE RuleId = ? ORDER BY TimeStamp DESC;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(4, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key, Name, Capacity, TimeToLive, Mode FROM RollingQueuesTables WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO BmFileStartupActions(FilePathHash, FilePath, ActionFlags, ProcessStartCount, FdrFlags, FdrThreatRecordId, EvaluatorThreatRecordId, TrustedInstallerThreatRecordId, LFRThreatRecordId) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO BmFileActions(FileInfoId, ThreatRecordId, Action) VALUES (?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(5, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key, Name, Count, InsertTime, ExpireTime, UpdateTime, ScalarFactor, LinearFactor, DecayInterval, HighCount, LastDecayTime FROM AtomicCounters WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM FolderGuardPaths WHERE UserIdHash = ? LIMIT 1;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO RansomwareDetections(Key, DetectionGuid, LkgTS, NextUSN, DetectionTS, ProvisionalRemedComplTS, RemedComplTS, ImpactedCBPNameSpaces, InstanceTimeStamp) VALUES ( ?, ?, ?, ?, ?, ?, ?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(12, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT CleanFileSha, CleanFileShaHash FROM SystemFileCache WHERE InstanceTimeStamp < ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT PersistId, PersistIdBlob, ExpirationDate FROM AmsiFileCache WHERE ExpirationDate < DateTime(?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO DynSigRevisions(Key, SdnRevision, EsuRevision, BFRevision, EntCertRevision, TamperRevision, AGBlobRevision, BFFileAllowRevision, BFFileBlockRevision, BFCertAllowRevision, BFCertBlockRevision) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key, RecordTimeStamp, Generation FROM RecordIdentifier WHERE RecordIdentifier.ID IN (SELECT FileInstance.RecordID from FileInstance WHERE FileInstance.ParentRecordID = ? );
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT RuleAction, RuleId, IsAudit, IsInherited, State FROM BmHipsRuleInfo WHERE ProcessInfoId = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key, FirewallRuleName, ExpiryTime FROM NetworkIpFirewallRules WHERE ExpiryTime < ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM SystemFileCache;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ProcessPath, TimeStamp, TargetPath, RuleId, IsAudit, Action, ProcessTaintReason, ProcessIntegrity FROM ProcessBlockHistory WHERE ProcessPath = ? ORDER BY TimeStamp DESC LIMIT 1;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO BmFileInfo(NormalizedPathHash, DosPathHash, StructVersion, NormalizedPath, DosPath, Wow64Context, MetaContext, IsFromWeb, IsExecutable) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM SdnEx;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(3, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO FileInstance(InstanceTimeStamp, RecordID, ScanID, TrackingEnabled, StorageEvent, StorageEventState, ModificationsCount, ParentRecordID, Parent_FileEvent, Parent_FileName, Parent_ProcessID, Remote_ProcessID, FileID, FileName, USN, CreateTime, LastAccessTime, LastWriteTime, Signer, SignerHash, Issuer, SigningTime, MOTW, MOTWFromParent,IsValidCert, CertInvalidDetails, IsCatalogSigned) VALUES(?, ? , ?, ?, ?, ? , ? , ? , ? , ? , ?, ?, ?, ?, ?, ? , ? , ? , ? , ? , ?, ?, ?, ?, ?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT EntryTable, EntryKey, EntryValue, InsertTime, ExpireTime FROM RollingQueuesValues WHERE EntryTable = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO AtomicCounters(Key, Name, Count, InsertTime, ExpireTime, UpdateTime, ScalarFactor, LinearFactor, DecayInterval, HighCount, LastDecayTime) VALUES(? , ? , ? , ? , ? , ? , ? , ? , ? , ? , ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Version, Current, LastUpdated FROM SQLiteGlobals WHERE Current = 1 ORDER BY Version DESC ;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM AmsiFileCache WHERE AmsiFileCache.PersistId = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO AttributeCounts(Key, Name, Count, InsertTime, ExpireTime) VALUES(? , ? , ? , ? , ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(28, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO AttributePersistContext(Key, FilePath, Context, InsertTime, ExpireTime) VALUES(? , ? , ? , ? , ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE AtomicCounters SET Name = ?, Count = ?, InsertTime = ?, ExpireTime = ?, UpdateTime = ?, ScalarFactor = ?, LinearFactor = ?, DecayInterval = ?, HighCount = ?, LastDecayTime = ?, WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID from File WHERE SHA1 = ? ;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO ScanInfo(SigSeq, PersistSigSeq, ProgenitorPersistSigSeq, ScanAgent, NamedAttributes, PeAttributes, SigAttrEvents, ScanReason, WebURL, EngineID, SigSha) VALUES(? , ? , ? , ? , ? , ? , ? , ? , ? , ? , ? );
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT COUNT(DISTINCT ProcessPath) FROM ProcessBlockHistory;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM Engine WHERE EngineVersion = ? AND SigVersion = ? ;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO AmsiFileCache(PersistId, PersistIdBlob, ExpirationDate) VALUES (?, ?, DateTime('now', ?));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT COUNT(1) FROM AttributePersistContext;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM SystemRegistryCache;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(24, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID, NormalizedPathHash, DosPathHash, StructVersion, NormalizedPath, DosPath, Wow64Context, MetaContext, IsFromWeb, IsExecutable FROM BmFileInfo WHERE NormalizedPathHash = ? OR DosPathHash = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(11, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO RansomwareDetections(Key, DetectionGuid, LkgTS, NextUSN, DetectionTS, ProvisionalRemedComplTS, RemedComplTS, ImpactedCBPNameSpaces, InstanceTimeStamp) VALUES ( ?, ?, ?, ?, ?, ?, ?, ?, ?);DELETE FROM RansomwareDetections WHERE InstanceTimeStamp < ?; SELECT Count(1) FROM RansomwareDetections;DELETE FROM RansomwareDetections WHERE Key = ?;SELECT DetectionGuid, LkgTS, NextUSN, DetectionTS, ProvisionalRemedComplTS, RemedComplTS, ImpactedCBPNameSpaces FROM RansomwareDetections WHERE Key = ?;SELECT ID FROM RansomwareDetections WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(31, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM BmFileInfo WHERE NormalizedPathHash = ? OR DosPathHash = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO BmFileStartupActions(FilePathHash, FilePath, ActionFlags, ProcessStartCount, FdrFlags, FdrThreatRecordId, EvaluatorThreatRecordId, TrustedInstallerThreatRecordId, LFRThreatRecordId) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?);DELETE FROM BmFileStartupActions WHERE BmFileStartupActions.FilePathHash = ?;SELECT Count(1) FROM BmFileStartupActions;SELECT ID FROM BmFileStartupActions WHERE BmFileStartupActions.FilePathHash = ?;SELECT FilePathHash, FilePath, ActionFlags, ProcessStartCount, FdrFlags, FdrThreatRecordId, EvaluatorThreatRecordId, TrustedInstallerThreatRecordId, LFRThreatRecordId FROM BmFileStartupActions WHERE FilePathHash = ?|
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT InfectedFileSHA, ProcFileId, SystemFilePath, CleanFileSha FROM SystemFileCache WHERE InfectedFileSHAHash = ? OR ProcFileIDSystemFileHash = ? ORDER BY InstanceTimeStamp DESC;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ProcessPath, TimeStamp, TargetPath, RuleId, IsAudit, Action, ProcessTaintReason, ProcessIntegrity FROM ProcessBlockHistory WHERE RuleId = ? ORDER BY TimeStamp DESC;SELECT ProcessPath, TimeStamp, TargetPath, RuleId, IsAudit, Action, ProcessTaintReason, ProcessIntegrity FROM ProcessBlockHistory WHERE ProcessPath = ? ORDER BY TimeStamp DESC;SELECT ProcessPath, TimeStamp, TargetPath, RuleId, IsAudit, Action, ProcessTaintReason, ProcessIntegrity FROM ProcessBlockHistory ORDER BY TimeStamp DESC;SELECT ProcessPath, TimeStamp, TargetPath, RuleId, IsAudit, Action, ProcessTaintReason, ProcessIntegrity FROM ProcessBlockHistory WHERE ProcessPath = ? AND TimeStamp = ? ORDER BY TimeStamp DESC;SELECT COUNT(DISTINCT ProcessPath) FROM ProcessBlockHistory;DELETE FROM ProcessBlockHistory;SELECT t1.ProcessPath, t1.TimeStamp, t1.TargetPath, t1.RuleId, t1.IsAudit, t1.Action, t1.ProcessTaintReason, t1.ProcessIntegrity FROM ProcessBlockHistory AS t1 INNER JOIN(SELECT ID, ProcessPath, MAX(TimeStamp) AS MostRecentTime FROM ProcessBlockHistory WHERE RuleId = ? GROUP BY ProcessPath) AS t2 ON t1.ID = t2.ID AND t1.TimeStamp = t2.MostRecentTime ORDER BY t1.TimeStamp DESC;SELECT ProcessPath, TimeStamp, TargetPath, RuleId, IsAudit, Action, ProcessTaintReason, ProcessIntegrity FROM ProcessBlockHistory WHERE ProcessPath = ? ORDER BY TimeStamp DESC LIMIT 1;DELETE FROM ProcessBlockHistory WHERE ProcessPath = ? AND TimeStamp = ?;SELECT t1.ProcessPath, t1.TimeStamp, t1.TargetPath, t1.RuleId, t1.IsAudit, t1.Action, t1.ProcessTaintReason, t1.ProcessIntegrity FROM ProcessBlockHistory AS t1 INNER JOIN(SELECT ID, ProcessPath, MAX(TimeStamp) AS MostRecentTime FROM ProcessBlockHistory GROUP BY ProcessPath) AS t2 ON t1.ID = t2.ID AND t1.TimeStamp = t2.MostRecentTime ORDER BY t1.TimeStamp DESC;SELECT ID FROM ProcessBlockHistory WHERE ProcessPath = ?;SELECT COUNT(1) FROM ProcessBlockHistory;DELETE FROM ProcessBlockHistory WHERE TimeStamp < ?;REPLACE INTO ProcessBlockHistory(ProcessPath, TimeStamp, TargetPath, RuleId, IsAudit, Action, ProcessTaintReason, ProcessIntegrity) VALUES (?, ?, ?, ?, ?, ?, ?, ?);SELECT ProcessPath, TimeStamp FROM ProcessBlockHistory ORDER BY TimeStamp ASC LIMIT 1[3
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT t1.ProcessPath, t1.TimeStamp, t1.TargetPath, t1.RuleId, t1.IsAudit, t1.Action, t1.ProcessTaintReason, t1.ProcessIntegrity FROM ProcessBlockHistory AS t1 INNER JOIN(SELECT ID, ProcessPath, MAX(TimeStamp) AS MostRecentTime FROM ProcessBlockHistory GROUP BY ProcessPath) AS t2 ON t1.ID = t2.ID AND t1.TimeStamp = t2.MostRecentTime ORDER BY t1.TimeStamp DESC;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM FileLowFiAsync WHERE FileLowFiAsync.Key = ?; DELETE FROM FileLowFiAsync WHERE FileLowFiAsync.Key = ?; SELECT Key, FileName, SigSeq, SigSha, SigIsSync, InstanceTimeStamp FROM FileLowFiAsync WHERE Key = ?; DELETE FROM FileLowFiAsync WHERE InstanceTimeStamp < ?; SELECT COUNT(1) FROM FileLowFiAsync; INSERT INTO FileLowFiAsync(Key, FileName, SigSeq, SigSha, SigIsSync, InstanceTimeStamp) VALUES(?, ? , ? , ? , ? , ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM AutoFeatureControl WHERE AutoFeatureControl.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO AnomalyTables(Key, TableKey, TableName, KeyName, FirstSeen, LastSeen, UnbiasedMinutes, Value, Order_) VALUES(? , ? , ? , ? , ? , ? , ? , ? , ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO SystemFileCache(InfectedFileSHAHash, InfectedFileSHA, ProcFileIDSystemFileHash, ProcFileId, SystemFilePath, CleanFileSha, CleanFileShaHash, InstanceTimeStamp) VALUES ( ?, ?, ?, ?, ?, ?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(16, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(8, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(26, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key, TableKey, TableName, KeyName, FirstSeen, LastSeen, UnbiasedMinutes, Value, Order_ FROM AnomalyTables WHERE AnomalyTables.TableKey = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT COUNT(1) FROM AnomalyTables;
Source: msedgewebview2.exe, 00000002.00000002.2917158670.0000019D09E45000.00000002.00000001.00040000.0000001E.sdmp, Login Data.2.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(DISTINCT UserIdHash) FROM FolderGuardPaths;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID, PPIDHash, ProcessStartTime, PID, StructVersion, ImageFileName, MonitoringFlags_Flags, MonitoringFlags_VmHardenType, MonitoringFlags_ExemptVmHardenedTypes, CommandLineArgs, HipsInjectionId, FolderGuardId, Flags, LsassReadMemId, MonitoringFlags_Flags2Low, MonitoringFlags_Flags2High FROM BmProcessInfo WHERE PPIDHash = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO AutoFeatureControl(Key, CurrCount, MaxCount, InstanceTimeStamp) VALUES (?, ?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM AtomicCounters ORDER BY InsertTime ASC LIMIT 1;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID, NormalizedPathHash, DosPathHash, StructVersion, NormalizedPath, DosPath, Wow64Context, MetaContext, IsFromWeb, IsExecutable FROM BmFileInfo WHERE NormalizedPathHash = ? OR DosPathHash = ?;INSERT INTO BmFileActions(FileInfoId, ThreatRecordId, Action) VALUES (?, ?, ?);SELECT ThreatRecordId, Action FROM BmFileActions WHERE FileInfoId == ?;INSERT INTO BmFileInfo(NormalizedPathHash, DosPathHash, StructVersion, NormalizedPath, DosPath, Wow64Context, MetaContext, IsFromWeb, IsExecutable) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?);DELETE FROM BmFileInfo WHERE NormalizedPathHash = ? OR DosPathHash = ?;DELETE FROM BmFileActions;DELETE FROM BmFileInfo;SELECT ID FROM BmFileInfo WHERE NormalizedPathHash = ? OR DosPathHash = ?;SELECT Count(1) FROM BmFileInfo;B
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(20, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT PersistId, PersistIdBlob, ExpirationDate FROM AmsiFileCache WHERE PersistId = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM AtomicCounters WHERE AtomicCounters.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(18, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM BmProcessInfo WHERE PPIDHash = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT COUNT(1) FROM AnomalyInfo;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ValueMapArrayBlob FROM ValueMapArray WHERE Key = ? AND RecordType = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM SystemFileCache WHERE InfectedFileSHAHash = ? OR ProcFileIDSystemFileHash = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM AttributeCounts WHERE AttributeCounts.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key, FilePath, Context, InsertTime, ExpireTime FROM AttributePersistContext WHERE Key = ?; SELECT COUNT(1) FROM AttributePersistContext; MpFileStashMaxSizeMpOplocksInSpynetFileSizeLimitMpDisableValidateTrustUseInternalCertFormatMpDisableOSXValidateTrustMpValidateTrustMSIMaxOverlayMpDisableValidateTrustAllowBadCertDirectory%WINDIR%\System32\catroot2%WINDIR%\System32\CatRootMpDisableValidateTrustInternalMachOInfinite loop detected (more that %d instructions executed)PE_SUCCESSPE_END_ENUMERATIONPE_NOMEMORYPE_OVERLAPPINGPE_READPE_WRITEPE_FILEPE_DECOMPRESS_ERRORPE_NOTIMPLEMENTEDPE_UNSUPPORTED_MACHINE_ARCHITECTUREPE_INVALID_SIZEOFOPTIONALHEADERPE_INVALID_OPTIONAL_MAGICPE_INVALID_SIZEOFIMAGEPE_INVALID_IMAGEBASEPE_INVALID_SECTIONALIGNMENTPE_INVALID_FILEALIGNMENTPE_INVALID_DOS_SIGNATUREPE_INVALID_E_LFANEWPE_INVALID_NT_SIGNATUREPE_INVALID_SIZEOFHEADERSPE_INVALID_ARGUMENTSPE_INVALID_VIRTUALSIZEPE_INVALID_VIRTUALADDRESSPE_INVALID_RAWOFFSETPE_INVALID_RAWSIZEPE_INVALID_RVAPE_INVALID_EXPORTSPE_INVALID_DATAPE_ERROR_RESERVEDMpMaxPeExportsInCoreReportsMpMapsHeartbeatDistributionIntervalMpRemediationCheckpointLiveDelayMpMaxSpynetReportsMpMapsHeartbeatDelayOnDetectionMpEnableFriendlyCloudCheckMpDisableMDMPolicyChecksMpHeartbeatControlGroupMpDisableMpsigstubErrorMapsHeartbeatMpDisableExclusionsMapsHeartbeatMpDisableMapsDisableMapsHeartbeatMpDisablePaidEnhancedMapsHeartbeatMpDisableEnhancedMapsHeartbeatMpUrlReputationTimeoutMpMaxRtsdBatchSizeMpEnhancedMapsHeartbeatRateMpDisableRtpChangeMapsHeartbeatMpDisableUninstallMapsHeartbeatMpMapsHeartbeatDelayMpEnableUefiEnumerationInHeartBeatMpDisableUrlReputationMapsMpDisableErrorMapsHeartbeatMpMaxNetworkConnectionReportsInSpynetMpMapsHeartbeatDetectionIntervalMpDisableCachingSampleSubmittedShasMpDisableRemediationCheckpointsMpRemediationCheckpointTimeoutMpSampleSubmissionSizeLimitMpPaidEnhancedMapsHeartbeatDelayMpDisableSetupErrorMapsHeartbeatMpDisableOplocksInSpynetMpMapsHeartbeatRateMpEnhancedMapsHeartbeatDelayMpMaxRtsdCountMpDisablePersistScanHandleOnThreatNotFoundMpDisableAdvSSAndFallbackToWatsonMpDisableSenseHeartbeatEtwMpDisableNetworkInfoInHeartbeatMpDisableRemediationFailTelemetryMpFirmwareEnvironmentVariableQueriesMpDisableDefenderDisableMapsHeartbeatMpDisableTestErrorMapsHeartbeatMpDisableOfflineEnhancedMapsHeartbeatMpOfflineEnhancedMapsHeartbeatRateMpDisableDnsCacheSubmissionWithNRICacheMpOfflineEnhancedMapsHeartbeatDelayMpDisableUrlReputationMapsCachet
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM AttributeCounts ORDER BY InsertTime ASC LIMIT 1;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT t1.ProcessPath, t1.TimeStamp, t1.TargetPath, t1.RuleId, t1.IsAudit, t1.Action, t1.ProcessTaintReason, t1.ProcessIntegrity FROM ProcessBlockHistory AS t1 INNER JOIN(SELECT ID, ProcessPath, MAX(TimeStamp) AS MostRecentTime FROM ProcessBlockHistory WHERE RuleId = ? GROUP BY ProcessPath) AS t2 ON t1.ID = t2.ID AND t1.TimeStamp = t2.MostRecentTime ORDER BY t1.TimeStamp DESC;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM ValueMapArray WHERE ValueMapArray.Key = ? AND ValueMapArray.RecordType = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(21, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM BmFileInfo;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT COUNT(1) FROM AtomicCounters;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ThreatRecordId, Action FROM BmFileActions WHERE FileInfoId == ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(17, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO BmHipsRuleInfo(ProcessInfoId, RuleAction, RuleId, IsAudit, IsInherited, State) VALUES (?, ?, ?, ?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE AttributePersistContext SET FilePath = ?, Context = ?, InsertTime = ?, ExpireTime = ? WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO ProcessInfo(FileName, ProcessId, CommandLine, StartTime, TokenElevation, TokenElevationType, IntegrityLevel) VALUES(? , ? , ? , ? , ? , ? , ? );
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key, RecordTimeStamp, Generation FROM RecordIdentifier WHERE ID = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(32, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM AttributePersistContext WHERE AttributePersistContext.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(19, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM NetworkIpFirewallRules WHERE NetworkIpFirewallRules.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO BackupProcessInfo(Key, FilePath, FirstStartTime, NextUSN, AutomaticRemovalPolicy, ImpactedCBPNameSpaces, InstanceTimeStamp) VALUES ( ?, ?, ?, ?, ?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(22, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM RansomwareDetections WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM SdnEx WHERE SdnEx.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(32, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(29, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM SystemRegistryCache WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT COUNT(1) FROM AttributeCounts;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM AmsiFileCache;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM AnomalyTables WHERE AnomalyTables.TableKey = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO SystemRegistryCache(Key, FileIDHash, RegPath, RegOperation, NewRegType, OldRegType, OldRegData, NewRegData, InstanceTimeStamp) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO File(SHA1, MD5, lshashs, lshash, PartialCRC1, PartialCRC2, PartialCRC3, KCRC1, KCRC2, KCRC3, KCRC3n, Size, SHA256) VALUES(? , ? , ? , ? , ? , ? , ? , ? , ? , ? , ?, ?, ? );
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(30, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(23, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT COUNT(1) FROM RollingQueuesValues;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO SdnEx(Key, CurrentCount) VALUES (?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(15, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(10, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO BmProcessInfo(PPIDHash, ProcessStartTime, PID, StructVersion, ImageFileName, MonitoringFlags_Flags, MonitoringFlags_VmHardenType, MonitoringFlags_ExemptVmHardenedTypes, CommandLineArgs, HipsInjectionId, FolderGuardId, Flags, LsassReadMemId, MonitoringFlags_Flags2Low, MonitoringFlags_Flags2High)VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM BackupProcessInfo;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key, FilePath, Context, InsertTime, ExpireTime FROM AttributePersistContext WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT COUNT(1) FROM ValueMapArray WHERE RecordType = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT FileInstance.ID FROM FileInstance, RecordIdentifier WHERE FileInstance.RecordID = RecordIdentifier.ID AND RecordIdentifier.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT RecordIdentifier.Key, FileInstance.RecordID, RecordIdentifier.RecordTimeStamp, FileInstance.TrackingEnabled, FileInstance.StorageEvent, FileInstance.StorageEventState, FileInstance.ModificationsCount, FileInstance.ParentRecordID, FileInstance.Parent_FileEvent, FileInstance.Parent_FileName, RecordIdentifier.Generation, FileInstance.FileName, FileInstance.USN, FileInstance.CreateTime, FileInstance.LastAccessTime, FileInstance.LastWriteTime, FileInstance.Signer, FileInstance.SignerHash, FileInstance.Issuer, FileInstance.SigningTime, FileInstance.MOTW, FileInstance.MOTWFromParent, FileInstance.IsValidCert, FileInstance.CertInvalidDetails, FileInstance.IsCatalogSigned, File.SHA1, File.MD5, File.lshashs, File.lshash, File.PartialCRC1, File.PartialCRC2, File.PartialCRC3, File.KCRC1, File.KCRC2, File.KCRC3, File.KCRC3n, File.Size, File.SHA256, ParentProcessInfo.CommandLine, ParentProcessInfo.FileName, ParentProcessInfo.IntegrityLevel, ParentProcessInfo.ProcessId, ParentProcessInfo.StartTime, ParentProcessInfo.TokenElevation, ParentProcessInfo.TokenElevationType, RemoteProcessInfo.CommandLine, RemoteProcessInfo.FileName, RemoteProcessInfo.IntegrityLevel, RemoteProcessInfo.TokenElevation, RemoteProcessInfo.TokenElevationType, ScanInfo.NamedAttributes, ScanInfo.PeAttributes, ScanInfo.PersistSigSeq, ScanInfo.ProgenitorPersistSigSeq, ScanInfo.ScanAgent, ScanInfo.ScanReason, ScanInfo.SigAttrEvents, ScanInfo.SigSeq, ScanInfo.SigSha, ScanInfo.WebURL,Engine.EngineVersion, Engine.SigVersion FROM RecordIdentifier INNER JOIN (FileInstance INNER JOIN File ON FileInstance.FileID = File.ID LEFT OUTER JOIN ProcessInfo as 'ParentProcessInfo' ON FileInstance.Parent_ProcessID = ParentProcessInfo.ID LEFT OUTER JOIN ProcessInfo as 'RemoteProcessInfo' ON FileInstance.Remote_ProcessID = RemoteProcessInfo.ID LEFT OUTER JOIN (ScanInfo INNER JOIN Engine ON ScanInfo.EngineID = Engine.ID) ON FileInstance.ScanID = ScanInfo.ID ) ON RecordIdentifier.ID = FileInstance.RecordID WHERE RecordIdentifier.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(9, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM DynSigRevisions;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT COUNT(1) FROM ProcessBlockHistory;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO ValueMapArray(Key, RecordType, ValueMapArrayBlob, InstanceTimeStamp) VALUES(?, ? , ? , ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key, Name, Count, InsertTime, ExpireTime FROM AttributeCounts WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key, FileName, SigSeq, SigSha, SigIsSync, InstanceTimeStamp FROM FileLowFiAsync WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM BmFileStartupActions WHERE BmFileStartupActions.FilePathHash = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT COUNT(1) FROM FileHashes;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM FileLowFiAsync WHERE FileLowFiAsync.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO RecordIdentifier(Key, RecordTimeStamp, Generation) VALUES(?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO FolderGuardPaths(UserIdHash, UserId, GUID, Path) VALUES ( ?, ?, ?, ? );SELECT Count(DISTINCT UserIdHash) FROM FolderGuardPaths;DELETE FROM FolderGuardPaths WHERE UserIdHash = ?;SELECT ID FROM FolderGuardPaths WHERE UserIdHash = ? LIMIT 1;SELECT UserId, GUID, Path FROM FolderGuardPaths WHERE UserIdHash = ?N
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(27, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT DetectionGuid, LkgTS, NextUSN, DetectionTS, ProvisionalRemedComplTS, RemedComplTS, ImpactedCBPNameSpaces FROM RansomwareDetections WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO NetworkIpFirewallRules(Key, FirewallRuleName, ExpiryTime) VALUES (?, ?, ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO FileHashes(Key, VSN, FileID, USN, InstanceTimeStamp, SHA1, MD5, SHA256, LSHASH, LSHASHS, CTPH, PartialCRC1, PartialCRC2, PartialCRC3, KCRC1, KCRC2, KCRC3, KCRC3n) VALUES(?, ? , ? , ? , ? , ? , ? , ? , ? , ? , ? , ? , ? , ? , ? , ? , ? , ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT FilePath, FirstStartTime, NextUSN, AutomaticRemovalPolicy, ImpactedCBPNameSpaces FROM BackupProcessInfo WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(7, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM RollingQueuesTables WHERE RollingQueuesTables.Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ProcessPath, TimeStamp, TargetPath, RuleId, IsAudit, Action, ProcessTaintReason, ProcessIntegrity FROM ProcessBlockHistory ORDER BY TimeStamp DESC;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO DynSigRevisions(Key, SdnRevision, EsuRevision, BFRevision, EntCertRevision, TamperRevision, AGBlobRevision, BFFileAllowRevision, BFFileBlockRevision, BFCertAllowRevision, BFCertBlockRevision) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?);DELETE FROM DynSigRevisions WHERE DynSigRevisions.Key = ?;SELECT Count(1) FROM DynSigRevisions;SELECT ID FROM DynSigRevisions WHERE DynSigRevisions.Key = ?;SELECT Key, SdnRevision, EsuRevision, BFRevision, EntCertRevision, TamperRevision, AGBlobRevision, BFFileAllowRevision, BFFileBlockRevision, BFCertAllowRevision, BFCertBlockRevision FROM DynSigRevisions WHERE Key = ?
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(2, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE AttributeCounts SET Name = ?, Count = ?, InsertTime = ?, ExpireTime = ? WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT (SELECT COUNT(*) FROM File) + (SELECT COUNT(*) FROM FileInstance);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO RollingQueuesTables(Key, Name, Capacity, TimeToLive, Mode) VALUES(? , ? , ? , ? , ?);
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO FolderGuardPaths(UserIdHash, UserId, GUID, Path) VALUES ( ?, ?, ?, ? );
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT ID FROM BackupProcessInfo WHERE Key = ?;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE SQLiteGlobals SET Current = 0 WHERE Current = 1; INSERT INTO SQLiteGlobals(Version, Current, LastUpdated) VALUES(25, 1, date('now'));
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Count(1) FROM BmFileStartupActions;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: SELECT Key FROM AttributePersistContext ORDER BY InsertTime ASC LIMIT 1;
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO Engine(EngineVersion, SigVersion) VALUES(? , ? );
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeFile read: C:\Users\user\Desktop\BrowserUpdateTool.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\BrowserUpdateTool.exe "C:\Users\user\Desktop\BrowserUpdateTool.exe"
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=BrowserUpdateTool.exe --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=7536.7584.8340987022922056471
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdfb1c8e88,0x7ffdfb1c8e98,0x7ffdfb1c8ea8
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1788 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2780 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:3
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3020 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:8
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1724954327302821 --launch-time-ticks=4335514542 --mojo-platform-channel-handle=3508 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:1
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4536 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdfb1c8e88,0x7ffdfb1c8e98,0x7ffdfb1c8ea8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1788 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2780 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:3Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3020 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1724954327302821 --launch-time-ticks=4335514542 --mojo-platform-channel-handle=3508 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:1Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4536 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2Jump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: windows.system.profile.platformdiagnosticsandusagedatasettings.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: kbdus.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: windows.system.profile.platformdiagnosticsandusagedatasettings.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: mdmregistration.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: mdmregistration.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: omadmapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dmcmnutils.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: iri.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: propsys.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: winsta.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: mscms.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: windows.security.authentication.web.core.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: devobj.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: directmanipulation.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: mf.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: mfplat.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: rtworkq.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: hevcdecoder.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dolbydecmft.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: mfperfhelper.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dwritecore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: vaultcli.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: windows.web.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: aadwamextension.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: hevcdecoder.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: tenantrestrictionsplugin.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: wevtapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: windows.system.userprofile.diagnosticssettings.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: secur32.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: windows.system.diagnostics.telemetry.platformtelemetryclient.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: ncryptprov.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: mf.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: mfplat.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: rtworkq.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: hevcdecoder.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dolbydecmft.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: mfperfhelper.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: d3d12.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: d3d12.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: d3d12core.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: dxilconv.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: d3dscache.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: BrowserUpdateTool.exeStatic PE information: certificate valid
Source: BrowserUpdateTool.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: BrowserUpdateTool.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: BrowserUpdateTool.exeStatic file information: File size 99319784 > 1048576
Source: BrowserUpdateTool.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1bf7200
Source: BrowserUpdateTool.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x8fb000
Source: BrowserUpdateTool.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x16bfe00
Source: BrowserUpdateTool.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x220a400
Source: BrowserUpdateTool.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: MpGear.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: BTR.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: KSLDriver.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: KSLD.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/Microsoft.CodeAnalysis.CSharp/Release/net7.0/Microsoft.CodeAnalysis.CSharp.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: /_/artifacts/obj/Microsoft.CodeAnalysis.CSharp/Release/net7.0/Microsoft.CodeAnalysis.CSharp.pdbSHA256C source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: offreg.pdbH source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: KSLDriver.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: MsMpEngCP.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF330000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: BTR.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: MsMpEngSvc.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: mpengine.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: MsMpEngSvc.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: Microsoft.CodeAnalysis.CSharp.ni.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: MsMpEngCP.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF330000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: offreg.pdb source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: KSLD.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: MpGear.pdbGCTL source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: output file name with .pdb extension) source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: mpengine.pdbOGPS source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmp
Source: BrowserUpdateTool.exeStatic PE information: section name: .xdata
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Dnscache\ParametersJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Dnscache\ParametersJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\d0010809Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile Volume queried: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\js FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile Volume queried: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Code Cache\wasm FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile Volume queried: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\blob_storage\e1022566-0e68-48d0-9ea8-87cc2c7265f6 FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile Volume queried: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Cache\Cache_Data FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile Volume queried: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47 FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile Volume queried: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47 FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile Volume queried: C:\Users\user\AppData\Local\Temp FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile Volume queried: C:\Users\user\AppData\Local\Temp FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile Volume queried: C:\Users\user FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile Volume queried: C:\Users\user FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\3ac53f57-dfab-444d-a69f-4fabb3044db1.tmpJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\SCT Auditing Pending ReportsJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeFile opened: C:\Users\user\Jump to behavior
Source: msedgewebview2.exe, 00000002.00000002.2927846101.00004C64022F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: detects_vmware
Source: msedgewebview2.exe, 00000002.00000002.2927502914.00004C6402274000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: USB device added: path=\\?\usb#vid_0e0f&pid_0003#5&2dda038&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed} vendor=3599 "VMware", product=3 "VMware Virtual USB Mouse", serial="", driver="usbccgp", guid=2c09c714-845b-4167-9d1d-580102fe89ddLd
Source: msedgewebview2.exe, 00000002.00000002.2932847700.00004C6402C0C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware Virtual USB Mouse
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: azurevirtualmachinename_scrubbed
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: DD:%s:%s:%swailsWindowPRINTSCREENISO-2022-JPgooglecloud%s at %d:%dPREFETCHWT1VFMADDSUBPDVFMADDSUBPSVFMSUBADDPDVFMSUBADDPSprefetchntaprefetchwt1sha256rnds2vaesdeclastvaesenclastvcompresspdvcompresspsvcvttpd2udqvcvttpd2uqqvcvttps2udqvcvttps2uqqvcvttsd2usivcvttss2usivfixupimmpdvfixupimmpsvfixupimmsdvfixupimmssvfmadd132pdvfmadd132psvfmadd132sdvfmadd132ssvfmadd213pdvfmadd213psvfmadd213sdvfmadd213ssvfmadd231pdvfmadd231psvfmadd231sdvfmadd231ssvfmaddsubpdvfmaddsubpsvfmsub132pdvfmsub132psvfmsub132sdvfmsub132ssvfmsub213pdvfmsub213psvfmsub213sdvfmsub213ssvfmsub231pdvfmsub231psvfmsub231sdvfmsub231ssvfmsubaddpdvfmsubaddpsvinsertf128vinserti128vmaskmovdquvpcompressdvpcompressqvpconflictdvpconflictqvphminposuwvpmadd52huqvpmadd52luqvpscatterddvpscatterdqvpscatterqdvpscatterqqvpunpckhqdqvpunpcklqdqvrndscalepdvrndscalepsvrndscalesdvrndscalessvscatterdpdvscatterdpsvscatterqpdvscatterqpsSwapBuffersgdiplus.dllshlwapi.dllLoadCursorWFindWindowWDefDlgProcWWaitMessageInflateRectIsRectEmptyDestroyMenuDestroyIconOutOfMemoryuxtheme.dllDrawMenuBarGetKeyStateShell32.dllBrowserBackBrowserStopBrowserHomeExclusiveOrchain empty%q not found<?sentinel?>DoesNotExistTargetRemoveContent-Typecontent-typeDeleteObjectListAccountsimage/x-iconimage/x-icnsaudio/x-mpegaudio/x-midiaudio/x-aiffaudio/amr-nbaudio/x-mp4akernel32.dllCoInitializeoleaut32.dllVariantClearSysStringLenRoInitializeunknown typeserverPubKeywriteTimeoutError %d: %sUNSIGNED INTSERIALIZABLEmacroman_binarmscii8_binEventSessioninvalid port<(%s,%s),%s>_timestamptz(database)s$%v not foundempty numberReadObjectCBdecode arraydecode sliceAMDisbetter!AuthenticAMDCentaurHaulsGenuineIntelTransmetaCPUGenuineTMx86Geode by NSCVIA VIA VIA KVMKVMKVMKVMMicrosoft HvVMwareVMwareXenVMMXenVMMbhyve bhyve HygonGenuineVortex86 SoCSiS SiS SiS RiseRiseRiseGenuine RDCAccessDeniedca-central-1eu-central-1eu-central-2me-central-1il-central-1[+
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: VMwareVMware
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF06A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: azurevirtualmachinename
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Unknown member: peattributes.%hspe.set_peattribute(name, state) expects boolean "state"ARM_big_endianARM_legacyARM_unpredictable_16bitmachine_32bitmachineaggressive_trim_wsaggressiveimportamd64_imagearm_imageaslr_bit_setbound_imports_inside_imagebyte_reversed_hibyte_reversed_lowcalls_unimplemented_apichecks_if_debugged_documentedchecks_if_debugged_undocumentedchecks_ntglobalflagchecks_processheapchecks_teb_lasterrorchecks_teb_laststatuscode_on_stackdebug_strippeddeep_analysisdeep_apicall_limitdelay_load_imports_inside_imagedetects_virtualpcdetects_vmdetects_vmwaredirty_wx_branchdisable_apicall_limitdisable_drop_mz_onlydisable_dropper_rescandisable_io_redirectiondisable_microcodedisable_seh_limitdisable_static_unpackingdisable_thread_apicall_limitdisable_vmprotectdmg_decompressdmg_entrypointdmg_filealignmentdmg_imagebasedmg_imagesizedmg_importsdmg_invaliddatadmg_machinedmg_not_executable_imagedmg_notcontiguousdmg_optional_magicdmg_overlapping_sectionsdmg_pointertorawdatadmg_relocationsdmg_resource_levelsdmg_resource_namesdmg_resource_offsetdmg_resource_unordereddmg_sectionalignmentdmg_sizeofheadersdmg_sizeofrawdatadmg_special_sectiondmg_truncateddmg_unsupporteddmg_virtualaddressdmg_virtualsizedroppeddt_continue_after_unpackingdt_continue_after_unpacking_damageddt_error_bb_limitdt_error_failed_to_translatedt_error_heur_API_limitdt_error_heur_exit_criteriadt_error_invalid_opcodedt_error_loop_too_complexdt_error_not_enough_memorydt_error_too_many_operandsdt_error_too_many_prefixesdt_error_vmm_page_faultdynmem_APIcalldynmem_checks_if_debugged_docdynmem_checks_if_debugged_undocdynmem_checks_ntglobalflagdynmem_checks_processheapdynmem_detects_virtualpcdynmem_detects_vmdynmem_detects_vmwaredynmem_kernel_scandynmem_reads_vdll_codedynmem_self_modifying_codedynmem_uses_access_violationdynmem_uses_bound_exceptionsdynmem_uses_breakpointsdynmem_uses_div_by_zerodynmem_uses_int_overflowdynmem_uses_invalid_opcodesdynmem_uses_privinstrdynmem_uses_single_steppingdynmem_uses_udbgrddynmem_uses_udbgwrdynmem_uses_unusual_breakpointenable_binlibenable_lshashenable_vmm_growentrybyte55entrybyte60entrybyte90entrypoint_in_headerentrypoint_in_import_tableepatscnstartepatstartentrysectepatstartlastsectepcallnextepinfirstsectepiniatepoutofimageepscn_eqsizesepscn_falignepscn_islastepscn_valignepscn_vfalignepscn_writableepsec_not_executableexecutable_imageexecutble_imageexecutes_from_dynamic_memoryexecutes_from_last_sectionexecutes_from_resourcesextended_pestaticfirstsectwritableforce_dtforce_expensive_processingforce_unpackinggenpackedhandle_large_vahas_checksumhas_delay_load_importshas_many_resourceshas_msilresourceshasappendeddatahasboundimportshasexportshasstandardentryheaderchecksum0hstr_exhaustiveia64_imageimport_via_tlsinv_argumentsinv_datainv_decompress_errorinv_dos_signatureinv_e_lfanewinv_exportsinv_fileinv_filealignmentinv_filesizeinv_imagebaseinv_nomemoryinv_notimplementedinv_nt_signatureinv_optional_magicinv_overlappinginv_rawoffsetinv_rawsizeinv_readinv_rvainv_sect
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: dynmem_detects_vmware
Source: msedgewebview2.exe, 00000002.00000002.2927502914.00004C6402274000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: USB device added: path=\\?\usb#vid_0e0f&pid_0003#5&2dda038&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed} vendor=3599 "VMware", product=3 "VMware Virtual USB Mouse", serial="", driver="usbccgp", guid=2c09c714-845b-4167-9d1d-580102fe89dd
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: pea_dynmem_detects_vmware
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: 7zXZ\SystemRoot\Device\0123456789ABCDEF0123456789abcdefpea_epscn_islastpea_epcallnextpea_secmissizepea_epatstartlastsectpea_entrybyte60pea_entrybyte90pea_epiniatpea_usesuninitializedregspea_prefetchtrickspea_issuspiciouspea_isgenericpea_isreportedpea_aggressiveimportpea_enable_binlibpea_enable_lshashpea_many_importspea_self_modifying_codepea_track_direct_importspea_detects_vmpea_detects_vmwarepea_detects_virtualpcpea_is_delphipea_uses_single_steppingpea_uses_bound_exceptionspea_uses_div_by_zeropea_uses_int_overflowpea_uses_invalid_opcodespea_uses_unusual_breakpointpea_checks_if_debugged_documentedpea_disable_io_redirectionpea_suspicious_rebasepea_disable_drop_mz_onlypea_suspicious_stack_geometrypea_suspicious_subsystempea_suspicious_timestamppea_suspicious_valignpea_suspicious_section_fsizepea_suspicious_section_characteristicspea_aggressive_trim_wspea_16bitmachinepea_system_filepea_suspicious_number_of_dirspea_force_unpackingpea_extended_pestaticpea_small_data_directory_countpea_multiple_relocs_same_locationpea_relocs_but_no_relocs_flagpea_suspicious_imagebasepea_no_section_tablepea_no_sectionspea_many_sectionspea_suspicious_image_sizepea_bound_imports_inside_imagepea_delay_load_imports_inside_imagepea_entrypoint_in_import_tablepea_entrypoint_in_headerpea_import_via_tlspea_epsec_not_executablepea_othermachine_imagepea_checks_teb_lasterrorpea_disable_vmprotectpea_checks_teb_laststatuspea_disable_thread_apicall_limitpea_deep_apicall_limitpea_dynmem_uses_div_by_zeropea_dynmem_uses_int_overflowpea_dynmem_uses_bound_exceptionspea_dynmem_uses_privinstrpea_dynmem_uses_breakpointspea_dynmem_uses_single_steppingpea_dynmem_uses_invalid_opcodespea_dynmem_uses_unusual_breakpointpea_dynmem_detects_vmpea_dynmem_detects_vmwarepea_dynmem_detects_virtualpcpea_dynmem_checks_if_debugged_docpea_dynmem_checks_if_debugged_undocpea_dynmem_kernel_scanpea_dynmem_self_modifying_codepea_dt_continue_after_unpackingpea_dt_continue_after_unpacking_damagedpea_loop_jmp_chainpea_droppedpea_reads_vdll_codepea_dynmem_reads_vdll_codepea_verbose_vdll_readspea_scan_internal_datapea_isvbpcodepea_ARM_legacypea_ARM_big_endianpea_ARM_unpredictablepea_isappcontainerpea_checks_ntglobalflagpea_dynmem_checks_ntglobalflagpea_dynmem_checks_processheappea_dt_error_heur_exit_criteriapea_dt_error_too_many_prefixespea_dt_error_invalid_opcodepea_dt_error_too_many_operandspea_dt_error_bb_limitpea_dt_error_loop_too_complexpea_executes_from_last_sectionpea_executes_from_resourcespea_memory_patchedpea_uses_sysenterpea_suspicious_resource_directory_sizepea_suspicious_import_directory_sizepea_invalid_ilt_entrypea_dmg_machinepea_dmg_filealignmentpea_dmg_pointertorawdatapea_dmg_virtualaddresspea_dmg_truncatedpea_dmg_special_sectionpea_dmg_relocationspea_dmg_overlapping_sectionspea_dmg_optional_magicpea_dmg_sizeofheaderspea_dmg_imagebasepea_dmg_imagesizepea_dmg_unsupportedpea_dmg_importspea_dmg_invaliddatapea_dmg_decompresspea_dmg_virtualsizepea_dmg_not_executable_imagepea_dmg_entrypointpea_inv_sizeofoptio
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Software\Microsoft\Windows DefenderSOFTWARE\Policies\Microsoft\SQMClient\WindowsPhoneSoftware\Policies\Microsoft\SQMClient%windir%\temp%ProgramFiles(x86)%NtGetCachedSigningLevelSOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlockhr=0x%08XThreatTrackingSigSeqEmuldet.Ainvalid hash bucket count&
Source: BrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EECFB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: pea_detects_vmware
Source: BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd
Source: BrowserUpdateTool.exe, 00000000.00000002.2919669132.0000019BCC834000.00000004.00000020.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2913395921.0000019D05040000.00000004.00000020.00020000.00000000.sdmp, msedgewebview2.exe, 00000006.00000002.2900139702.000001D7A202B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdfb1c8e88,0x7ffdfb1c8e98,0x7ffdfb1c8ea8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1788 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2780 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:3Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3020 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1724954327302821 --launch-time-ticks=4335514542 --mojo-platform-channel-handle=3508 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:1Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4536 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2Jump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=browserupdatetool.exe --user-data-dir="c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=mssmartscreenprotection --enable-features=mojoipcz --mojo-named-platform-channel-pipe=7536.7584.8340987022922056471
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview\crashpad --annotation=isofficialbuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=win64 "--annotation=prod=edge webview2" --annotation=ver=117.0.2045.47 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdfb1c8e88,0x7ffdfb1c8e98,0x7ffdfb1c8ea8
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview" --webview-exe-name=browserupdatetool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=waaaaaaaaadgaaamaaaaaaaaaaaaaaaaaabgaaaaaaa4aaaaaaaaaaaaaaaeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaaaaaaayaaaaaaaaaagaaaaaaaaacaaaaaaaaaaiaaaaaaaaaa== --mojo-platform-channel-handle=1788 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=mojoipcz --disable-features=mssmartscreenprotection /prefetch:2
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.networkservice --lang=en-gb --service-sandbox-type=none --noerrdialogs --user-data-dir="c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview" --webview-exe-name=browserupdatetool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2780 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=mojoipcz --disable-features=mssmartscreenprotection /prefetch:3
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.storageservice --lang=en-gb --service-sandbox-type=service --noerrdialogs --user-data-dir="c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview" --webview-exe-name=browserupdatetool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3020 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=mojoipcz --disable-features=mssmartscreenprotection /prefetch:8
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview" --webview-exe-name=browserupdatetool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-gb --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_ch" --time-ticks-at-unix-epoch=-1724954327302821 --launch-time-ticks=4335514542 --mojo-platform-channel-handle=3508 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=mojoipcz --disable-features=mssmartscreenprotection /prefetch:1
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview" --webview-exe-name=browserupdatetool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=waaaaaaaaadoaaamaaaaaaaaaaaaaaaaaabgaaaaaaa4aaaaaaaaaaaaaabeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaaaaaaayaaaaaaaaaagaaaaaaaaacaaaaaaaaaaiaaaaaaaaaa== --mojo-platform-channel-handle=4536 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=mojoipcz --disable-features=mssmartscreenprotection /prefetch:2
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview\crashpad --annotation=isofficialbuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=win64 "--annotation=prod=edge webview2" --annotation=ver=117.0.2045.47 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdfb1c8e88,0x7ffdfb1c8e98,0x7ffdfb1c8ea8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview" --webview-exe-name=browserupdatetool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=waaaaaaaaadgaaamaaaaaaaaaaaaaaaaaabgaaaaaaa4aaaaaaaaaaaaaaaeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaaaaaaayaaaaaaaaaagaaaaaaaaacaaaaaaaaaaiaaaaaaaaaa== --mojo-platform-channel-handle=1788 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=mojoipcz --disable-features=mssmartscreenprotection /prefetch:2Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.networkservice --lang=en-gb --service-sandbox-type=none --noerrdialogs --user-data-dir="c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview" --webview-exe-name=browserupdatetool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2780 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=mojoipcz --disable-features=mssmartscreenprotection /prefetch:3Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.storageservice --lang=en-gb --service-sandbox-type=service --noerrdialogs --user-data-dir="c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview" --webview-exe-name=browserupdatetool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3020 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=mojoipcz --disable-features=mssmartscreenprotection /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview" --webview-exe-name=browserupdatetool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-gb --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_ch" --time-ticks-at-unix-epoch=-1724954327302821 --launch-time-ticks=4335514542 --mojo-platform-channel-handle=3508 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=mojoipcz --disable-features=mssmartscreenprotection /prefetch:1Jump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeProcess created: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe "c:\program files (x86)\microsoft\edgewebview\application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="c:\users\user\appdata\roaming\browserupdatetool.exe\ebwebview" --webview-exe-name=browserupdatetool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=waaaaaaaaadoaaamaaaaaaaaaaaaaaaaaabgaaaaaaa4aaaaaaaaaaaaaabeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaaaaaaayaaaaaaaaaagaaaaaaaaacaaaaaaaaaaiaaaaaaaaaa== --mojo-platform-channel-handle=4536 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=mojoipcz --disable-features=mssmartscreenprotection /prefetch:2Jump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeQueries volume information: C:\Users\user\Desktop\BrowserUpdateTool.exe VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\WidevineCdm\manifest.json VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\Trust Protection Lists\manifest.json VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\System32\spool\drivers\color\sRGB Color Space Profile.icm VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\MEIPreload\preloaded_data.pb VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exeQueries volume information: C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Network\SCT Auditing Pending Reports VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\BrowserUpdateTool.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Masquerading
11
Input Capture
1
Query Registry
Remote Services11
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Remote System Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials23
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1501393 Sample: BrowserUpdateTool.exe Startdate: 29/08/2024 Architecture: WINDOWS Score: 19 21 198.187.3.20.in-addr.arpa 2->21 7 BrowserUpdateTool.exe 2->7         started        process3 process4 9 msedgewebview2.exe 33 205 7->9         started        signatures5 29 Found strings related to Crypto-Mining 9->29 12 msedgewebview2.exe 22 9->12         started        15 msedgewebview2.exe 9->15         started        17 msedgewebview2.exe 9->17         started        19 3 other processes 9->19 process6 dnsIp7 23 code.jquery.com 151.101.130.137, 443, 49739 FASTLYUS United States 12->23 25 raw.githubusercontent.com 185.199.111.133, 443, 49741 FASTLYUS Netherlands 12->25 27 3 other IPs or domains 12->27

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
BrowserUpdateTool.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://anglebug.com/46330%URL Reputationsafe
http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
https://anglebug.com/73820%URL Reputationsafe
http://anglebug.com/69290%URL Reputationsafe
https://anglebug.com/72460%URL Reputationsafe
https://anglebug.com/73690%URL Reputationsafe
https://anglebug.com/74890%URL Reputationsafe
https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
https://issuetracker.google.com/1619030060%URL Reputationsafe
http://anglebug.com/47220%URL Reputationsafe
http://anglebug.com/35020%URL Reputationsafe
http://anglebug.com/36230%URL Reputationsafe
http://anglebug.com/36250%URL Reputationsafe
http://anglebug.com/36240%URL Reputationsafe
http://anglebug.com/38620%URL Reputationsafe
http://anglebug.com/48360%URL Reputationsafe
https://issuetracker.google.com/issues/1664752730%URL Reputationsafe
http://www.quovadisglobal.com/cps00%URL Reputationsafe
http://anglebug.com/39700%URL Reputationsafe
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
http://anglebug.com/59010%URL Reputationsafe
http://anglebug.com/39650%URL Reputationsafe
http://ocsp.accv.es00%URL Reputationsafe
https://anglebug.com/71610%URL Reputationsafe
https://anglebug.com/71620%URL Reputationsafe
http://anglebug.com/59060%URL Reputationsafe
http://anglebug.com/25170%URL Reputationsafe
http://anglebug.com/49370%URL Reputationsafe
https://www.4399.com/flash/127539_4.htm0%Avira URL Cloudsafe
http://www.4399.com/flash/32979.htm0%Avira URL Cloudsafe
http://anglebug.com/3498n0%Avira URL Cloudsafe
http://anglebug.com/6755g0%Avira URL Cloudsafe
https://www.4399.com/flash/180977_3.htm0%Avira URL Cloudsafe
http://wails.localhost/chromium.svgbackend.App.GetBrowsers-23024479860%Avira URL Cloudsafe
https://www.4399.com/flash/205462_4.htm0%Avira URL Cloudsafe
https://iamcrede/v1/projects/-/s:generateAccessT-.09AZ__az-.09AZ__az-.09AZ__az-.09AZ__az-.09AZ__az-.0%Avira URL Cloudsafe
https://www.4399.com/flash/145991_4.htm0%Avira URL Cloudsafe
http://anglebug.com/8162K0%Avira URL Cloudsafe
https://www.4399.com/flash/39379_2.htm0%Avira URL Cloudsafe
http://anglebug.com/6876R0%Avira URL Cloudsafe
https://www.4399.com/flash/195673_4.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/55146_4.htm0%Avira URL Cloudsafe
https://permanently-removed.invalid/v1:GetHints0%Avira URL Cloudsafe
https://www.4399.com/flash/zmhj.htm#search3-64070%Avira URL Cloudsafe
http://anglebug.com/3452Q0%Avira URL Cloudsafe
https://www.4399.com/flash/18012.htm0%Avira URL Cloudsafe
https://iamcredentials.X-Appengine-Api-TicketX-Google-DappertraceinfoX-Appengine-User-IpX-Appengine-0%Avira URL Cloudsafe
https://www.4399.com/flash/217926_2.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/27924_2.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/18012_4.htm0%Avira URL Cloudsafe
http://wails.localhost/chrome-beta.svghttp://wails.localhost/chromium.svgInternal0%Avira URL Cloudsafe
https://www.4399.com/flash/218860_1.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/48504.htm0%Avira URL Cloudsafe
https://gorm.io/docs/hooks.htmlAn0%Avira URL Cloudsafe
https://www.office.com/OfficeeEATE0%Avira URL Cloudsafe
http://wails.localhost/wails/runtime.jshttp://wails.localhost/assets/index.25ad37ba.jsInternal0%Avira URL Cloudsafe
http://wails.localhost/wails/ipc.js0%Avira URL Cloudsafe
https://www.4399.com/flash/zmhj.htm0%Avira URL Cloudsafe
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signature0%Avira URL Cloudsafe
http://wails.localhost/favicon.icoInternal0%Avira URL Cloudsafe
http://anglebug.com/7406;0%Avira URL Cloudsafe
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0%Avira URL Cloudsafe
http://ocsp.accv.esTWCA0%Avira URL Cloudsafe
https://www.4399.com/flash/198637_4.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/69156_1.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/133630_4.htm0%Avira URL Cloudsafe
http://anglebug.com/5881&0%Avira URL Cloudsafe
https://doi.org/GetPartitions:0%Avira URL Cloudsafe
https://www.4399.com/flash/136516_3.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/218717_2.htm0%Avira URL Cloudsafe
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureC:0%Avira URL Cloudsafe
https://www.4399.com/flash/207195_4.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/203215_3.htm0%Avira URL Cloudsafe
https://designerapp-int.azurewebsites.net/0%Avira URL Cloudsafe
https://www.4399.com/flash/217855_4.htm0%Avira URL Cloudsafe
http://wails.localhost/brave.svga0%Avira URL Cloudsafe
https://www.4399.com/flash/203369_3.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/115339_1.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/204650_1.htm0%Avira URL Cloudsafe
http://anglebug.com/686050%Avira URL Cloudsafe
https://www.4399.com/flash/6232_3.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/218066_3.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/35538.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/21674_3.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/195990_1.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/12669_4.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/204056_4.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/205090_2.htm0%Avira URL Cloudsafe
http://wails.localhost/http://wails.localhost/0%Avira URL Cloudsafe
https://www.4399.com/flash/203018_4.htm0%Avira URL Cloudsafe
https://github.com/go-sql-driver/mysql/wiki/strict-modeChannel0%Avira URL Cloudsafe
https://www.4399.com/flash/10379_3.htm0%Avira URL Cloudsafe
http://wails.localhost/chrome.svgInternal0%Avira URL Cloudsafe
https://anglebug.com/7369F0%Avira URL Cloudsafe
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0B10%Avira URL Cloudsafe
https://anglebug.com/7369J0%Avira URL Cloudsafe
https://www.4399.com/flash/202828_2.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/198491_1.htm0%Avira URL Cloudsafe
https://www.4399.com/flash/203453_2.htm0%Avira URL Cloudsafe
https://anglebug.com/736970%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
chrome.cloudflare-dns.com
172.64.41.3
truefalse
    unknown
    code.jquery.com
    151.101.130.137
    truefalse
      unknown
      raw.githubusercontent.com
      185.199.111.133
      truefalse
        unknown
        198.187.3.20.in-addr.arpa
        unknown
        unknownfalse
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://anglebug.com/3498nmsedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.4399.com/flash/32979.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/8162Kmsedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/180977_3.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/6755gmsedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/127539_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/4633msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://crl.dhimyotis.com/certignarootca.crl0BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000BE2000.00000004.00001000.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://anglebug.com/7382msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.4399.com/flash/205462_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://wails.localhost/chromium.svgbackend.App.GetBrowsers-2302447986BrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/145991_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://iamcrede/v1/projects/-/s:generateAccessT-.09AZ__az-.09AZ__az-.09AZ__az-.09AZ__az-.09AZ__az-.BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000308000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/6876Rmsedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/39379_2.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/55146_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/195673_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://iamcredentials.X-Appengine-Api-TicketX-Google-DappertraceinfoX-Appengine-User-IpX-Appengine-BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A70000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://permanently-removed.invalid/v1:GetHintsmsedgewebview2.exe, 00000002.00000002.2930794775.00004C64026A4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/18012.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/zmhj.htm#search3-6407msedgewebview2.exe, 00000002.00000002.2931159496.00004C640273C000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/3452Qmsedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/6929msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.4399.com/flash/217926_2.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/218860_1.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://anglebug.com/7246msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.4399.com/flash/27924_2.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://wails.localhost/chrome-beta.svghttp://wails.localhost/chromium.svgInternalBrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://anglebug.com/7369msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://anglebug.com/7489msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://wwww.certigna.fr/autorites/0mBrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000BE2000.00000004.00001000.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.4399.com/flash/18012_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/48504.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://issuetracker.google.com/161903006msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935400432.00004C64031C8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920996519.00000A7400218000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919858714.00000A7400104000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920270718.00000A7400148000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.office.com/OfficeeEATEmsedgewebview2.exe, 00000002.00000002.2936057775.00004C64032F8000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://wails.localhost/wails/ipc.jsmsedgewebview2.exe, 00000002.00000003.1679353468.00004C64032F8000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://gorm.io/docs/hooks.htmlAnBrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/4722msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.4399.com/flash/zmhj.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://wails.localhost/wails/runtime.jshttp://wails.localhost/assets/index.25ad37ba.jsInternalBrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000582000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureBrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000014000.00000004.00001000.00020000.00000000.sdmp, BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000071000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/7406;msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://wails.localhost/favicon.icoInternalBrowserUpdateTool.exe, 00000000.00000002.2918128285.000000C000E8C000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crlBrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A24000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://ocsp.accv.esTWCABrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000570000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/69156_1.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/198637_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/133630_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/5881&msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://doi.org/GetPartitions:BrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/218717_2.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/136516_3.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureC:BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C000071000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/203215_3.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/207195_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/3502msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://anglebug.com/3623msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934760720.00004C64030D4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919224282.00000A74000A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://anglebug.com/3625msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934760720.00004C64030D4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919224282.00000A74000A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://designerapp-int.azurewebsites.net/msedgewebview2.exe, 00000002.00000002.2929288055.00004C6402434000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2928626686.00004C64023C0000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/3624msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934760720.00004C64030D4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2919224282.00000A74000A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.4399.com/flash/217855_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/3862msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://wails.localhost/brave.svgaBrowserUpdateTool.exe, 00000000.00000002.2919669132.0000019BCC8BD000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/4836msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://issuetracker.google.com/issues/166475273msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2934725094.00004C64030C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918348926.00000A7400024000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.4399.com/flash/21674_3.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/204650_1.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/115339_1.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/203369_3.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/68605msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/35538.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/218066_3.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/6232_3.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.quovadisglobal.com/cps0BrowserUpdateTool.exe, 00000000.00000002.2895096246.000000C0000A4000.00000004.00001000.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.4399.com/flash/195990_1.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/12669_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/204056_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/3970msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671875188.00000A7400160000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.4399.com/flash/205090_2.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/10379_3.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/203018_4.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdBrowserUpdateTool.exe, 00000000.00000000.1645209026.00007FF6EF33C000.00000002.00000001.01000000.00000003.sdmpfalse
          • URL Reputation: safe
          unknown
          http://wails.localhost/http://wails.localhost/BrowserUpdateTool.exe, 00000000.00000002.2902814216.000000C000570000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://github.com/go-sql-driver/mysql/wiki/strict-modeChannelBrowserUpdateTool.exe, 00000000.00000000.1643621541.00007FF6ECAF4000.00000002.00000001.01000000.00000003.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://wails.localhost/chrome.svgInternalBrowserUpdateTool.exe, 00000000.00000002.2913919025.000000C000C00000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/5901msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://anglebug.com/7369Jmsedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/3965msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://ocsp.accv.es0BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A70000.00000004.00001000.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://anglebug.com/7161msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0B1BrowserUpdateTool.exe, 00000000.00000002.2907968286.000000C000A70000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://anglebug.com/7369Fmsedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://anglebug.com/7162msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.4399.com/flash/202828_2.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://anglebug.com/5906msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://anglebug.com/2517msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2933102797.00004C6402CA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://anglebug.com/4937msedgewebview2.exe, 00000002.00000003.1675129970.00004C6402FA8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000003.1675160178.00004C64031A8000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1672031879.00000A7400188000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2920923446.00000A740020C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671925091.00000A740017C000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671899045.00000A7400170000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001B0000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000003.1671944845.00000A74001C4000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000005.00000002.2918251797.00000A740000C000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.4399.com/flash/198491_1.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.4399.com/flash/203453_2.htmmsedgewebview2.exe, 00000002.00000002.2931499935.00004C64027C4000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://anglebug.com/73697msedgewebview2.exe, 00000002.00000003.1675099474.00004C6403178000.00000004.00000800.00020000.00000000.sdmp, msedgewebview2.exe, 00000002.00000002.2935261131.00004C6403178000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          162.159.61.3
          unknownUnited States
          13335CLOUDFLARENETUSfalse
          185.199.111.133
          raw.githubusercontent.comNetherlands
          54113FASTLYUSfalse
          172.64.41.3
          chrome.cloudflare-dns.comUnited States
          13335CLOUDFLARENETUSfalse
          151.101.130.137
          code.jquery.comUnited States
          54113FASTLYUSfalse
          IP
          127.0.0.1
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1501393
          Start date and time:2024-08-29 21:10:12 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 7m 24s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:16
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:BrowserUpdateTool.exe
          Detection:CLEAN
          Classification:clean19.mine.winEXE@14/149@9/5
          EGA Information:Failed
          HCA Information:Failed
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 13.107.42.16, 142.250.181.234, 142.250.185.131, 13.107.21.239, 204.79.197.239, 142.251.35.163, 142.250.80.67
          • Excluded domains from analysis (whitelisted): edge-microsoft-com.dual-a-0036.a-msedge.net, fonts.googleapis.com, fs.microsoft.com, config.edge.skype.com.trafficmanager.net, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, edge.microsoft.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, l-0007.config.skype.com, config-edge-skype.l-0007.l-msedge.net, msedge.b.tlu.dl.delivery.mp.microsoft.com, www.gstatic.com, l-0007.l-msedge.net, config.edge.skype.com, dual-a-0036.a-msedge.net
          • Execution Graph export aborted for target BrowserUpdateTool.exe, PID 7536 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtEnumerateValueKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          • VT rate limit hit for: BrowserUpdateTool.exe
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          162.159.61.3file.exeGet hashmaliciousUnknownBrowse
            file.exeGet hashmaliciousUnknownBrowse
              file.exeGet hashmaliciousUnknownBrowse
                file.exeGet hashmaliciousUnknownBrowse
                  file.exeGet hashmaliciousUnknownBrowse
                    file.exeGet hashmaliciousUnknownBrowse
                      file.exeGet hashmaliciousUnknownBrowse
                        file.exeGet hashmaliciousUnknownBrowse
                          OJO!!! No lo he abiertoFwd_ Message From 646___xbx2.emlGet hashmaliciousUnknownBrowse
                            file.exeGet hashmaliciousUnknownBrowse
                              185.199.111.133https://cvccworks-my.sharepoint.com/:o:/g/personal/tbrosseau_cvccworks_edu/Eq-UyPVcAplCp0EtULhG-vgBSBG-0YnvqRHIOFaj8gAVeA?e=0GtZle&c=E,1,DChFGbEapD80-9FdFFEzIgnps7b6noVGZQKGJYQxe5NZ1bO4xoHQSXTZoDZYFQom26YXPkpXr4g-Zcy6HwaX1DHyE-5Bk2WBwo9od82Z27DPdBWYzulyG2zvnA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                https://alkimialofts.com/on%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20/Get hashmaliciousHTMLPhisherBrowse
                                  https://fb1f1d-d3.myshopify.com/pages/fb1f1d-d3-scanning#0YnJhbmRpLnRyeW9uQGFjYWRlbWljcGFydG5lcnNoaXBzLmNvbQ0=Get hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                    https://oh3y.ulvantiro.su/82xG/Get hashmaliciousHTMLPhisherBrowse
                                      https://www.linkedin.com/redir/redirect?url=https://assets-usa.mkt.dynamics.com/da18b4d8-ef63-ef11-a66d-002248282d21/digitalassets/standaloneforms/c645fb5a-f963-ef11-bfe3-7c1e52023edb&urlhash=Dt1u&trk=article-ssr-frontend-pulse_little-text-blockGet hashmaliciousHTMLPhisherBrowse
                                        phish_alert_sp2_2.0.0.0 (21).msgGet hashmaliciousHTMLPhisherBrowse
                                          run.exeGet hashmaliciousCrypto MinerBrowse
                                            DOC-71275297.pdfGet hashmaliciousHTMLPhisherBrowse
                                              https://github.com/VioletteChiara/AnimalTA/releases/download/v3.2.2/AnimalTA_installer_v3.2.2.exeGet hashmaliciousUnknownBrowse
                                                UBONg7lmVR.exeGet hashmaliciousUnknownBrowse
                                                  172.64.41.3file.exeGet hashmaliciousUnknownBrowse
                                                    file.exeGet hashmaliciousUnknownBrowse
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                          file.exeGet hashmaliciousUnknownBrowse
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                      151.101.130.137http://mi-outlook-loggin.click/icloud2022-esp.phpGet hashmaliciousUnknownBrowse
                                                                      • code.jquery.com/jquery-1.11.3.min.js
                                                                      http://imaps-support.us/icloud2022-esp.phpGet hashmaliciousUnknownBrowse
                                                                      • code.jquery.com/jquery-1.11.3.min.js
                                                                      http://facebooksecurity.blogspot.ch/Get hashmaliciousUnknownBrowse
                                                                      • code.jquery.com/jquery-1.7.min.js
                                                                      https://m.exactag.com/ai.aspx?tc=d9912543bc40b07205bbd26a23a8d2e6b6b4f9&url=http%253AING.shalominternationalministry.com/index.xml%23?email=amFtZXMubGVhZGJlYXRlckBsb2dpY2FsaXMuY29tGet hashmaliciousUnknownBrowse
                                                                      • code.jquery.com/jquery-3.3.1.min.js
                                                                      http://site9613885.92.webydo.com/?v=1Get hashmaliciousUnknownBrowse
                                                                      • code.jquery.com/jquery-1.7.2.min.js
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      raw.githubusercontent.comPDF To Excel Converter.exeGet hashmaliciousLummaC, MicroClipBrowse
                                                                      • 185.199.110.133
                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                      • 185.199.108.133
                                                                      2plugin27724.exeGet hashmaliciousXmrigBrowse
                                                                      • 185.199.110.133
                                                                      UBONg7lmVR.exeGet hashmaliciousUnknownBrowse
                                                                      • 185.199.111.133
                                                                      UBONg7lmVR.exeGet hashmaliciousUnknownBrowse
                                                                      • 185.199.111.133
                                                                      1feP5qTCl0.exeGet hashmaliciousUnknownBrowse
                                                                      • 185.199.109.133
                                                                      SecuriteInfo.com.Trojan-Downloader.Win32.Agent.xycwio.1244.6578.exeGet hashmaliciousCoinhiveBrowse
                                                                      • 185.199.109.133
                                                                      SecuriteInfo.com.Trojan-Downloader.Win32.Agent.xycwio.1244.6578.exeGet hashmaliciousCoinhiveBrowse
                                                                      • 185.199.111.133
                                                                      SecuriteInfo.com.Trojan-PSW.Win32.Stealer.cifv.26324.32739.exeGet hashmaliciousPhemedrone StealerBrowse
                                                                      • 185.199.108.133
                                                                      Neverlose.exeGet hashmaliciousXWormBrowse
                                                                      • 185.199.109.133
                                                                      chrome.cloudflare-dns.comfile.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.64.41.3
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.64.41.3
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 162.159.61.3
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.64.41.3
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.64.41.3
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.64.41.3
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 162.159.61.3
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 162.159.61.3
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 162.159.61.3
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.64.41.3
                                                                      code.jquery.comhttps://www.estampariaimagemeacao.com.br/js/images/tvavx.php?7-797967704b5369323074665079536e4f53696c4e536374495330724e4c4d38764c386f734d6741436f367a554c434d6a45304e446f2f4c537a4879396773543031474b396c4e51796651413d-cGllcnBvbnRAdW1jdS5vcmcN&c=E,1,wbWD82FzAB2JeezUv_orUrFt9Y6xAwP1SFd-LxGbn5lFQUR-ICnh2bVD8KxUbI-o1WHs4m_jH3oIrcrCtckuIPjOPE2z7IJMic3gcfP66riD2fyrofyEXyw,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.2.137
                                                                      https://cvccworks-my.sharepoint.com/:o:/g/personal/tbrosseau_cvccworks_edu/Eq-UyPVcAplCp0EtULhG-vgBSBG-0YnvqRHIOFaj8gAVeA?e=0GtZle&c=E,1,DChFGbEapD80-9FdFFEzIgnps7b6noVGZQKGJYQxe5NZ1bO4xoHQSXTZoDZYFQom26YXPkpXr4g-Zcy6HwaX1DHyE-5Bk2WBwo9od82Z27DPdBWYzulyG2zvnA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.194.137
                                                                      https://cx.surveysensum.com/fd3ButxpGet hashmaliciousUnknownBrowse
                                                                      • 151.101.2.137
                                                                      https://outbound.knectit.co.uk/u/click?_t=bnBkL3ZkcGpzYnVvcHV0c2pnQW9icGUvenNzYmMwd2ZlL3RzZmxzcHgvNjYxNHNmb3NmeHQvZm9qbmJnM29wbzAwO3RxdXVpGet hashmaliciousUnknownBrowse
                                                                      • 151.101.2.137
                                                                      New Document from Community Insurance Center.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.66.137
                                                                      https://alkimialofts.com/on%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20/Get hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.194.137
                                                                      https://t4w86zlc.r.sa-east-1.awstrack.me/L0/https:%2F%2Fdeverechemicals3.s3.amazonaws.com%2FDeveres3project002files.htm/1/010301919a36c887-bd0fadb9-69a9-4c66-8a65-7770fcfd1a1e-000000/4liC3XgeimVwv5ob78Q6Bl4nESk=173Get hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.2.137
                                                                      Message-ID 08282024 110831 PM.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.194.137
                                                                      https://tmx.velsol.com/Reporting/Document.aspx?MasterAgreementID=i1339-005394573&ID=aQAxADMAMwA5AC0AMAAwADUAMwA5ADQANQA3ADMA.Get hashmaliciousUnknownBrowse
                                                                      • 151.101.130.137
                                                                      https://tmx.velsol.com/Reporting/Document.aspx?MasterAgreementID=i1339-005394573&ID=aQAxADMAMwA5AC0AMAAwADUAMwA5ADQANQA3ADMA.Get hashmaliciousUnknownBrowse
                                                                      • 151.101.130.137
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      CLOUDFLARENETUShttps://www.estampariaimagemeacao.com.br/js/images/tvavx.php?7-797967704b5369323074665079536e4f53696c4e536374495330724e4c4d38764c386f734d6741436f367a554c434d6a45304e446f2f4c537a4879396773543031474b396c4e51796651413d-cGllcnBvbnRAdW1jdS5vcmcN&c=E,1,wbWD82FzAB2JeezUv_orUrFt9Y6xAwP1SFd-LxGbn5lFQUR-ICnh2bVD8KxUbI-o1WHs4m_jH3oIrcrCtckuIPjOPE2z7IJMic3gcfP66riD2fyrofyEXyw,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                      • 104.17.25.14
                                                                      66cf818156193_ldjfnsfd.exeGet hashmaliciousLummaCBrowse
                                                                      • 172.67.146.35
                                                                      http://my.manychat.com/Get hashmaliciousUnknownBrowse
                                                                      • 104.17.214.66
                                                                      https://cvccworks-my.sharepoint.com/:o:/g/personal/tbrosseau_cvccworks_edu/Eq-UyPVcAplCp0EtULhG-vgBSBG-0YnvqRHIOFaj8gAVeA?e=0GtZle&c=E,1,DChFGbEapD80-9FdFFEzIgnps7b6noVGZQKGJYQxe5NZ1bO4xoHQSXTZoDZYFQom26YXPkpXr4g-Zcy6HwaX1DHyE-5Bk2WBwo9od82Z27DPdBWYzulyG2zvnA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                      • 104.21.87.153
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.64.41.3
                                                                      https://cx.surveysensum.com/fd3ButxpGet hashmaliciousUnknownBrowse
                                                                      • 104.17.25.14
                                                                      SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.67.72.57
                                                                      SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
                                                                      • 104.26.0.5
                                                                      x64_installer__v4.6.0.msiGet hashmaliciousUnknownBrowse
                                                                      • 188.114.97.3
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.64.41.3
                                                                      FASTLYUShttps://www.estampariaimagemeacao.com.br/js/images/tvavx.php?7-797967704b5369323074665079536e4f53696c4e536374495330724e4c4d38764c386f734d6741436f367a554c434d6a45304e446f2f4c537a4879396773543031474b396c4e51796651413d-cGllcnBvbnRAdW1jdS5vcmcN&c=E,1,wbWD82FzAB2JeezUv_orUrFt9Y6xAwP1SFd-LxGbn5lFQUR-ICnh2bVD8KxUbI-o1WHs4m_jH3oIrcrCtckuIPjOPE2z7IJMic3gcfP66riD2fyrofyEXyw,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.2.137
                                                                      https://cvccworks-my.sharepoint.com/:o:/g/personal/tbrosseau_cvccworks_edu/Eq-UyPVcAplCp0EtULhG-vgBSBG-0YnvqRHIOFaj8gAVeA?e=0GtZle&c=E,1,DChFGbEapD80-9FdFFEzIgnps7b6noVGZQKGJYQxe5NZ1bO4xoHQSXTZoDZYFQom26YXPkpXr4g-Zcy6HwaX1DHyE-5Bk2WBwo9od82Z27DPdBWYzulyG2zvnA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                      • 185.199.108.133
                                                                      https://cx.surveysensum.com/fd3ButxpGet hashmaliciousUnknownBrowse
                                                                      • 151.101.2.137
                                                                      http://idtyvfyfmst.weebly.comGet hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.1.46
                                                                      https://outbound.knectit.co.uk/u/click?_t=bnBkL3ZkcGpzYnVvcHV0c2pnQW9icGUvenNzYmMwd2ZlL3RzZmxzcHgvNjYxNHNmb3NmeHQvZm9qbmJnM29wbzAwO3RxdXVpGet hashmaliciousUnknownBrowse
                                                                      • 151.101.2.137
                                                                      https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
                                                                      • 151.101.65.229
                                                                      New Document from Community Insurance Center.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.66.137
                                                                      https://alkimialofts.com/on%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20/Get hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.2.137
                                                                      http://idtyvfyfmst.weebly.comGet hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.193.46
                                                                      https://decktop.us/MUYKd1Get hashmaliciousUnknownBrowse
                                                                      • 151.101.129.44
                                                                      FASTLYUShttps://www.estampariaimagemeacao.com.br/js/images/tvavx.php?7-797967704b5369323074665079536e4f53696c4e536374495330724e4c4d38764c386f734d6741436f367a554c434d6a45304e446f2f4c537a4879396773543031474b396c4e51796651413d-cGllcnBvbnRAdW1jdS5vcmcN&c=E,1,wbWD82FzAB2JeezUv_orUrFt9Y6xAwP1SFd-LxGbn5lFQUR-ICnh2bVD8KxUbI-o1WHs4m_jH3oIrcrCtckuIPjOPE2z7IJMic3gcfP66riD2fyrofyEXyw,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.2.137
                                                                      https://cvccworks-my.sharepoint.com/:o:/g/personal/tbrosseau_cvccworks_edu/Eq-UyPVcAplCp0EtULhG-vgBSBG-0YnvqRHIOFaj8gAVeA?e=0GtZle&c=E,1,DChFGbEapD80-9FdFFEzIgnps7b6noVGZQKGJYQxe5NZ1bO4xoHQSXTZoDZYFQom26YXPkpXr4g-Zcy6HwaX1DHyE-5Bk2WBwo9od82Z27DPdBWYzulyG2zvnA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                      • 185.199.108.133
                                                                      https://cx.surveysensum.com/fd3ButxpGet hashmaliciousUnknownBrowse
                                                                      • 151.101.2.137
                                                                      http://idtyvfyfmst.weebly.comGet hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.1.46
                                                                      https://outbound.knectit.co.uk/u/click?_t=bnBkL3ZkcGpzYnVvcHV0c2pnQW9icGUvenNzYmMwd2ZlL3RzZmxzcHgvNjYxNHNmb3NmeHQvZm9qbmJnM29wbzAwO3RxdXVpGet hashmaliciousUnknownBrowse
                                                                      • 151.101.2.137
                                                                      https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
                                                                      • 151.101.65.229
                                                                      New Document from Community Insurance Center.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.66.137
                                                                      https://alkimialofts.com/on%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20/Get hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.2.137
                                                                      http://idtyvfyfmst.weebly.comGet hashmaliciousHTMLPhisherBrowse
                                                                      • 151.101.193.46
                                                                      https://decktop.us/MUYKd1Get hashmaliciousUnknownBrowse
                                                                      • 151.101.129.44
                                                                      CLOUDFLARENETUShttps://www.estampariaimagemeacao.com.br/js/images/tvavx.php?7-797967704b5369323074665079536e4f53696c4e536374495330724e4c4d38764c386f734d6741436f367a554c434d6a45304e446f2f4c537a4879396773543031474b396c4e51796651413d-cGllcnBvbnRAdW1jdS5vcmcN&c=E,1,wbWD82FzAB2JeezUv_orUrFt9Y6xAwP1SFd-LxGbn5lFQUR-ICnh2bVD8KxUbI-o1WHs4m_jH3oIrcrCtckuIPjOPE2z7IJMic3gcfP66riD2fyrofyEXyw,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                      • 104.17.25.14
                                                                      66cf818156193_ldjfnsfd.exeGet hashmaliciousLummaCBrowse
                                                                      • 172.67.146.35
                                                                      http://my.manychat.com/Get hashmaliciousUnknownBrowse
                                                                      • 104.17.214.66
                                                                      https://cvccworks-my.sharepoint.com/:o:/g/personal/tbrosseau_cvccworks_edu/Eq-UyPVcAplCp0EtULhG-vgBSBG-0YnvqRHIOFaj8gAVeA?e=0GtZle&c=E,1,DChFGbEapD80-9FdFFEzIgnps7b6noVGZQKGJYQxe5NZ1bO4xoHQSXTZoDZYFQom26YXPkpXr4g-Zcy6HwaX1DHyE-5Bk2WBwo9od82Z27DPdBWYzulyG2zvnA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                      • 104.21.87.153
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.64.41.3
                                                                      https://cx.surveysensum.com/fd3ButxpGet hashmaliciousUnknownBrowse
                                                                      • 104.17.25.14
                                                                      SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.67.72.57
                                                                      SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
                                                                      • 104.26.0.5
                                                                      x64_installer__v4.6.0.msiGet hashmaliciousUnknownBrowse
                                                                      • 188.114.97.3
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.64.41.3
                                                                      No context
                                                                      No context
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):65552
                                                                      Entropy (8bit):0.01267959957008888
                                                                      Encrypted:false
                                                                      SSDEEP:3:JklGlll/l/lXp9ZjrPBY0Ll4lt/Qf1DP:q0dPBY0y4dz
                                                                      MD5:F82406D91DAD32A842033CE56EA73522
                                                                      SHA1:4864C2D6780FF0F8211C4A561EE90F76AE2840E0
                                                                      SHA-256:CF1AE0AB6FEB70464C9305F3355383B901CCBF0810F335ED5EA2FEB822C46638
                                                                      SHA-512:F340D5B65B840BF7C9699AEF837F2107F8204E2ADE706175C415576B049C00FFD97328B59C7F4EC3A51B27724A0C4AB1C0E3075B53A3C78B51B224947B13FEC3
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:".7a........................................f...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):4
                                                                      Entropy (8bit):1.5
                                                                      Encrypted:false
                                                                      SSDEEP:3:R:R
                                                                      MD5:F49655F856ACB8884CC0ACE29216F511
                                                                      SHA1:CB0F1F87EC0455EC349AAA950C600475AC7B7B6B
                                                                      SHA-256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
                                                                      SHA-512:599E93D25B174524495ED29653052B3590133096404873318F05FD68F4C9A5C9A3B30574551141FBB73D7329D6BE342699A17F3AE84554BAB784776DFDA2D5F8
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:EERF
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
                                                                      Category:dropped
                                                                      Size (bytes):65536
                                                                      Entropy (8bit):0.03435668575671323
                                                                      Encrypted:false
                                                                      SSDEEP:6:G9q0SbdlrYoWcV0Ndlg1IGiFTS2tGAYkAtD2Hrn:bpbdpYrNg1IlFoAzc2L
                                                                      MD5:16D388D094ECDC534C83C4403965A9F4
                                                                      SHA1:F18AC7E0A3D71E92B794DCE0A3832A119A45A4B7
                                                                      SHA-256:A982B3BE404EBC13123D18E30EF704FA7860379DFD77FE6C0427A43931D6FBC6
                                                                      SHA-512:D4502577A673595A8F3E63BA0F083090ECEF5AFF0EDC09FF5E84C8855ADE46955A1C62C216A7D3D790D7B1E21815365332ACCAB5CE8304A309A7D9534EB53333
                                                                      Malicious:false
                                                                      Preview:....................(....x:no.&A.e.u~+..C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.W.e.b.V.i.e.w.\.A.p.p.l.i.c.a.t.i.o.n.\.1.1.7...0...2.0.4.5...4.7.\.m.s.e.d.g.e.w.e.b.v.i.e.w.2...e.x.e...........................(...p.DJ!.IL.....Zm.F............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):2278
                                                                      Entropy (8bit):3.852126400897479
                                                                      Encrypted:false
                                                                      SSDEEP:48:uiTrlKxrgxTxl9Il8uuev0DiAyUC4kkHzQyoWd1rc:myYZ0DNkkHzQ9
                                                                      MD5:6507A9985513CBBA5925E33279309B73
                                                                      SHA1:5B6C7368BC673CE17B561A27CB5B02B72326EADE
                                                                      SHA-256:3CF9310F6815CD1D40CC0B9E49B73C8FBAB2FF09B0FBA8B1A8684929FB862096
                                                                      SHA-512:80A2D165032C7F2B7859E08CEB59EBF17F8B8163890BF89B64C5A0F4DED5FF0ED04998BEAC4A129F8149487574A23C5767D2BE69496B39EF620FA4C87B0A4C72
                                                                      Malicious:false
                                                                      Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".W.i.p.w.W.M.+.N.H.l.b.C.D.m.s.Z.p.8.S.O.s.j.h.t.F.B.s.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.F.a.Y.l.U./.6.2.g.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.z.h.Z.K.J.f.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 87533
                                                                      Category:modified
                                                                      Size (bytes):137417
                                                                      Entropy (8bit):7.997994598221503
                                                                      Encrypted:true
                                                                      SSDEEP:3072:Jo3PLFNVSanWq45y2rwI9a0OZOwIgDpQ6SOf7+lK6:JofBmjLazOwFl6
                                                                      MD5:A1260E124B605E76B799584F62F6D8E1
                                                                      SHA1:0FFAF8FF327A34676904D82456F4F4A72E282C7D
                                                                      SHA-256:7E7CA792DEA9BB4A343AAFBDCE238EAF2B93DC3F8D5F4134FF9721FAE9ED29BC
                                                                      SHA-512:C380CED75C65E3FF08DD8B0786C00160C101833B3C407B75EA88373690445E8D78B9241C78109CB923239FCEAA05871DA838A5B40FA0B8B7F9A0F00EE2198A3F
                                                                      Malicious:false
                                                                      Preview:...........:ks.6...WH..C..,9.....qidy.Y.r,9..q.."$1....,kd......%Rqno.B4......2b!_.. ......$.].f=..G...,....\.|.....D.X0.....o._..B.;X"Ws.d....)`...........2..f..........m......).......t$..#F...S!Wm...6%.1.\..a..5..;..YO.....'.-fT..1.....Q.....=.....ON..b....{Bp.....4.A..?......}..s.D..8..6H5...C....^..6........%...8..d.Yc...^j..\......un..o...q/m...5..5.?..2.s.>)..I.ge./)....#.....R.i....<P`d...zx....#r..p.....]...........G.{..._{o..V.(..d=..tm1. s.b..ZN....2y...K......1.Z...#..~.......f.8&.S.......G..3u..U..g.!K...O(M.@.w.......vLe........-.\..@.w.H.6w.*.?.`...YS?<2.:.....J...>u.0...^..{.e>~.I....Z...gU.........{......*R.w.....&.....p......M..a)%d......}.).y...-.j-....Kw.....f...t..f.}.q.6..1.e.aC..%..x.5.j.r.....W6.<..MS.(..F.x..=.......b.>...Iy..i#%Re....F.[{I8.`...p..T....g.....d.........}..@. .^0......f..X.OS.....x.Q,......@..:....e..xT.r....6U:}.....u..V..\...Fb5...'}..`.s./h.G.k..g.H1]x..+.....V..G..}....|.z..H..].~|.S....g.2KL.2.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):17689
                                                                      Entropy (8bit):6.0605798829827435
                                                                      Encrypted:false
                                                                      SSDEEP:384:dtMGQ7LBjuYXGIgtDAW5u0TDJ2q03WNlBtAjSExgac83i3F3v:XMGQ7FCYXGIgtDAWtJ412Exgac83i1f
                                                                      MD5:4DC801FBD847FF7F8AAFCEEF21D2E13F
                                                                      SHA1:85E330CD1645557F7E566165174BDDE5C780B5BB
                                                                      SHA-256:F75AFF857AE598D5E7CD22006C2BA7983FE71E97ACC14E95E8973542E08663B5
                                                                      SHA-512:EAB90156F2A2A83265DA20DE63BF9A9862571E66827CED984B0118E39598A56CCFDFB1CDAF147F8ACD54DC3E689483B30A8E737721D7D66566B5695EBC3C5B15
                                                                      Malicious:false
                                                                      Preview:{"desktop_session_duration_tracker":{"last_session_end_timestamp":"1724958670"},"domain_actions_config":"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
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):2053
                                                                      Entropy (8bit):5.499062488867571
                                                                      Encrypted:false
                                                                      SSDEEP:48:YDEFMsFiHC0afD3jM/8ThdgJD5niiHB+edrxhtBlZH6RQTABG/d2a:PNkC1fLjM/6GJFikBzBjZqQTAI4a
                                                                      MD5:597351182ED73FE7CE67C7013C3DD798
                                                                      SHA1:5D55BF1D1B3505B7564E543702A7B72CF5538AC1
                                                                      SHA-256:F008B87B089BB8718E83BC5C7E680C52E4D84A477C2347ED9B763D0EAE366D28
                                                                      SHA-512:F300A142B21F696FD73776FCD20A0D4F6C0089C50E9379E0E0AD4A137BC21B0FAC5BFDFC74C5CF3190F314F1DAE27B0F8B2607203BC83D3EB6A1024203F271ED
                                                                      Malicious:false
                                                                      Preview:{"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAADOFkol+YPMRLwhHz+QxDljEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAB8ZS/AV2yQMIRBFjMCx+PTcgh2P3CxX+p11UQG7ddXUgAAAAAOgAAAAAIAACAAAAAIxPwmwMYxmLL9OjK3oD+q5QVB/jKLPUzZQfE+Xmlt6zAAAACnvh0vHaaux5Gf42X+XlVN/F8rnqvYpx1rxMZ+Vs9VQpSwQEz0iuYvaCIIk1jmdSJAAAAAKhygl0CSrJTHMb7nngv693KMjlMIavMtEak+L2ZavjpzNNqBGBSFYwOeERGevpCjJo7Lv2DEB0Ubmt+OC+uvVA=="},"policy":{"last_statistics_update":"13369432262177420"},"profile":{"info_cache":{},"profile_counts_reported":"13369432262184497","profiles_order":[]},
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):2900
                                                                      Entropy (8bit):5.325753262995034
                                                                      Encrypted:false
                                                                      SSDEEP:48:YDEFMsFiHGS0afD3jM/8Thdg3p8QSh/cIgwLURMYXylVotoWUu5K1DilHB+edrx5:PNkGS1fLjM/6G58rh/cI9URoDotobQZz
                                                                      MD5:45E627DD60E2C3D4A01503DEE4676294
                                                                      SHA1:A11EF6EC4DC3EF006324FDF0AEC9ECEA202C3C1E
                                                                      SHA-256:7D3709BEE8A1B31AFDFBE6D0E1AA2F771DE38CFEE09736A7077BE08142A5F76B
                                                                      SHA-512:100373A13BCC06DFD6D336454B504D974F6B385254F76D4C80A11D2A685775B5D526670081192CD8A7D84E94922FFE7154439315EE88EB4B51AE4BFE3D1D41FD
                                                                      Malicious:false
                                                                      Preview:{"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fre":{"oem_bookmarks_set":true},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAADOFkol+YPMRLwhHz+QxDljEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAB8ZS/AV2yQMIRBFjMCx+PTcgh2P3CxX+p11UQG7ddXUgAAAAAOgAAAAAIAACAAAAAIxPwmwMYxmLL9OjK3oD+q5QVB/jKLPUzZQfE+Xmlt6zAAAACnvh0vHaaux5Gf42X+XlVN/F8rnqvYpx1rxMZ+Vs9VQpSwQEz0iuYvaCIIk1jmdSJAAAAAKhygl0CSrJTHMb7nngv693KMjlMIavMtEak+L2ZavjpzNNqBGBSFYwOeERGevpCjJo7Lv2DEB0Ubmt+OC+uvVA=="},"policy":{"last_statistics_update":"13369432262177420"},"profile":{"info_cache":{"Default":{"avatar_icon":"chrome://t
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):1310720
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3::
                                                                      MD5:1045BFD216AE1AE480DD0EF626F5FF39
                                                                      SHA1:377E869BC123602E9B568816B76BE600ED03DBD0
                                                                      SHA-256:439292E489A0A35E4A3A0FE304EA1A680337243FA53B135AA9310881E1D7E078
                                                                      SHA-512:F9F8FCC23FC084AF69D7C9ABB0EF72C4684AC8DDF7FA6B2028E2F19FD67435F28534C0CF5B17453DFE352437C777D6F71CFE1D6AD3542AD9D636263400908FD2
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):1310720
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3::
                                                                      MD5:1045BFD216AE1AE480DD0EF626F5FF39
                                                                      SHA1:377E869BC123602E9B568816B76BE600ED03DBD0
                                                                      SHA-256:439292E489A0A35E4A3A0FE304EA1A680337243FA53B135AA9310881E1D7E078
                                                                      SHA-512:F9F8FCC23FC084AF69D7C9ABB0EF72C4684AC8DDF7FA6B2028E2F19FD67435F28534C0CF5B17453DFE352437C777D6F71CFE1D6AD3542AD9D636263400908FD2
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):1310720
                                                                      Entropy (8bit):0.6398644589436011
                                                                      Encrypted:false
                                                                      SSDEEP:1536:3fMPAoRX17O83UDRGg1DRFFoRGWVE4xJ+6qRmhRX3/ztFrbRGJIM:vyAYJO83Ucg1HFlBgJ+6qKX7tyx
                                                                      MD5:5FF1BA8839448CA1A0B41ED1488806FD
                                                                      SHA1:EBE0662FEBDF25A07300B188B6E3AEB24F612C1C
                                                                      SHA-256:FEB8C505B0A9C2344C1B6EAB2721996F8FEF59FC8D221A32CB6CCB3F203EE3FC
                                                                      SHA-512:9FA7253569803F8546DE48E1D9DABA09A9A71CE9E0439B63F8D545B83DA85DBA2FE0ACDEE01B781AE3767C7464B169A80A7E7C819989F1F89F674EF4861BC56E
                                                                      Malicious:false
                                                                      Preview:...@............C.].....@...............P..................`... ...i.y.........BrowserMetrics......i.y..Yd. .......A...................v.0.....UV&K.k<................UV&K.k<................UMA.PersistentHistograms.InitResult.....8...i.y.[".................................................i.y.Pq.30....K.........117.0.2045.47-64".en-GB*...Windows NT..10.0.190452(..x86_64..?........".cdiwon20,1...x86_64J....?.^o..P....<.................>..*......qW:00000000000000000000000000000000000000000000!00000000000000000000000000000000000000000000!BrowserUpdateTool.exe.)1900/01/01:00:00:00!BrowserUpdateTool.exe".1.0.0.02...".*.:..............,..(.......EarlyProcessSingleton.......Default3.(..$.......msEdgeEDropUI.......triggered....8..4... ...msDelayLoadAuthenticationManager....triggered....<..8...#...msSleepingTabsShorterTimeoutDefault.....triggered....8..4... ...msEdgeMouseGestureDefaultEnabled....triggered....8..4.......msEdgeShowHomeButtonByDefault.......triggered....<..8...$...msConsumerIE
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):280
                                                                      Entropy (8bit):1.8605736586871553
                                                                      Encrypted:false
                                                                      SSDEEP:3:FiWWltlviLNIQs/llll/NEjYb1gmlx/ll:o1KlM/l1fCmlZl
                                                                      MD5:B018557E1E8D565CF0E97AA017B69EC8
                                                                      SHA1:A6884B5B89FF818352D5C3FE371640BA3F452307
                                                                      SHA-256:108A52D1A1CA8CD72F727BCC1104A4232125FCCF501FE384924D0A1D5C6B22D2
                                                                      SHA-512:D96D86BCAE91B8B09D8A6E672DE7CBA7B1356221250F02B7A7B659A5824503055ED6D55DA923F547118262740A862492B6C250B79A4FAA9C91B96FFCA5E09B69
                                                                      Malicious:false
                                                                      Preview:sdPC....................9..v..N.Ev.ds%)................................................................................................................................................................................................{F3017226-FE2A-4295-8BDF-00C3A9A7E4C.}C:........
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):20
                                                                      Entropy (8bit):3.6219280948873624
                                                                      Encrypted:false
                                                                      SSDEEP:3:8g6Vvn:8g6Vv
                                                                      MD5:9E4E94633B73F4A7680240A0FFD6CD2C
                                                                      SHA1:E68E02453CE22736169A56FDB59043D33668368F
                                                                      SHA-256:41C91A9C93D76295746A149DCE7EBB3B9EE2CB551D84365FFF108E59A61CC304
                                                                      SHA-512:193011A756B2368956C71A9A3AE8BC9537D99F52218F124B2E64545EEB5227861D372639052B74D0DD956CB33CA72A9107E069F1EF332B9645044849D14AF337
                                                                      Malicious:false
                                                                      Preview:level=none expiry=0.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):6105
                                                                      Entropy (8bit):4.816653208935823
                                                                      Encrypted:false
                                                                      SSDEEP:96:stE/vpfs13Nb9E0G8zo85eh6Cb7/x+6MhmuecWb1eAeQdw2MR7K:stIvFsTGko88bV+FSbQASPhK
                                                                      MD5:FB7F8FBBFB3233FF27D1CBB9FCA017BC
                                                                      SHA1:D99899177FD52CE67F4BB9B69941D079E23A6AF6
                                                                      SHA-256:F413B9993C4E367F7174F65A749167BCDE4FCF0E040CB5B9BF1D7D285140685C
                                                                      SHA-512:3846B6C37EA464E326AB96B63C4CB03F95205B16FE8344970DFAB4BBBDDCFB63343FDC2761B8125E990299CA9BF017100498F642F97F0C6BCAE543EA0BD9B61A
                                                                      Malicious:false
                                                                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369432262628299","alternate_error_pages":{"backup":true,"enabled":false},"autocomplete":{"retention_policy_last_version":117},"autofill":{"autostuff_enabled":false,"credit_card_enabled":false,"custom_data_enabled":false,"custom_data_fill_enabled":false,"custom_data_identify_info_from_form_enabled":false,"custom_data_save_enabled":false},"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"browser_content_container_height":729,"browser_content_container_width":1008,"browser_content_container_x":0,"browser_content_container_y":0,"countryid_at_install":17224,"credentials_enable_service":false,"dips_timer_last_update":"13369432262565597","domain_diversity":{"last_reporting_timestamp":"13369432262627408"},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data"
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):6780
                                                                      Entropy (8bit):5.580776730684396
                                                                      Encrypted:false
                                                                      SSDEEP:96:voiAPlf/ROoBpkF5d1uiL7VaTEv9V5h5pg5vezodIU8alSpsA5IOrMn3YPo0MG6R:BkrGN9l5cSpFIOAn3go0iuG
                                                                      MD5:6303EA5D75A55BBA2172BF4607F3364E
                                                                      SHA1:70EBB3CA805BC33D7E27B9B9B1D196A7C097EA5F
                                                                      SHA-256:A7326D5CEFD59D4A412E5F98B0C597E54935CB8B92AADAB6FEC9CA00FE52895D
                                                                      SHA-512:5D794FB22C2B4031DE0D734B7D9F8252B4CF2D6F15C42E3AF0EBD0B75772E8E01FC542CFB11E4E6F84ECA0BF2B7E22F835DD5A515E78DE7AC18C47374C0DC5E6
                                                                      Malicious:false
                                                                      Preview:{"extensions":{"settings":{"dgiklkfkllikcanfonkcabmbdfmgleag":{"active_permissions":{"api":[],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369432262268273","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369432262268273","location":5,"manifest":{"content_capabilities":{"include_globs":["https://*excel.officeapps.live.com/*","https://*onenote.officeapps.live.com/*","https://*powerpoint.officeapps.live.com/*","https://*word-edit.officeapps.live.com/*","https://*excel.officeapps.live.com.mcas.ms/*","https://*onenote.officeapps.live.com.mcas.ms/*","https://*word-edit.officeapps.live.com.mcas.ms/*","https://*excel.partner.officewebapps.cn/*","https://*onenote.partner.officewebapps.cn/*","https://*powerpoint.partner.officewebapps.cn/*","https://*word-edit.partner.officewebapps.cn/*","https://*excel.gov.online.office365.us/*","
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
                                                                      Category:dropped
                                                                      Size (bytes):12288
                                                                      Entropy (8bit):0.3202460253800455
                                                                      Encrypted:false
                                                                      SSDEEP:6:l9bNFlEuWk8TRH9MRumWEyE4gLueXdNOmWxFxCxmWxYgCxmW5y/mWz4ynLAtD/W4:TLiuWkMORuHEyESeXdwDQ3SOAtD/ie
                                                                      MD5:40B18EC43DB334E7B3F6295C7626F28D
                                                                      SHA1:0E46584B0E0A9703C6B2EC1D246F41E63AF2296F
                                                                      SHA-256:85E961767239E90A361FB6AA0A3FD9DAA57CAAF9E30599BB70124F1954B751C8
                                                                      SHA-512:8BDACDC4A9559E4273AD01407D5D411035EECD927385A51172F401558444AD29B5AD2DC5562D1101244665EBE86BBDDE072E75ECA050B051482005EB6A52CDBD
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):45056
                                                                      Entropy (8bit):0.051419403706290306
                                                                      Encrypted:false
                                                                      SSDEEP:6:/F4smNEBY3FsEyK+r0e6dnGN8dXAgvR/:d4sCEeVfyK+ryZ1wgh
                                                                      MD5:EA02032347AB636041010CE716469DE6
                                                                      SHA1:B22C97AA451F05A68D90CBBD41E78D52E2340C16
                                                                      SHA-256:C51DBECAC5A37A32968E14629A4B8B08751781AFCDAA7DE4637EA42FAAF73C97
                                                                      SHA-512:2ECCA42464CE45F9E9FE2A41B5E15CE845F2E14872A7B69BEF942F0C52D24811114B1795E067D7576549BB03DBC42FA25B5935F6DEF709B179B316778B253C16
                                                                      Malicious:false
                                                                      Preview:............$...................................................................?.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):270336
                                                                      Entropy (8bit):0.0796001601971016
                                                                      Encrypted:false
                                                                      SSDEEP:48:G1OeMnEe4eEDPYisIF+8ERA2evY6oevfev:Ku8PZ1+899Y6La
                                                                      MD5:E7BC473073E47851A02698D3DAD857B3
                                                                      SHA1:C887F5DE90BCC937483416E0CC408B91CA66BCBF
                                                                      SHA-256:187B9BD0E95417B601FC9A6617194718FA3AF88C1AF2E4A4EF028BDBB2B07EB8
                                                                      SHA-512:FDFFD4309DD464395F60DBA9AA3B6B26F61871E06790398A6E0C67D99B4E782A8B293176950DAACB80E664701B3E71EDA605F2EA687FF9BDB8134C26627A0CEF
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):1056768
                                                                      Entropy (8bit):0.2632643620201084
                                                                      Encrypted:false
                                                                      SSDEEP:384:j5Ol9pJtBYOnaJtpM5O3OJtayO3OJtaiO3OJta:wZJt/naJtis3OJtg3OJto3OJt
                                                                      MD5:93F420E14FA18AA6B6223D1EDB18E4AC
                                                                      SHA1:CE07B5E0C2E17B7613BC66DAE8D75FA0519B46AF
                                                                      SHA-256:8041D26D7F85E39D39EDD414F9AA62786E6EDE2F5004EFD7C744ACEED1801571
                                                                      SHA-512:614DB45D95B05E2FC5D437F1AE20A8D79884F56F3D4D6A0AB9DCDA94AED5BCD7FF190815F13CA3C07DA7DD0A4B3A9856F1648EB33BF1EBDED1891F8F4B6C2951
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):4202496
                                                                      Entropy (8bit):0.04334571094831677
                                                                      Encrypted:false
                                                                      SSDEEP:384:UepOdAriJtg7PA1uCrDDWmvOZAMkEVFdb0Fqz9:UecyriJt641uaDDWQOZvkEVHb0Ez9
                                                                      MD5:B412EF197E11FF4C5668042900321C73
                                                                      SHA1:D3F6C4C5E25A0407EAC634CF4ED757A6EC1043CC
                                                                      SHA-256:A8A3C5D0D676822E86C308E7577BC18664B44F0E89B6A513749350F0AB8B2FC8
                                                                      SHA-512:4BA194E942C52CF9245E21C875B3B912C7307930E30593E924B62E7C2BD9DC5B6E83222AAD74C9ADF1AEFE598E1604F3166028050F278AFEDD6A87FF85580F3C
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text, with very long lines (65447)
                                                                      Category:dropped
                                                                      Size (bytes):87533
                                                                      Entropy (8bit):5.262536918435756
                                                                      Encrypted:false
                                                                      SSDEEP:1536:0RUX9uDgwxcy2KVBNwchN6SLaHEk2BSrBESp+a/IEk4aAocVi8SMBQ47GKr:sHNwcv9VBQpLl88SMBQ47GKr
                                                                      MD5:2C872DBE60F4BA70FB85356113D8B35E
                                                                      SHA1:EE48592D1FFF952FCF06CE0B666ED4785493AFDC
                                                                      SHA-256:FC9A93DD241F6B045CBFF0481CF4E1901BECD0E12FB45166A8F17F95823F0B1A
                                                                      SHA-512:BF6089ED4698CB8270A8B0C8AD9508FF886A7A842278E98064D5C1790CA3A36D5D69D9F047EF196882554FC104DA2C88EB5395F1EE8CF0F3F6FF8869408350FE
                                                                      Malicious:false
                                                                      Preview:/*! jQuery v3.7.1 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(ie,e){"use strict";var oe=[],r=Object.getPrototypeOf,ae=oe.slice,g=oe.flat?function(e){return oe.flat.call(e)}:function(e){return oe.concat.apply([],e)},s=oe.push,se=oe.indexOf,n={},i=n.toString,ue=n.hasOwnProperty,o=ue.toString,a=o.call(Object),le={},v=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},y=function(e){return null!=e&&e===e.window},C=ie.document,u={type:!0,src:!0,nonce:!0,noModule:!0};function m(e,t,n){var r,i,o=(n=n||C).createElement("script");if(o.text=e,t)for(r in u)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.remove
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:Web Open Font Format (Version 2), TrueType, length 18536, version 1.0
                                                                      Category:dropped
                                                                      Size (bytes):18536
                                                                      Entropy (8bit):7.986571198050597
                                                                      Encrypted:false
                                                                      SSDEEP:384:IhocXmE6eM871P7td/mcOKA454H2orQEONKrOqxw:f6WeL1P//9D54WCCKc
                                                                      MD5:8EFF0B8045FD1959E117F85654AE7770
                                                                      SHA1:227FEE13CEB7C410B5C0BB8000258B6643CB6255
                                                                      SHA-256:89978E658E840B927DDDB5CB3A835C7D8526ECE79933BD9F3096B301FE1A8571
                                                                      SHA-512:2E4FB65CAAB06F02E341E9BA4FB217D682338881DABA3518A0DF8DF724E0496E1AF613DB8E2F65B42B9E82703BA58916B5F5ABB68C807C78A88577030A6C2058
                                                                      Malicious:false
                                                                      Preview:wOF2......Hh..........H..............................Z..|.`..J.T..<.....H..U..Z...x.6.$..0. ..t. ..I....p.0.VU.......1....AQ...d..x.....R..4.-.c..C$fUc.c..IX..@..~g.xs.....%...O...eJ.w..U.|.......%*..{.......U+..T#.S......`.n.....V.w.4..~P"..zk.%..../........=3...F.........V.FL..;Bc.........A.Uk.U1.b!Y.BH.DL...s.s...F.m.9a..GJ..1..#.`*m5..DI..X5#.........B.Akm.....&..0...{.L.....G......-(.......O4.@3....=......f..l...$.....j..NO...e.Y.tJ2J>F.(.c....08..e...~....D2S7s:.G'Gm........!.7.........r.c.`,.....~.).......c>1.......Y.g2^...T-1.7./r./....>...g.ov@u.?.U.+._...'M..,.,g....!g..9."..yBF.#r+.Ps...%.d=....U...5.b.$:`.4R.II.<A....Q)....e...k.....M.8.z....+.....5}..F........F.d._...].~-](.Lf....Y..W....;-z...;. .@x._v../.%UIm....=s...P.C....G...^..Q.!g.!b._.P....at..?.}....t.z...O(..Y6..R.2.X....k.R..K.gw(.F.K?m..R*...7....dj..7. .r.U..be.4......8.].w.B..B......Y..:..8.N..U...NEm...\.^q..f}.......{..6.". ...y-.Y...N.*+.M E..`......R.$T
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:Web Open Font Format (Version 2), TrueType, length 18588, version 1.0
                                                                      Category:dropped
                                                                      Size (bytes):18588
                                                                      Entropy (8bit):7.988601596032928
                                                                      Encrypted:false
                                                                      SSDEEP:384:WF9srt3EJfKy7iOpqErJeqQhzsaZqPTPabcoqYdBTKYPvS9BlTf:Wn6UhKYieqAiPQTwclYQLlTf
                                                                      MD5:115C2D84727B41DA5E9B4394887A8C40
                                                                      SHA1:44F495A7F32620E51ACCA2E78F7E0615CB305781
                                                                      SHA-256:AE0E442895406E9922237108496C2CD60F4947649A826463E2DA9860B5C25DD6
                                                                      SHA-512:00402945111722B041F317B082B7103BCC470C2112D86847EAC44674053FC0642C5DF72015DCB57C65C4FFABB7B03ECE7E5F889190F09A45CEF1F3E35F830F45
                                                                      Malicious:false
                                                                      Preview:wOF2......H........ ..H8................................|.`..J.\..<........-..Z...x.6.$..0. .... ..S.7.5..K!.;..../.`..Sn.J.e.52P.(.....=9....f.....$...*.fZ.p...N...t....6.lfS.Ju.i.o.g..<....T"O.o..4..4....M/N.>.K..."[.P...W.u.>]................A.9z....IN^....z..Y.{....m=...+X9<?.......(IA*G8rD....52L0.p .EJ..p....=.......[U...pz..g...../L.U.......P..W.U..q$L..6......C.M.0..R..........D(.ilX.Y..SZ.R...Q..j.6.@\."|.l......3....,.T.....L...ap0......6.j.\&O.z`*.$.*_+vwnr...,....?W.T....!.J...L#%.......A}........\.....l...:....U..u.J.0....O......&.!.)4.V..:.}.0f....:W......?U.....%...b...!....yA.sw.....5..T .}{.t!F.G....{"..pQ.S.v.S....t......U.Y|.v.@....|..(..V.........^....../.7......K......J.Uq/L.T-.`.O........;........';vWq.+....J...J..p.....sB`(1LC.k....?Z{...v>dS....F..........\.....UetU........6.V...vE....._.../...%.q...^.l...>^.z..l..p....j..@H...`X.p...KQ. .<@...I...BF.......L..6...y.2=.P....8;..@`.m.....R.B.L.r.*T.T..l@.6.Y....}g.....F.n...
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:Web Open Font Format (Version 2), TrueType, length 18596, version 1.0
                                                                      Category:dropped
                                                                      Size (bytes):18596
                                                                      Entropy (8bit):7.988788312296589
                                                                      Encrypted:false
                                                                      SSDEEP:384:h5D5WUhNanar/Z19V6iGCYIqoPfHwfr13GPgqbrxremyFKKWB:h/NaOrBGCYIBPfQD1xqPhl
                                                                      MD5:C83E4437A53D7F849F9D32DF3D6B68F3
                                                                      SHA1:FABEA5AD92ED3E2431659B02E7624DF30D0C6BBC
                                                                      SHA-256:D9BADA3A44BB2FFA66DEC5CC781CAFC9EF17ED876CD9B0C5F7EF18228B63CEBB
                                                                      SHA-512:C2CA1630F7229DD2DEC37E0722F769DD94FD115EEFA8EEBA40F9BB09E4FDAB7CC7D15F3DEEA23F50911FEAE22BAE96341A5BACA20B59C7982CAF7A91A51E152F
                                                                      Malicious:false
                                                                      Preview:wOF2......H...........H=................................|.`..J.H..<........>..Z...x.6.$..0. ..~. ..)...%.m..t.D<...U.c....D....@........@e..a..R./<...p..q..q....S<.nm...X..(ER....e.....O.?Q_..FYH......ml.E..?;X0>.f.Y.,.n.a...._h8c.006U.cS..3.m.Or..I9..5.;.=..'!..c.O...W.K..f....k..&Xq..Y?.r...%.S..y.:q*.......u*D.d.R..'..Q,L.... e`..=?.{...e%{.....3+$.....NkF2...... ._}..2]....,.F.u.S4O.~w).G..../]}6.nVwKj.h@........5.7P....i..r........U?.........q..Cm......g...\.zu.....P..|....5G$...4k$..L..g..".y..?..6...O...e..@..0TYh..v........M.....#B...O.i.G$.Bq..m.A.s~...A...c.....25K.....B..<..w.A....G.O...A......A,y"q....q<....N..{Ta..!.|vzo.;9.5>.>....7I.i.Ld.4..y...].g.....'m_(...O-..}.K.(....R..2.q.z9.D..]..$.#$.:x..:{..m.OF...K[J. ......lpH.#%V....4.;l.<..J.6.T..a...I..|..zj.k.-...y...#..e.1,s....<.HX.....z{L....'.$. "..tY..m.<.\8P. a.......x.W\.b.%...RA.\.... M.......v1......#...............`.c..%.Nc.d.qP.68....$<.O.S_7...U.].jn>@.3.c..wO..>.>a.qg....\..kb.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):524656
                                                                      Entropy (8bit):5.027445846313988E-4
                                                                      Encrypted:false
                                                                      SSDEEP:3:LsulLhI:Ls0e
                                                                      MD5:A89032EF3C593F1E9906965F075D8359
                                                                      SHA1:DBF77B8D60028B291D833C248720F264B4D1BD05
                                                                      SHA-256:B20B9C1367F5CAF2A4703B24A523BFD00A4120EA7672B1BD8E7CA83E52626558
                                                                      SHA-512:A41918F101267E22C393404CAFD9467938F44B557AEBE46C1471CC6EF168CAE53119A74D16DAB6227E0B00BD8C0B85AE8FC58F615BE7173919B3DD134C2610B2
                                                                      Malicious:false
                                                                      Preview:.........................................~.m./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):248
                                                                      Entropy (8bit):5.557429434823883
                                                                      Encrypted:false
                                                                      SSDEEP:6:mDVVIWgDNsO7WwKIWgDN96thEfol1KVjUX+tElFlnky7I8:0f2sGE2963EfoLKxUutoxke
                                                                      MD5:A52DB39DB77D503FBB1306587F87B6BF
                                                                      SHA1:489A8AAAA08994B561AE85CA2CC94714DC73DFE4
                                                                      SHA-256:218E8EF377CC6F3C376D52D9A0EAA155C7F55A3659B6EC5490BDA0C537E52BF4
                                                                      SHA-512:5838DFD023E9B9878C058AB6AC7916E3DA4F0F206253A3B51A168CB486CB9232B855C70BCBE706A1A9EA09373A1471546199411581A8C6A985CD7A1232148C0E
                                                                      Malicious:false
                                                                      Preview:0\r..m......D....f......_keyhttp://wails.localhost/wails/runtime.js .http://wails.localhost/.A..Eo.....................m./.@............t?]...k.>D...x,.D|..n.6...2.....Z...........U+B......#u}.. .+-k?jJ..CY..y.......O+..A..Eo.......g..L.......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):212
                                                                      Entropy (8bit):5.312639236355519
                                                                      Encrypted:false
                                                                      SSDEEP:6:mWl/VYee25KIWgDN96tln+nlo//VhyWDkyeV4m:5HO296D+ujyWm
                                                                      MD5:892D3617420FBD940826E6D87812F9D9
                                                                      SHA1:29D53935D339A01B41C60EC5392C9B240E4F5C67
                                                                      SHA-256:1536661A569DA4B344E9251CEA3A1A260E3A35CCD20149598CBA7B22CF28EAE7
                                                                      SHA-512:B58450B9952F757987FB6B2B5A28062FE9F01A92CE8E5A26EA6ACCA2FDFFA93AFD10BBD882A74B640C7243876EC2FD254004FBBD159FA21B977B2DBBD6A74CDE
                                                                      Malicious:false
                                                                      Preview:0\r..m......H....n......_keyhttps://code.jquery.com/jquery-3.7.1.min.js .http://wails.localhost/.A..Eo..................0{..m./.........Z............1B.......-)\.w.[...<..S....L7z....&9...A..Eo........`.$.......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):256
                                                                      Entropy (8bit):5.600424826116358
                                                                      Encrypted:false
                                                                      SSDEEP:6:mGfVIWgDNQwlKvNwKIWgDN96tuw/t3kFNc/ElsTieBdcbP6grT:r2Q9N296z13MK/1TiCdc7L
                                                                      MD5:BFEC69FB2A56A98EE7D82047B71746C2
                                                                      SHA1:38863903378501B4ADD782F053519EE52E1FC84B
                                                                      SHA-256:4E87491595750EE8F868F046A36A4D5003612F14CF4E1FAB96718F0F8B4D28DA
                                                                      SHA-512:6D373E5DEE06EF0BCA0F1EC01451DDF4069A775274B8A3E94F885671704C7BC3DA8BF636A6789683ED379FCEA8D9E9CF45844F6CD24BE8D13CE20AE047CC2A81
                                                                      Malicious:false
                                                                      Preview:0\r..m......L.....~m...._keyhttp://wails.localhost/assets/index.25ad37ba.js .http://wails.localhost/.A..Eo..................r..m./.@...........$-Q..dX.I..o..".D....*...<nC`.(.....Z...........p2B.....[..\%.....pA...(....E..p....HC...A..Eo........J.L.......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):24
                                                                      Entropy (8bit):2.1431558784658327
                                                                      Encrypted:false
                                                                      SSDEEP:3:m+l:m
                                                                      MD5:54CB446F628B2EA4A5BCE5769910512E
                                                                      SHA1:C27CA848427FE87F5CF4D0E0E3CD57151B0D820D
                                                                      SHA-256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
                                                                      SHA-512:8F6ED2E91AED9BD415789B1DBE591E7EAB29F3F1B48FDFA5E864D7BF4AE554ACC5D82B4097A770DABC228523253623E4296C5023CF48252E1B94382C43123CB0
                                                                      Malicious:false
                                                                      Preview:0\r..m..................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):120
                                                                      Entropy (8bit):4.203201195515053
                                                                      Encrypted:false
                                                                      SSDEEP:3:ST3R095/lVhpIpMztamkb/C+lVVn:S7CIYH0VV
                                                                      MD5:A894008AEB6ED84CF1E8666352F38D0E
                                                                      SHA1:549310D1735DB12EE2ED6C9BEE63BD194CFD77C4
                                                                      SHA-256:60295DF584F97E660860939FC109029254BA5C383A641C980D78D9342E3456D6
                                                                      SHA-512:1838BE8BB098F2AC0C867C38B86DE3B1AAD7EC4BE593F24B641D9B9E54A7086CBBBBC9D0E4FFF8197C2C2D77CC0E38EE8D1313A6629D750A0988654B3B0BEEB5
                                                                      Malicious:false
                                                                      Preview:p...7...oy retne.........................._t...@...m./.........yC...Yz.@...m./..........?........m./.........._..m./.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):120
                                                                      Entropy (8bit):4.203201195515053
                                                                      Encrypted:false
                                                                      SSDEEP:3:ST3R095/lVhpIpMztamkb/C+lVVn:S7CIYH0VV
                                                                      MD5:A894008AEB6ED84CF1E8666352F38D0E
                                                                      SHA1:549310D1735DB12EE2ED6C9BEE63BD194CFD77C4
                                                                      SHA-256:60295DF584F97E660860939FC109029254BA5C383A641C980D78D9342E3456D6
                                                                      SHA-512:1838BE8BB098F2AC0C867C38B86DE3B1AAD7EC4BE593F24B641D9B9E54A7086CBBBBC9D0E4FFF8197C2C2D77CC0E38EE8D1313A6629D750A0988654B3B0BEEB5
                                                                      Malicious:false
                                                                      Preview:p...7...oy retne.........................._t...@...m./.........yC...Yz.@...m./..........?........m./.........._..m./.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):120
                                                                      Entropy (8bit):4.203201195515053
                                                                      Encrypted:false
                                                                      SSDEEP:3:ST3R095/lVhpIpMztamkb/C+lVVn:S7CIYH0VV
                                                                      MD5:A894008AEB6ED84CF1E8666352F38D0E
                                                                      SHA1:549310D1735DB12EE2ED6C9BEE63BD194CFD77C4
                                                                      SHA-256:60295DF584F97E660860939FC109029254BA5C383A641C980D78D9342E3456D6
                                                                      SHA-512:1838BE8BB098F2AC0C867C38B86DE3B1AAD7EC4BE593F24B641D9B9E54A7086CBBBBC9D0E4FFF8197C2C2D77CC0E38EE8D1313A6629D750A0988654B3B0BEEB5
                                                                      Malicious:false
                                                                      Preview:p...7...oy retne.........................._t...@...m./.........yC...Yz.@...m./..........?........m./.........._..m./.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):24
                                                                      Entropy (8bit):2.1431558784658327
                                                                      Encrypted:false
                                                                      SSDEEP:3:m+l:m
                                                                      MD5:54CB446F628B2EA4A5BCE5769910512E
                                                                      SHA1:C27CA848427FE87F5CF4D0E0E3CD57151B0D820D
                                                                      SHA-256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
                                                                      SHA-512:8F6ED2E91AED9BD415789B1DBE591E7EAB29F3F1B48FDFA5E864D7BF4AE554ACC5D82B4097A770DABC228523253623E4296C5023CF48252E1B94382C43123CB0
                                                                      Malicious:false
                                                                      Preview:0\r..m..................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):48
                                                                      Entropy (8bit):2.9972243200613975
                                                                      Encrypted:false
                                                                      SSDEEP:3:8KUAR0ECCwl:8KUA93Q
                                                                      MD5:2112EA53B53BC1259CC0F52527C5D467
                                                                      SHA1:36A8911CD8AF6769FD1FB5BD1D93EF7A23FDAA21
                                                                      SHA-256:76456BA1A5700874897CB90425342F669F70798A82B7FF30219C59E66511E005
                                                                      SHA-512:9C796F9B6A98B1A4B2D58812ED8633A381D43569AE1B739690C4EE099D4F6092586C2DCC49059FC3802B1D714280B4F697713CFDC0757A175EEFA7D1F1E6BC0A
                                                                      Malicious:false
                                                                      Preview:(...!7.[oy retne...........................m./.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):48
                                                                      Entropy (8bit):2.9972243200613975
                                                                      Encrypted:false
                                                                      SSDEEP:3:8KUAR0ECCwl:8KUA93Q
                                                                      MD5:2112EA53B53BC1259CC0F52527C5D467
                                                                      SHA1:36A8911CD8AF6769FD1FB5BD1D93EF7A23FDAA21
                                                                      SHA-256:76456BA1A5700874897CB90425342F669F70798A82B7FF30219C59E66511E005
                                                                      SHA-512:9C796F9B6A98B1A4B2D58812ED8633A381D43569AE1B739690C4EE099D4F6092586C2DCC49059FC3802B1D714280B4F697713CFDC0757A175EEFA7D1F1E6BC0A
                                                                      Malicious:false
                                                                      Preview:(...!7.[oy retne...........................m./.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
                                                                      Category:dropped
                                                                      Size (bytes):28672
                                                                      Entropy (8bit):0.4607860464659814
                                                                      Encrypted:false
                                                                      SSDEEP:24:TLi5YFQq3qh7z3WMYziciNW9WkZ96UwOfB/Pnx:TouQq3qh7z3bY2LNW9WMcUvBX
                                                                      MD5:EDC9B99EF8E974C5C88DF2AA3955F424
                                                                      SHA1:740A3AAF69FDFA90FC339F8BB5B7421D13262730
                                                                      SHA-256:3B8EBFF5E75B0C87AAE9F19883B58EB71FC9AC066DC3ED2A21C0876FF17DD099
                                                                      SHA-512:1289270F673507298124E602019B07EDD19A847AEABA1C274A3367918F62F2ECCCD9C6EC6AEEC942A96863FFAE02212BEFA959BD61C82E4BF530B670B599614A
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j..........g.....8...n................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.01057775872642915
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsFl:/F
                                                                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                      Malicious:false
                                                                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):270336
                                                                      Entropy (8bit):8.280239615765425E-4
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                                                                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                                                                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                                                                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                                                                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.011852361981932763
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsHlDll:/H
                                                                      MD5:0962291D6D367570BEE5454721C17E11
                                                                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.012340643231932763
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsGl3ll:/y
                                                                      MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):262512
                                                                      Entropy (8bit):9.553120663130604E-4
                                                                      Encrypted:false
                                                                      SSDEEP:3:LsNlOe:Ls3O
                                                                      MD5:0BB301B944489240BA898A405E7E0F36
                                                                      SHA1:24CE08B16528ADEBC88EF6E594858C444A0E6DE4
                                                                      SHA-256:9329F8B472F899ACA2A6D923BA4D98016021B40446EC7B906917B7ECA3F1B861
                                                                      SHA-512:877F372FAADE10A62D86D62CECD082AC1B82F186ACE3DC77642040EB0B76C0BB4BC5A581C765DD5BC114F42A827E63EC887D0CC20A5F1B72F752522756E55CA9
                                                                      Malicious:false
                                                                      Preview:.........................................+.m./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
                                                                      Category:dropped
                                                                      Size (bytes):32768
                                                                      Entropy (8bit):0.494709561094235
                                                                      Encrypted:false
                                                                      SSDEEP:24:TLEC30OIcqIn2o0FUFlA2cs0US5S693Xlej2:ThLaJUnAg0UB6I
                                                                      MD5:CF7760533536E2AF66EA68BC3561B74D
                                                                      SHA1:E991DE2EA8F42AE7E0A96A3B3B8AF87A689C8CCD
                                                                      SHA-256:E1F183FAE5652BA52F5363A7E28BF62B53E7781314C9AB76B5708AF9918BE066
                                                                      SHA-512:38B15FE7503F6DFF9D39BC74AA0150A7FF038029F973BE9A37456CDE6807BCBDEAB06E624331C8DFDABE95A5973B0EE26A391DB2587E614A37ADD50046470162
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j...i............t...c................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):38
                                                                      Entropy (8bit):1.8784775129881184
                                                                      Encrypted:false
                                                                      SSDEEP:3:FQxlXNQxlX:qTCT
                                                                      MD5:51A2CBB807F5085530DEC18E45CB8569
                                                                      SHA1:7AD88CD3DE5844C7FC269C4500228A630016AB5B
                                                                      SHA-256:1C43A1BDA1E458863C46DFAE7FB43BFB3E27802169F37320399B1DD799A819AC
                                                                      SHA-512:B643A8FA75EDA90C89AB98F79D4D022BB81F1F62F50ED4E5440F487F22D1163671EC3AE73C4742C11830214173FF2935C785018318F4A4CAD413AE4EEEF985DF
                                                                      Malicious:false
                                                                      Preview:.f.5................f.5...............
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):299
                                                                      Entropy (8bit):5.246665818775734
                                                                      Encrypted:false
                                                                      SSDEEP:6:N5A01wknaZ5eBERTbpaVdg2KLlL50aM+q2PwknaZ5eBERTbpaPrqIFUv:N2jrHeBERXHL1GaM+vYrHeBERXo3FUv
                                                                      MD5:28F8C1C73D58A78AEF02F17A4CDE234B
                                                                      SHA1:31E7760193A7510EAD506B36AEFA7B0029A6542E
                                                                      SHA-256:0BD368F38C4FED2F4337A6CFD086C5F6456519C526CCBE30C55C584F548FB8B3
                                                                      SHA-512:C24D98FDE89769977AAF6436C5C369D0DF1159DED94CB8F9F264E4BF2F559FB6A1A4FB8C83F7A2DD9FB4A6BBDB6F31E40FF2BA05E3306558720821362A01331E
                                                                      Malicious:false
                                                                      Preview:2024/08/29-15:11:02.281 1e8c Creating DB C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules since it was missing..2024/08/29-15:11:02.347 1e8c Reusing MANIFEST C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Rules/MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:OpenPGP Secret Key
                                                                      Category:dropped
                                                                      Size (bytes):41
                                                                      Entropy (8bit):4.704993772857998
                                                                      Encrypted:false
                                                                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                      Malicious:false
                                                                      Preview:.|.."....leveldb.BytewiseComparator......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):38
                                                                      Entropy (8bit):1.8784775129881184
                                                                      Encrypted:false
                                                                      SSDEEP:3:FQxlXNQxlX:qTCT
                                                                      MD5:51A2CBB807F5085530DEC18E45CB8569
                                                                      SHA1:7AD88CD3DE5844C7FC269C4500228A630016AB5B
                                                                      SHA-256:1C43A1BDA1E458863C46DFAE7FB43BFB3E27802169F37320399B1DD799A819AC
                                                                      SHA-512:B643A8FA75EDA90C89AB98F79D4D022BB81F1F62F50ED4E5440F487F22D1163671EC3AE73C4742C11830214173FF2935C785018318F4A4CAD413AE4EEEF985DF
                                                                      Malicious:false
                                                                      Preview:.f.5................f.5...............
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):303
                                                                      Entropy (8bit):5.249606590589156
                                                                      Encrypted:false
                                                                      SSDEEP:6:N5GjZc1wknaZ5eBERTbp6FB2KLlL5GM+q2PwknaZ5eBERTbp65IFUv:NYZ7rHeBERXQFFL1gM+vYrHeBERXQWF2
                                                                      MD5:3541A6435A0A6C8CEEFA03BF66FB39E6
                                                                      SHA1:27710DF2BBAFC0B2CB4A091868C5F83EDA008D3D
                                                                      SHA-256:941376AA81DECC01727EBD531EE38784C75FBC674C2C2A2E8BC697DCBDF41B5A
                                                                      SHA-512:6FF9862F492CE1DC36526BBD346696E88E51440C67486831B945037331C7DC135CEAD5A1E0EB06111AD355F9654F5F789D506C46A93849A6C0AF6D0CA6E9CEF0
                                                                      Malicious:false
                                                                      Preview:2024/08/29-15:11:02.544 1e8c Creating DB C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts since it was missing..2024/08/29-15:11:02.553 1e8c Reusing MANIFEST C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension Scripts/MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:OpenPGP Secret Key
                                                                      Category:dropped
                                                                      Size (bytes):41
                                                                      Entropy (8bit):4.704993772857998
                                                                      Encrypted:false
                                                                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                      Malicious:false
                                                                      Preview:.|.."....leveldb.BytewiseComparator......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):114
                                                                      Entropy (8bit):1.8784775129881184
                                                                      Encrypted:false
                                                                      SSDEEP:3:FQxlXNQxlXNQxlXNQxlXNQxlXNQxlX:qTCTCTCTCTCT
                                                                      MD5:891A884B9FA2BFF4519F5F56D2A25D62
                                                                      SHA1:B54A3C12EE78510CB269FB1D863047DD8F571DEA
                                                                      SHA-256:E2610960C3757D1757F206C7B84378EFA22D86DCF161A98096A5F0E56E1A367E
                                                                      SHA-512:CD50C3EE4DFB9C4EC051B20DD1E148A5015457EE0C1A29FFF482E62291B32097B07A069DB62951B32F209FD118FD77A46B8E8CC92DA3EAAE6110735D126A90EE
                                                                      Malicious:false
                                                                      Preview:.f.5................f.5................f.5................f.5................f.5................f.5...............
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):299
                                                                      Entropy (8bit):5.236766762211174
                                                                      Encrypted:false
                                                                      SSDEEP:6:N5k01wknaZ5eBERTbpYg2KLlL5GM+q2PwknaZ5eBERTbpNIFUv:N2jrHeBERXNL14M+vYrHeBERXwFUv
                                                                      MD5:341BE6D7C86B8585E0C23EC4223C39B7
                                                                      SHA1:6CEE943E7123B3625C9F94C194F4D3CC6459BAD6
                                                                      SHA-256:6A56F135053E4479C19DDDC9C75A3128BAB3BD84BA83642446DD7A76952671DD
                                                                      SHA-512:A841C13346297E5D504E40101CC2CB23AB9169A47305F372E3544AF093603F916B8F7EA4EAC32838F0C98AE485E3C333013180BCEE513C3516A5FF5B6D29EBCC
                                                                      Malicious:false
                                                                      Preview:2024/08/29-15:11:02.696 1e8c Creating DB C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State since it was missing..2024/08/29-15:11:02.711 1e8c Reusing MANIFEST C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Extension State/MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:OpenPGP Secret Key
                                                                      Category:dropped
                                                                      Size (bytes):41
                                                                      Entropy (8bit):4.704993772857998
                                                                      Encrypted:false
                                                                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                      Malicious:false
                                                                      Preview:.|.."....leveldb.BytewiseComparator......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
                                                                      Category:dropped
                                                                      Size (bytes):4096
                                                                      Entropy (8bit):0.3169096321222068
                                                                      Encrypted:false
                                                                      SSDEEP:3:lSWbNFl/sl+ltl4ltllOl83/XWEEabIDWzdWuAzTgdWj3FtFIU:l9bNFlEs1ok8fDEPDadUTgd81Z
                                                                      MD5:2554AD7847B0D04963FDAE908DB81074
                                                                      SHA1:F84ABD8D05D7B0DFB693485614ECF5204989B74A
                                                                      SHA-256:F6EF01E679B9096A7D8A0BD8151422543B51E65142119A9F3271F25F966E6C42
                                                                      SHA-512:13009172518387D77A67BBF86719527077BE9534D90CB06E7F34E1CCE7C40B49A185D892EE859A8BAFB69D5EBB6D667831A0FAFBA28AC1F44570C8B68F8C90A4
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
                                                                      Category:dropped
                                                                      Size (bytes):32768
                                                                      Entropy (8bit):0.40981274649195937
                                                                      Encrypted:false
                                                                      SSDEEP:24:TL1WK3iOvwxwwweePKmJIOAdQBVA/kjo/TJZwJ9OV3WOT/5eQQ:Tmm+/9ZW943WOT/
                                                                      MD5:1A7F642FD4F71A656BE75B26B2D9ED79
                                                                      SHA1:51BBF587FB0CCC2D726DDB95C96757CC2854CFAD
                                                                      SHA-256:B96B6DDC10C29496069E16089DB0AB6911D7C13B82791868D583897C6D317977
                                                                      SHA-512:FD14EADCF5F7AB271BE6D8EF682977D1A0B5199A142E4AB353614F2F96AE9B49A6F35A19CC237489F297141994A4A16B580F88FAC44486FCB22C05B2F1C3F7D1
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j............M.....8...b..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
                                                                      Category:dropped
                                                                      Size (bytes):20480
                                                                      Entropy (8bit):0.6975083372685086
                                                                      Encrypted:false
                                                                      SSDEEP:24:LLiZxh0GY/l1rWR1PmCx9fZjsBX+T6UwcE85fBmI:EBmw6fU1zBmI
                                                                      MD5:F5BBD8449A9C3AB28AC2DE45E9059B01
                                                                      SHA1:C569D730853C33234AF2402E69C19E0C057EC165
                                                                      SHA-256:825FF36C4431084C76F3D22CE0C75FA321EA680D1F8548706B43E60FCF5B566E
                                                                      SHA-512:96ACDED5A51236630A64FAE91B8FA9FAB43E22E0C1BCB80C2DD8D4829E03FBFA75AA6438053599A42EC4BBCF805BF0B1E6DFF9069B2BA182AD0BB30F2542FD3F
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j..........g....._.c...~.2.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................s...;+...indexfavicon_bitmaps_icon_idfavico
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.01057775872642915
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsFl:/F
                                                                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                      Malicious:false
                                                                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):270336
                                                                      Entropy (8bit):8.280239615765425E-4
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                                                                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                                                                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                                                                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                                                                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.011852361981932763
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsHlDll:/H
                                                                      MD5:0962291D6D367570BEE5454721C17E11
                                                                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.012340643231932763
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsGl3ll:/y
                                                                      MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):262512
                                                                      Entropy (8bit):9.553120663130604E-4
                                                                      Encrypted:false
                                                                      SSDEEP:3:LsNlLa:Ls3La
                                                                      MD5:51434BE69836D1D5DD8039CA50250030
                                                                      SHA1:F50BAA013124AF51CD847A5164A2A42347DC5F96
                                                                      SHA-256:E8ACE6CE1B80AAFE3BCA4D493B146D0E84D59ADA56DF4E0EE95C11B7664AE09C
                                                                      SHA-512:9F66152DC710F1A65A9381489B4C536A6B704290B080763E85BD0EBBD916C81CD1651B5822233473F0706B765B0DC3F5EF4DBD8501E7089F3CDA663AF6154180
                                                                      Malicious:false
                                                                      Preview:........................................uJ.m./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
                                                                      Category:dropped
                                                                      Size (bytes):155648
                                                                      Entropy (8bit):0.5701469749821385
                                                                      Encrypted:false
                                                                      SSDEEP:96:+lON5XXWyejzH+bDoYysX0IxQztkHtpVJNlYDLjGQLBE3CeE0kEpFOI:+lOvXmhH+bDo3iN0t2TVJkXBBE3ybXI
                                                                      MD5:2C8E2472325F9B5D5435A01884648B14
                                                                      SHA1:3C0178D28D1B0156F4F39AB13B327E225B91DB7D
                                                                      SHA-256:A2733782F4A4C3B520B7088BE2E0E66EB2E0D1A396F79508217ED8AF8BE87553
                                                                      SHA-512:C7922C51120483C314AD0208F59DC441989096251CB66075BF1014059145DF555A10F7C5CD95ACD3DD7BF1241417BF47EB228D528D88C250F14C074CA4BC5789
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8720
                                                                      Entropy (8bit):0.21861961848037045
                                                                      Encrypted:false
                                                                      SSDEEP:3:zsllZllntFlljq7A/mhWJFuQ3yy7IOWUaDol/dweytllrE9SFcTp4AGbNCV9RUI/:AZlG75fOID4/d0Xi99pEYp
                                                                      MD5:56F72D55683AEA8C2ABB6CBA5F4FC108
                                                                      SHA1:C8F55A8B32E47EC0799A4530FEF2A3947BDBEB4D
                                                                      SHA-256:BC409EB89E735C929A969173FD3372AC463F4CDED32FF2D65577BFDD4FD49A4F
                                                                      SHA-512:2B9B5B314C7976CA848D034D1F03B8F8818984A77CDC507417D91C632ADB8E7B48E91E1AA74E8B9F0195A5CD738FE7CDB025A4727C1110C10E1FED313AC67327
                                                                      Malicious:false
                                                                      Preview:.............?.I...&....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):311
                                                                      Entropy (8bit):5.315316471268725
                                                                      Encrypted:false
                                                                      SSDEEP:6:N5kCusFB1wknaZ5eBERTb1a2jM8B2KLlL5+HN+q2PwknaZ5eBERTb1a2jMGIFUv:NqC4rHeBERX1jFL1K+vYrHeBERX1EFUv
                                                                      MD5:5622766E2DFAD88A49DCF7C52431F50F
                                                                      SHA1:77E40C067882FF8E229FE8B9658801742960CF40
                                                                      SHA-256:E4F20C0316E02EBAB74BEC63B7424FB143A056D9674EED8243F2BD167C76E4D7
                                                                      SHA-512:576E66C3986230103794156597D5E820C0768E49C12CD49E8D20597FC2CDED08FDFAA99280EF3741284892D82D04FA5BF13B4048C898CB6B6BCC2168683665E9
                                                                      Malicious:false
                                                                      Preview:2024/08/29-15:11:03.227 1fdc Creating DB C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Local Storage\leveldb since it was missing..2024/08/29-15:11:03.307 1fdc Reusing MANIFEST C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Local Storage\leveldb/MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:OpenPGP Secret Key
                                                                      Category:dropped
                                                                      Size (bytes):41
                                                                      Entropy (8bit):4.704993772857998
                                                                      Encrypted:false
                                                                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                      Malicious:false
                                                                      Preview:.|.."....leveldb.BytewiseComparator......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie 0xc, schema 4, UTF-8, version-valid-for 1
                                                                      Category:dropped
                                                                      Size (bytes):43008
                                                                      Entropy (8bit):0.9009435143901008
                                                                      Encrypted:false
                                                                      SSDEEP:96:C2BeymwLCn8MouB6wzFlXqiEqUvJKLuyn:C2TLG7IwRFqidn
                                                                      MD5:FB3D677576C25FF04A308A1F627410B7
                                                                      SHA1:97D530911F9CB0C37717ABB145D748982ADA0440
                                                                      SHA-256:A79300470D18AF26E3C5B4F23F81915B92D490105CE84A8122BF8100EC0C7517
                                                                      SHA-512:ED6666B064958B107E55BD76E52D2E5BF7A4791379902D208EF909A6B68803240D372CE03641249EB917C241B36A5684656A48D099A8A084AD34BA009857B098
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
                                                                      Category:dropped
                                                                      Size (bytes):45056
                                                                      Entropy (8bit):0.40293591932113104
                                                                      Encrypted:false
                                                                      SSDEEP:24:TLVgTjDk5Yk8k+/kCkzD3zzbLGfIzLihje90xq/WMFFfeFzfXVVlYWOT/CUFSe:Tmo9n+8dv/qALihje9kqL42WOT/9F
                                                                      MD5:ADC0CFB8A1A20DE2C4AB738B413CBEA4
                                                                      SHA1:238EF489E5FDC6EBB36F09D415FB353350E7097B
                                                                      SHA-256:7C071E36A64FB1881258712C9880F155D9CBAC693BADCC391A1CB110C257CC37
                                                                      SHA-512:38C8B7293B8F7BEF03299BAFB981EEEE309945B1BDE26ACDAD6FDD63247C21CA04D493A1DDAFC3B9A1904EFED998E9C7C0C8E98506FD4AC0AB252DFF34566B66
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j.......=......\.t.+.>...,...=........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):2
                                                                      Entropy (8bit):1.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:H:H
                                                                      MD5:D751713988987E9331980363E24189CE
                                                                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                      Malicious:false
                                                                      Preview:[]
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):59
                                                                      Entropy (8bit):4.619434150836742
                                                                      Encrypted:false
                                                                      SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                                                                      MD5:2800881C775077E1C4B6E06BF4676DE4
                                                                      SHA1:2873631068C8B3B9495638C865915BE822442C8B
                                                                      SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                                                                      SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                                                                      Malicious:false
                                                                      Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):569
                                                                      Entropy (8bit):5.28753185509679
                                                                      Encrypted:false
                                                                      SSDEEP:12:YHO8sqfDdCWsBZbB6r4bn8sqfoDSsBZbB6r4vpG7E4T3y:YXsyDEZlO4YsySXZlO4w7nby
                                                                      MD5:B04D969BAC3DC11EEB498E0DF848D731
                                                                      SHA1:837C988A5C67F86B18C957077F35D2E1CB8F413A
                                                                      SHA-256:D8DCDD2E175E15D37F01C66A7360C90988CF81D7824E6EA3A4FDD543C83C73F7
                                                                      SHA-512:05400E67EB9636ECACACE412A28EF7216C78934C84734AB3BA9FE0E8598C2B613D38B73A9AC4811AF3303821747412D57ECEE863F2352EF75EF4770BD1BAE61B
                                                                      Malicious:false
                                                                      Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13372024265368588","port":443,"protocol_str":"quic"}],"anonymization":["HAAAABYAAABodHRwOi8vd2FpbHMubG9jYWxob3N0AAA=",false],"server":"https://fonts.googleapis.com"},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13372024266581777","port":443,"protocol_str":"quic"}],"anonymization":["HAAAABYAAABodHRwOi8vd2FpbHMubG9jYWxob3N0AAA=",false],"server":"https://fonts.gstatic.com"}],"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                      Category:dropped
                                                                      Size (bytes):20480
                                                                      Entropy (8bit):0.6732424250451717
                                                                      Encrypted:false
                                                                      SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                      MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                      SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                      SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                      SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):59
                                                                      Entropy (8bit):4.619434150836742
                                                                      Encrypted:false
                                                                      SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                                                                      MD5:2800881C775077E1C4B6E06BF4676DE4
                                                                      SHA1:2873631068C8B3B9495638C865915BE822442C8B
                                                                      SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                                                                      SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                                                                      Malicious:false
                                                                      Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):59
                                                                      Entropy (8bit):4.619434150836742
                                                                      Encrypted:false
                                                                      SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                                                                      MD5:2800881C775077E1C4B6E06BF4676DE4
                                                                      SHA1:2873631068C8B3B9495638C865915BE822442C8B
                                                                      SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                                                                      SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                                                                      Malicious:false
                                                                      Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 5
                                                                      Category:dropped
                                                                      Size (bytes):36864
                                                                      Entropy (8bit):0.7108509142622531
                                                                      Encrypted:false
                                                                      SSDEEP:48:TKIopKWurJNVr1GJmA8pv82pfurJNVrdHXuccaurJN2VrJ1n4n1GmzNGU1cSB3Wm:eIEumQv8m1ccnvS6N
                                                                      MD5:B21F4A05EA369FB305D76FFCC72D9966
                                                                      SHA1:16B5232136E2995EE7A8FC20755E659FC39D3AF7
                                                                      SHA-256:75621D3A43E140CDE4E1C38EF104066043B01437F9D56281C0A80E41E3F2A825
                                                                      SHA-512:5C13C2A65711C65B56DB478735B8930795B1AC7B77F0729A94BC1A00C9E7143AB1DFCD1355C9F07F9BFF8BC88A405B715F346CA49607977BFC47320624B4E240
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j..........g...D.........7............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):2
                                                                      Entropy (8bit):1.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:H:H
                                                                      MD5:D751713988987E9331980363E24189CE
                                                                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                      Malicious:false
                                                                      Preview:[]
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):2
                                                                      Entropy (8bit):1.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:H:H
                                                                      MD5:D751713988987E9331980363E24189CE
                                                                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                      Malicious:false
                                                                      Preview:[]
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):40
                                                                      Entropy (8bit):4.1275671571169275
                                                                      Encrypted:false
                                                                      SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                                                                      MD5:20D4B8FA017A12A108C87F540836E250
                                                                      SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                                                                      SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                                                                      SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                                                                      Malicious:false
                                                                      Preview:{"SDCH":{"dictionaries":{},"version":2}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
                                                                      Category:dropped
                                                                      Size (bytes):36864
                                                                      Entropy (8bit):0.36515621748816035
                                                                      Encrypted:false
                                                                      SSDEEP:24:TLH3lIIAoDJ84l5lDlnDMlRlyKDtM6UwccWfp15fBIe:Tb31DtX5nDOvyKDhU1cSB
                                                                      MD5:25363ADC3C9D98BAD1A33D0792405CBF
                                                                      SHA1:D06E343087D86EF1A06F7479D81B26C90A60B5C3
                                                                      SHA-256:6E019B8B9E389216D5BDF1F2FE63F41EF98E71DA101F2A6BE04F41CC5954532D
                                                                      SHA-512:CF7EEE35D0E00945AF221BEC531E8BF06C08880DA00BD103FA561BC069D7C6F955CBA3C1C152A4884601E5A670B7487D39B4AE9A4D554ED8C14F129A74E555F7
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j.......X..g...}.....$.X..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):40
                                                                      Entropy (8bit):4.1275671571169275
                                                                      Encrypted:false
                                                                      SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                                                                      MD5:20D4B8FA017A12A108C87F540836E250
                                                                      SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                                                                      SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                                                                      SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                                                                      Malicious:false
                                                                      Preview:{"SDCH":{"dictionaries":{},"version":2}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):2
                                                                      Entropy (8bit):1.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:H:H
                                                                      MD5:D751713988987E9331980363E24189CE
                                                                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                      Malicious:false
                                                                      Preview:[]
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):6105
                                                                      Entropy (8bit):4.816653208935823
                                                                      Encrypted:false
                                                                      SSDEEP:96:stE/vpfs13Nb9E0G8zo85eh6Cb7/x+6MhmuecWb1eAeQdw2MR7K:stIvFsTGko88bV+FSbQASPhK
                                                                      MD5:FB7F8FBBFB3233FF27D1CBB9FCA017BC
                                                                      SHA1:D99899177FD52CE67F4BB9B69941D079E23A6AF6
                                                                      SHA-256:F413B9993C4E367F7174F65A749167BCDE4FCF0E040CB5B9BF1D7D285140685C
                                                                      SHA-512:3846B6C37EA464E326AB96B63C4CB03F95205B16FE8344970DFAB4BBBDDCFB63343FDC2761B8125E990299CA9BF017100498F642F97F0C6BCAE543EA0BD9B61A
                                                                      Malicious:false
                                                                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369432262628299","alternate_error_pages":{"backup":true,"enabled":false},"autocomplete":{"retention_policy_last_version":117},"autofill":{"autostuff_enabled":false,"credit_card_enabled":false,"custom_data_enabled":false,"custom_data_fill_enabled":false,"custom_data_identify_info_from_form_enabled":false,"custom_data_save_enabled":false},"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"browser_content_container_height":729,"browser_content_container_width":1008,"browser_content_container_x":0,"browser_content_container_y":0,"countryid_at_install":17224,"credentials_enable_service":false,"dips_timer_last_update":"13369432262565597","domain_diversity":{"last_reporting_timestamp":"13369432262627408"},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data"
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):6105
                                                                      Entropy (8bit):4.816653208935823
                                                                      Encrypted:false
                                                                      SSDEEP:96:stE/vpfs13Nb9E0G8zo85eh6Cb7/x+6MhmuecWb1eAeQdw2MR7K:stIvFsTGko88bV+FSbQASPhK
                                                                      MD5:FB7F8FBBFB3233FF27D1CBB9FCA017BC
                                                                      SHA1:D99899177FD52CE67F4BB9B69941D079E23A6AF6
                                                                      SHA-256:F413B9993C4E367F7174F65A749167BCDE4FCF0E040CB5B9BF1D7D285140685C
                                                                      SHA-512:3846B6C37EA464E326AB96B63C4CB03F95205B16FE8344970DFAB4BBBDDCFB63343FDC2761B8125E990299CA9BF017100498F642F97F0C6BCAE543EA0BD9B61A
                                                                      Malicious:false
                                                                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369432262628299","alternate_error_pages":{"backup":true,"enabled":false},"autocomplete":{"retention_policy_last_version":117},"autofill":{"autostuff_enabled":false,"credit_card_enabled":false,"custom_data_enabled":false,"custom_data_fill_enabled":false,"custom_data_identify_info_from_form_enabled":false,"custom_data_save_enabled":false},"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"browser_content_container_height":729,"browser_content_container_width":1008,"browser_content_container_x":0,"browser_content_container_y":0,"countryid_at_install":17224,"credentials_enable_service":false,"dips_timer_last_update":"13369432262565597","domain_diversity":{"last_reporting_timestamp":"13369432262627408"},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data"
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):6105
                                                                      Entropy (8bit):4.816653208935823
                                                                      Encrypted:false
                                                                      SSDEEP:96:stE/vpfs13Nb9E0G8zo85eh6Cb7/x+6MhmuecWb1eAeQdw2MR7K:stIvFsTGko88bV+FSbQASPhK
                                                                      MD5:FB7F8FBBFB3233FF27D1CBB9FCA017BC
                                                                      SHA1:D99899177FD52CE67F4BB9B69941D079E23A6AF6
                                                                      SHA-256:F413B9993C4E367F7174F65A749167BCDE4FCF0E040CB5B9BF1D7D285140685C
                                                                      SHA-512:3846B6C37EA464E326AB96B63C4CB03F95205B16FE8344970DFAB4BBBDDCFB63343FDC2761B8125E990299CA9BF017100498F642F97F0C6BCAE543EA0BD9B61A
                                                                      Malicious:false
                                                                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369432262628299","alternate_error_pages":{"backup":true,"enabled":false},"autocomplete":{"retention_policy_last_version":117},"autofill":{"autostuff_enabled":false,"credit_card_enabled":false,"custom_data_enabled":false,"custom_data_fill_enabled":false,"custom_data_identify_info_from_form_enabled":false,"custom_data_save_enabled":false},"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"browser_content_container_height":729,"browser_content_container_width":1008,"browser_content_container_x":0,"browser_content_container_y":0,"countryid_at_install":17224,"credentials_enable_service":false,"dips_timer_last_update":"13369432262565597","domain_diversity":{"last_reporting_timestamp":"13369432262627408"},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data"
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):33
                                                                      Entropy (8bit):4.051821770808046
                                                                      Encrypted:false
                                                                      SSDEEP:3:YVXADAEvTLSJ:Y9AcEvHSJ
                                                                      MD5:2B432FEF211C69C745ACA86DE4F8E4AB
                                                                      SHA1:4B92DA8D4C0188CF2409500ADCD2200444A82FCC
                                                                      SHA-256:42B55D126D1E640B1ED7A6BDCB9A46C81DF461FA7E131F4F8C7108C2C61C14DE
                                                                      SHA-512:948502DE4DC89A7E9D2E1660451FCD0F44FD3816072924A44F145D821D0363233CC92A377DBA3A0A9F849E3C17B1893070025C369C8120083A622D025FE1EACF
                                                                      Malicious:false
                                                                      Preview:{"preferred_apps":[],"version":1}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):182
                                                                      Entropy (8bit):4.2629097520179995
                                                                      Encrypted:false
                                                                      SSDEEP:3:RGXKRjg0QwVIWRKXECSAV6jDyhjgHGAW+LB2Z4MKLFE1SwhiFAfXQmWyKBPMwRgK:z3frsUpAQQgHGwB26MK8Sw06fXQmWtRT
                                                                      MD5:643E00B0186AA80523F8A6BED550A925
                                                                      SHA1:EC4056125D6F1A8890FFE01BFFC973C2F6ABD115
                                                                      SHA-256:A0C9ABAE18599F0A65FC654AD36251F6330794BEA66B718A09D8B297F3E38E87
                                                                      SHA-512:D91A934EAF7D9D669B8AD4452234DE6B23D15237CB4D251F2C78C8339CEE7B4F9BA6B8597E35FE8C81B3D6F64AE707C68FF492903C0EDC3E4BAF2C6B747E247D
                                                                      Malicious:false
                                                                      Preview:Microsoft Edge settings and storage represent user-selected preferences and information and MUST not be extracted, overwritten or modified except through Microsoft Edge defined APIs.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):6780
                                                                      Entropy (8bit):5.580776730684396
                                                                      Encrypted:false
                                                                      SSDEEP:96:voiAPlf/ROoBpkF5d1uiL7VaTEv9V5h5pg5vezodIU8alSpsA5IOrMn3YPo0MG6R:BkrGN9l5cSpFIOAn3go0iuG
                                                                      MD5:6303EA5D75A55BBA2172BF4607F3364E
                                                                      SHA1:70EBB3CA805BC33D7E27B9B9B1D196A7C097EA5F
                                                                      SHA-256:A7326D5CEFD59D4A412E5F98B0C597E54935CB8B92AADAB6FEC9CA00FE52895D
                                                                      SHA-512:5D794FB22C2B4031DE0D734B7D9F8252B4CF2D6F15C42E3AF0EBD0B75772E8E01FC542CFB11E4E6F84ECA0BF2B7E22F835DD5A515E78DE7AC18C47374C0DC5E6
                                                                      Malicious:false
                                                                      Preview:{"extensions":{"settings":{"dgiklkfkllikcanfonkcabmbdfmgleag":{"active_permissions":{"api":[],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369432262268273","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369432262268273","location":5,"manifest":{"content_capabilities":{"include_globs":["https://*excel.officeapps.live.com/*","https://*onenote.officeapps.live.com/*","https://*powerpoint.officeapps.live.com/*","https://*word-edit.officeapps.live.com/*","https://*excel.officeapps.live.com.mcas.ms/*","https://*onenote.officeapps.live.com.mcas.ms/*","https://*word-edit.officeapps.live.com.mcas.ms/*","https://*excel.partner.officewebapps.cn/*","https://*onenote.partner.officewebapps.cn/*","https://*powerpoint.partner.officewebapps.cn/*","https://*word-edit.partner.officewebapps.cn/*","https://*excel.gov.online.office365.us/*","
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:modified
                                                                      Size (bytes):150
                                                                      Entropy (8bit):5.029693817257337
                                                                      Encrypted:false
                                                                      SSDEEP:3:S8ltHlS+QUl1ASEGVdllajEGOyogATQ8c48EIWgJNNv:S85aQla4zyoXTPDIWgDNv
                                                                      MD5:9A3DBEF8FA326246CAE0BFC5B462CBF2
                                                                      SHA1:B46770B5733A18E878F564054F8385F6ACCCEA80
                                                                      SHA-256:8254B8E2F0A1DF0C2675BFD87DF2299D3F0799A270B34A767C70C4C558A5FFBB
                                                                      SHA-512:4047B05D1E9BF3174BEF9BA8B23F9A7EDA78C5C6E0418B8B01F5F3F286E03D44B00D63135ED13D89FA22BED51AC7B2CCA02E2C7C85F787AF724EDB48BEF387D8
                                                                      Malicious:false
                                                                      Preview:*...#................version.1..namespace-.#.\e................next-map-id.1.Fnamespace-fb0db16c_f8ac_4b93_be28_8652edcd7900-http://wails.localhost/.0
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):299
                                                                      Entropy (8bit):5.244132486382261
                                                                      Encrypted:false
                                                                      SSDEEP:6:N5MIs1wknaZ5eBERTbWQM72KLlL5Kf+q2PwknaZ5eBERTbWQMxIFUv:NCILrHeBERXIL1pvYrHeBERXHFUv
                                                                      MD5:BF1B4B3D2A4F3655B256A9B4529CBA14
                                                                      SHA1:A19D5FEDFAFC1268750A5A6872B4EA7FD7AD4B90
                                                                      SHA-256:CCF2D000809BC5C783F03CD2BD154B6C95F3E0C2D66024AF5910B9615E364666
                                                                      SHA-512:6F3C3DD4A5567C952AA8180F87D7778C4F8FBFFED19A225F8D7B39AF628144B00FD353EE9CFFB9CD7AC965E255E922E8AAC5A7F6DFFC0FE9F17B0294D8FCAB4C
                                                                      Malicious:false
                                                                      Preview:2024/08/29-15:11:03.334 1fe8 Creating DB C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage since it was missing..2024/08/29-15:11:03.356 1fe8 Reusing MANIFEST C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Session Storage/MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:OpenPGP Secret Key
                                                                      Category:dropped
                                                                      Size (bytes):41
                                                                      Entropy (8bit):4.704993772857998
                                                                      Encrypted:false
                                                                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                      Malicious:false
                                                                      Preview:.|.."....leveldb.BytewiseComparator......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):40
                                                                      Entropy (8bit):3.473726825238924
                                                                      Encrypted:false
                                                                      SSDEEP:3:41tt0diERGn:et084G
                                                                      MD5:148079685E25097536785F4536AF014B
                                                                      SHA1:C5FF5B1B69487A9DD4D244D11BBAFA91708C1A41
                                                                      SHA-256:F096BC366A931FBA656BDCD77B24AF15A5F29FC53281A727C79F82C608ECFAB8
                                                                      SHA-512:C2556034EA51ABFBC172EB62FF11F5AC45C317F84F39D4B9E3DDBD0190DA6EF7FA03FE63631B97AB806430442974A07F8E81B5F7DC52D9F2FCDC669ADCA8D91F
                                                                      Malicious:false
                                                                      Preview:.On.!................database_metadata.1
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):327
                                                                      Entropy (8bit):5.207795911064457
                                                                      Encrypted:false
                                                                      SSDEEP:6:N5uVXs1wknaZ5eBERTbUUh2gr52KLlL5lL+q2PwknaZ5eBERTbUUh2ghZIFUv:NwVXLrHeBERXrhHJL1HL+vYrHeBERXrH
                                                                      MD5:CA5FFAF5854AA6AB3A50CA6BDD2869BE
                                                                      SHA1:3D60603046CC27115C0A4BA13DA7990236163298
                                                                      SHA-256:9BF96EF46949D6F7BD72352A7D961BF5916EA53F4E4CF19890AAC5DDB193F09F
                                                                      SHA-512:BB13D6DEA97D24DA63D15566650E2097FEF51F86E8789483065C0F9BA251EFD85813AA59D73014924DE2C809D283800EEB2BD6CAF3C2932A66FEFFAFE2BCC739
                                                                      Malicious:false
                                                                      Preview:2024/08/29-15:11:02.255 1e3c Creating DB C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database since it was missing..2024/08/29-15:11:02.462 1e3c Reusing MANIFEST C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Site Characteristics Database/MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:OpenPGP Secret Key
                                                                      Category:dropped
                                                                      Size (bytes):41
                                                                      Entropy (8bit):4.704993772857998
                                                                      Encrypted:false
                                                                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                      Malicious:false
                                                                      Preview:.|.."....leveldb.BytewiseComparator......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):46
                                                                      Entropy (8bit):4.019797536844534
                                                                      Encrypted:false
                                                                      SSDEEP:3:sLollttz6sjlGXU2tkn:qolXtWswXU2tkn
                                                                      MD5:90881C9C26F29FCA29815A08BA858544
                                                                      SHA1:06FEE974987B91D82C2839A4BB12991FA99E1BDD
                                                                      SHA-256:A2CA52E34B6138624AC2DD20349CDE28482143B837DB40A7F0FBDA023077C26A
                                                                      SHA-512:15F7F8197B4FC46C4C5C2570FB1F6DD73CB125F9EE53DFA67F5A0D944543C5347BDAB5CCE95E91DD6C948C9023E23C7F9D76CFF990E623178C92F8D49150A625
                                                                      Malicious:false
                                                                      Preview:...n'................_mts_schema_descriptor...
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):303
                                                                      Entropy (8bit):5.320206041545115
                                                                      Encrypted:false
                                                                      SSDEEP:6:N5EZhM1wknaZ5eBERTbgx2KLlL5Nlyq2PwknaZ5eBERTbWIFUv:NOZhrrHeBERXgVL19yvYrHeBERXPFUv
                                                                      MD5:7AACE87B0F6B92B2CB51A0EE38B73102
                                                                      SHA1:A7660A95F1E52F70FAAB579CAE96FBFBD7AA88F7
                                                                      SHA-256:085A6818A9DE4BA86EFE3EA13EB7B69CCCCAA812E5D8A042FDFBF2BEB37C1735
                                                                      SHA-512:C3D4A4978BA3065551E0AF1340D6F3A4C8B1F454E02FF13EFF4A4B7E7428314AE8650E3A6ECB878974FF7BE3F041D5768ABBAB085882C34DBB460C2BC7DC2863
                                                                      Malicious:false
                                                                      Preview:2024/08/29-15:11:02.601 1e34 Creating DB C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB since it was missing..2024/08/29-15:11:02.649 1e34 Reusing MANIFEST C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\Sync Data\LevelDB/MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:OpenPGP Secret Key
                                                                      Category:dropped
                                                                      Size (bytes):41
                                                                      Entropy (8bit):4.704993772857998
                                                                      Encrypted:false
                                                                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                      Malicious:false
                                                                      Preview:.|.."....leveldb.BytewiseComparator......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
                                                                      Category:dropped
                                                                      Size (bytes):20480
                                                                      Entropy (8bit):0.3528485475628876
                                                                      Encrypted:false
                                                                      SSDEEP:12:TLiN6CZhDu6MvDOF5yEHFxOUwa5qguYZ75fOSiPe2d:TLiwCZwE8I6Uwcco5fBtC
                                                                      MD5:F2B4FB2D384AA4E4D6F4AEB0BBA217DC
                                                                      SHA1:2CD70CFB3CE72D9B079170C360C1F563B6BF150E
                                                                      SHA-256:1ECC07CD1D383472DAD33D2A5766625009EA5EACBAEDE2417ADA1842654CBBC8
                                                                      SHA-512:48D03991660FA1598B3E002F5BC5F0F05E9696BCB2289240FA8CCBB2C030CDD23245D4ECC0C64DA1E7C54B092C3E60AE0427358F63087018BF0E6CEDC471DD34
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j..........g.....4....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):131072
                                                                      Entropy (8bit):0.0032362295108629476
                                                                      Encrypted:false
                                                                      SSDEEP:3:ImtVu/TCdYQ0/:IiVubCG
                                                                      MD5:34099300F5F52DDC1704BE05204BA690
                                                                      SHA1:4208125C217F76A1062B133132DB48D85EACB73A
                                                                      SHA-256:0B841FC922C2916957DEDD4406F703164D4B4BEA5155AB40ACFC1383CEA816EA
                                                                      SHA-512:451671E551F2C424C826804F77B48836BCA44BB942BC441B2065CC6D91E900FE76804CC750164607288C6697025C107982B6D0CFC1021D4F2652C7110C6BEC52
                                                                      Malicious:false
                                                                      Preview:VLnk.....?..........'.r................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie 0x36, schema 4, UTF-8, version-valid-for 3
                                                                      Category:dropped
                                                                      Size (bytes):178176
                                                                      Entropy (8bit):0.9328712687751187
                                                                      Encrypted:false
                                                                      SSDEEP:192:R2qAdB9TbTbuDDsnxCkvSAE+WslKOMq+c:R2qOB1nxCkvSAELyKOMq+c
                                                                      MD5:6B2D5ED0A90C99FD05D58FE8E924C886
                                                                      SHA1:34E1103E18E57E9D1769C89DFB2DAD84BFDD54B5
                                                                      SHA-256:2873E973AB5B91CD07405FD5D35E2A843A408AD53696372BEC794F4582368E49
                                                                      SHA-512:08373748A19C0381866090CB60929A4642BB624AF777240CB63B918180CEEE0C80DFAD852830FC6821AD6266DF1A865940A90D2089621F612617C5E92A4B29B2
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ .......W...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):6167
                                                                      Entropy (8bit):4.822443399275307
                                                                      Encrypted:false
                                                                      SSDEEP:96:stE/vpfs13Nb9E0G8zo85eh6Cb7/x+6MhmuecWb1eAeQzw2MR7K:stIvFsTGko88bV+FSbQAMPhK
                                                                      MD5:C103B5F28C1549165795862F9C2E453A
                                                                      SHA1:1F72D11B699D059A515B9C8EF66CA5F2D3AFEC61
                                                                      SHA-256:8937894FCB27A39085F2E2FABFD8489A68E9E82D4C854E1201F4BB2E8FFDC503
                                                                      SHA-512:D18D3605C6526DBD5D9785101D308D6DDE04FFDF6F776090B73BCB6BB324BE552AB7B2D518FB06CFEA5997B205360D9A52BF163BCAABCC4595806ACC61E24D49
                                                                      Malicious:false
                                                                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369432262628299","alternate_error_pages":{"backup":true,"enabled":false},"autocomplete":{"retention_policy_last_version":117},"autofill":{"autostuff_enabled":false,"credit_card_enabled":false,"custom_data_enabled":false,"custom_data_fill_enabled":false,"custom_data_identify_info_from_form_enabled":false,"custom_data_save_enabled":false},"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"browser_content_container_height":729,"browser_content_container_width":1008,"browser_content_container_x":0,"browser_content_container_y":0,"countryid_at_install":17224,"credentials_enable_service":false,"dips_timer_last_update":"13369432262565597","domain_diversity":{"last_reporting_timestamp":"13369432262627408"},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data"
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):6269
                                                                      Entropy (8bit):4.826496604360467
                                                                      Encrypted:false
                                                                      SSDEEP:96:stE/vpfs13Nb9E0G8zo85eh6Cb7/x+6MhmuecWb1eAeQEP2MR7K:stIvFsTGko88bV+FSbQAIPhK
                                                                      MD5:217F811786241A10591579E14B6A1536
                                                                      SHA1:C787628A4348E87D5834BBDBB579C99D90E670E0
                                                                      SHA-256:8A94E766ABFA7A3A95956024FFE172CDF793FEC90E051B564BBF3D780C64D247
                                                                      SHA-512:0A6D7B59AE0C43E5D489FB157246C2DCDFE1465211584F560E77695DBB86DF1E52090943A3B906268A2473D61686E8A69D320D7E4CCBB20DEE69417DE9A58253
                                                                      Malicious:false
                                                                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369432262628299","alternate_error_pages":{"backup":true,"enabled":false},"autocomplete":{"retention_policy_last_version":117},"autofill":{"autostuff_enabled":false,"credit_card_enabled":false,"custom_data_enabled":false,"custom_data_fill_enabled":false,"custom_data_identify_info_from_form_enabled":false,"custom_data_save_enabled":false},"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"browser_content_container_height":729,"browser_content_container_width":1008,"browser_content_container_x":0,"browser_content_container_y":0,"countryid_at_install":17224,"credentials_enable_service":false,"dips_timer_last_update":"13369432262565597","domain_diversity":{"last_reporting_timestamp":"13369432262627408"},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data"
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
                                                                      Category:dropped
                                                                      Size (bytes):16384
                                                                      Entropy (8bit):0.35226517389931394
                                                                      Encrypted:false
                                                                      SSDEEP:12:TLC+waBg9LBgVDBgQjiZBgKuFtuQkMbmgcVAzO5kMCgGUg5OR:TLPdBgtBgJBgQjiZS53uQFE27MCgGZsR
                                                                      MD5:D2CCDC36225684AAE8FA563AFEDB14E7
                                                                      SHA1:3759649035F23004A4C30A14C5F0B54191BEBF80
                                                                      SHA-256:080AEE864047C67CB1586A5BA5EDA007AFD18ECC2B702638287E386F159D7AEE
                                                                      SHA-512:1A915AF643D688CA68AEDC1FF26C407D960D18DFDE838B417C437D7ADAC7B91C906E782DCC414784E64287915BD1DE5BB6A282E59AA9FEB8C384B4D4BC5F70EC
                                                                      Malicious:false
                                                                      Preview:SQLite format 3......@ ..........................................................................j.......Q......Q......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):195
                                                                      Entropy (8bit):2.7998631831187235
                                                                      Encrypted:false
                                                                      SSDEEP:3:VVXntjQPEnjQvxljljljljljljl:/XntM+4ljljljljljljl
                                                                      MD5:00C0DEFAC69CFE6E18C6FD4D684D6625
                                                                      SHA1:F80E1AB029E1116EE2FE85B2ECBF0959CCE884A7
                                                                      SHA-256:1FCAFCF037F8CE32A6EB94539F4A7D67FC51FE2BD8EDBD95C1D0322841EEC8A2
                                                                      SHA-512:C9411AEDDD3937D778BFE37FD489409E49304EBF3D3E7D686BDE4EE9C71E23A57224B622902948AD4BB422FFF3FB9386D02F956807FFF0185E9EF99FA2E157CF
                                                                      Malicious:false
                                                                      Preview:A..r.................20_1_1...1.,U.................20_1_1...1..&f.................&f.................&f.................&f.................&f.................&f.................&f...............
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):299
                                                                      Entropy (8bit):5.300619415505361
                                                                      Encrypted:false
                                                                      SSDEEP:6:N5+Vjd0q1wknaZ5eBERTb4rl2KLlL54Su4X9+q2PwknaZ5eBERTb4rK+IFUv:NqS1rHeBERXqL1SSlovYrHeBERX53FUv
                                                                      MD5:880E890D72CC2DEA660518C1B70AA1FF
                                                                      SHA1:66A790E0F97BA03E3AB287743D47929310B58805
                                                                      SHA-256:33C64909518E10B8DCEC7CB91C5EFBCF298916761272AA0C447F878B911C410D
                                                                      SHA-512:C4A33780944D6998DB6B3EF85955F7FDB79BC638C8483850B1BAC73BDCE30ACA34EA151DDC78E84D1D6236C698E1AFB325B79A723E2300CDC01EE3600D046662
                                                                      Malicious:false
                                                                      Preview:2024/08/29-15:11:02.722 1e88 Creating DB C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db since it was missing..2024/08/29-15:11:02.747 1e88 Reusing MANIFEST C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db/MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:OpenPGP Secret Key
                                                                      Category:dropped
                                                                      Size (bytes):41
                                                                      Entropy (8bit):4.704993772857998
                                                                      Encrypted:false
                                                                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                      Malicious:false
                                                                      Preview:.|.."....leveldb.BytewiseComparator......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):443
                                                                      Entropy (8bit):3.8632842697631133
                                                                      Encrypted:false
                                                                      SSDEEP:6:G0Xtqcsqc9Ct3mxKm9HTl1mL//3mQtmF2lHDNm8L/3mtyWmF2lpgll1mF2lA3m8e:G0nYUteza//z3p/F+iPAHlT0
                                                                      MD5:1DE951E901ED35E532EEBE62E25D7B68
                                                                      SHA1:31CC63C8C6AD38F1AD9EC5B75391E5E642D5EB73
                                                                      SHA-256:19A8D45F22049CA45CCCF3CE04A1C3BA194B7CE6DB6F94FBDEBC95D5A3F55B23
                                                                      SHA-512:BD76B10AE75E2F5C458B53627D4B85E00BB275CE2FD622EEB60E16E7B2C68AF06105B9BA7EDD2F948821A07FCBB1FD64C690EF77E789255375C3F1E44A865CA9
                                                                      Malicious:false
                                                                      Preview:.h.6.................__global... .t...................__global... .9..b.................33_..........................21_.....n[.=.................33_.....vuNX.................21_.....<...................20_.....,.1..................19_.....QL.s.................18_......Q...................20_.......w<.................20_.......ln.................19_......Y...................18_.....%.{..................9_.....f..U.................9_.....
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):16
                                                                      Entropy (8bit):3.2743974703476995
                                                                      Encrypted:false
                                                                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                      MD5:46295CAC801E5D4857D09837238A6394
                                                                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                      Malicious:false
                                                                      Preview:MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):317
                                                                      Entropy (8bit):5.268348247460151
                                                                      Encrypted:false
                                                                      SSDEEP:6:N5g4H+q1wknaZ5eBERTb4rzs52KLlL5t9+q2PwknaZ5eBERTb4rzAdIFUv:N2t1rHeBERX59L1EvYrHeBERXuFUv
                                                                      MD5:2EA8493C5B2B625384206E45223652D5
                                                                      SHA1:438A83AC424F6667DABC52E3E24E0A27B64D3987
                                                                      SHA-256:0F7D4254CCAF4B083756D8D53B5B8C04F5BDEBA9FE778B54F1AF971DBE5A125B
                                                                      SHA-512:9F8878836C6FA81758946C7015FD26BC60ED4DF5C6EBBEC4E4724AF2A46EF049A5597CB759973F78E833ABADA4CB3F76B3B8F107884A268821FDC3018280F97A
                                                                      Malicious:false
                                                                      Preview:2024/08/29-15:11:02.648 1e88 Creating DB C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata since it was missing..2024/08/29-15:11:02.695 1e88 Reusing MANIFEST C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Default\shared_proto_db\metadata/MANIFEST-000001.
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:OpenPGP Secret Key
                                                                      Category:dropped
                                                                      Size (bytes):41
                                                                      Entropy (8bit):4.704993772857998
                                                                      Encrypted:false
                                                                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                      Malicious:false
                                                                      Preview:.|.."....leveldb.BytewiseComparator......
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.01057775872642915
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsFl:/F
                                                                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                      Malicious:false
                                                                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):270336
                                                                      Entropy (8bit):8.280239615765425E-4
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                                                                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                                                                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                                                                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                                                                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.011852361981932763
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsHlDll:/H
                                                                      MD5:0962291D6D367570BEE5454721C17E11
                                                                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.012340643231932763
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsGl3ll:/y
                                                                      MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):262512
                                                                      Entropy (8bit):9.553120663130604E-4
                                                                      Encrypted:false
                                                                      SSDEEP:3:LsNlYla:Ls3Yla
                                                                      MD5:42519D2C8C0A58D3BCC2D62293F53A23
                                                                      SHA1:01A1F240945ACA601216933F2FA914384E20C687
                                                                      SHA-256:F3E102BD4B312E99FBDD8D4C2EB31092C0464AB6A36A21EB746076C4DF8040C5
                                                                      SHA-512:0B017BE0A755CD047B8A8666BE4ADC4A200B51BB496F5CA61D88D635942DEA1C37A275EB2839C305D005D8DD9C0478D237112C54D1BE17E95D82A1391569519E
                                                                      Malicious:false
                                                                      Preview:........................................y<.m./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.01057775872642915
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsFl:/F
                                                                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                      Malicious:false
                                                                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):270336
                                                                      Entropy (8bit):8.280239615765425E-4
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                                                                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                                                                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                                                                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                                                                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.011852361981932763
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsHlDll:/H
                                                                      MD5:0962291D6D367570BEE5454721C17E11
                                                                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.012340643231932763
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsGl3ll:/y
                                                                      MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):262512
                                                                      Entropy (8bit):9.553120663130604E-4
                                                                      Encrypted:false
                                                                      SSDEEP:3:LsNlT:Ls3T
                                                                      MD5:FC224A8D7676D438F61983E8A31A131E
                                                                      SHA1:09E96891E38BE8EAE72513663A38A60F038F8EEA
                                                                      SHA-256:E70EBCDC16153D364BB90A20AD7345D715CFBB0478EACCF9294F8AF92BBCA964
                                                                      SHA-512:064AF6D89A295ECB57CA5D265D8757528FC85181CB194A57536E9F7CE22C6834D5463550673F32C0712CB5B70768600208A35A6E3BC5540BF5FE358ADB4E973F
                                                                      Malicious:false
                                                                      Preview:.........................................@.m./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):13
                                                                      Entropy (8bit):2.7192945256669794
                                                                      Encrypted:false
                                                                      SSDEEP:3:NYLFRQI:ap2I
                                                                      MD5:BF16C04B916ACE92DB941EBB1AF3CB18
                                                                      SHA1:FA8DAEAE881F91F61EE0EE21BE5156255429AA8A
                                                                      SHA-256:7FC23C9028A316EC0AC25B09B5B0D61A1D21E58DFCF84C2A5F5B529129729098
                                                                      SHA-512:F0B7DF5517596B38D57C57B5777E008D6229AB5B1841BBE74602C77EEA2252BF644B8650C7642BD466213F62E15CC7AB5A95B28E26D3907260ED1B96A74B65FB
                                                                      Malicious:false
                                                                      Preview:117.0.2045.47
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):950
                                                                      Entropy (8bit):5.763243745591181
                                                                      Encrypted:false
                                                                      SSDEEP:24:YKWJu5rrtB3jhL+tF8TLFdUBlaeCUWOhCmbvXtlQQRCYfYg:YqfD3jM/8ThdUBlZH8QvAB0
                                                                      MD5:4174B8EECBF601AC37013C11274AB68F
                                                                      SHA1:93C8F04D033829764CC20F9ECA7A12D594C34322
                                                                      SHA-256:93AB8EF692BFAA122F4BA098483831D2C53D55723A5922FC1664C8AA161FB98C
                                                                      SHA-512:30DD97F83AF4E0E9D7A1FF40BA82DA1230FBCF4657A573167CC35EB5B3F48142B424EE2ECBF2D6EE2EACCAA6DB7A039B77A4B3CD6021DA9B6636BDFAA316D124
                                                                      Malicious:false
                                                                      Preview:{"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAADOFkol+YPMRLwhHz+QxDljEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAB8ZS/AV2yQMIRBFjMCx+PTcgh2P3CxX+p11UQG7ddXUgAAAAAOgAAAAAIAACAAAAAIxPwmwMYxmLL9OjK3oD+q5QVB/jKLPUzZQfE+Xmlt6zAAAACnvh0vHaaux5Gf42X+XlVN/F8rnqvYpx1rxMZ+Vs9VQpSwQEz0iuYvaCIIk1jmdSJAAAAAKhygl0CSrJTHMb7nngv693KMjlMIavMtEak+L2ZavjpzNNqBGBSFYwOeERGevpCjJo7Lv2DEB0Ubmt+OC+uvVA=="},"uninstall_metrics":{"installation_date2":"1724958661"},"user_experience_metrics":{"client_id2":"{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}C:\\Users\\user0s:92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A","diagnostics":{"last_data_collection_level_on_launch":1},"low_entropy_source3":7790,"pseudo_low_entropy_source":2631,"reset_client_id_deterministic":true,"stability":{"browser_last_live_timestamp":"13369432261291267","stats_buildtime":"1695934310","stats_version":"117.0.2045.47-64","system_crash_count":0}}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):950
                                                                      Entropy (8bit):5.763243745591181
                                                                      Encrypted:false
                                                                      SSDEEP:24:YKWJu5rrtB3jhL+tF8TLFdUBlaeCUWOhCmbvXtlQQRCYfYg:YqfD3jM/8ThdUBlZH8QvAB0
                                                                      MD5:4174B8EECBF601AC37013C11274AB68F
                                                                      SHA1:93C8F04D033829764CC20F9ECA7A12D594C34322
                                                                      SHA-256:93AB8EF692BFAA122F4BA098483831D2C53D55723A5922FC1664C8AA161FB98C
                                                                      SHA-512:30DD97F83AF4E0E9D7A1FF40BA82DA1230FBCF4657A573167CC35EB5B3F48142B424EE2ECBF2D6EE2EACCAA6DB7A039B77A4B3CD6021DA9B6636BDFAA316D124
                                                                      Malicious:false
                                                                      Preview:{"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAADOFkol+YPMRLwhHz+QxDljEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAB8ZS/AV2yQMIRBFjMCx+PTcgh2P3CxX+p11UQG7ddXUgAAAAAOgAAAAAIAACAAAAAIxPwmwMYxmLL9OjK3oD+q5QVB/jKLPUzZQfE+Xmlt6zAAAACnvh0vHaaux5Gf42X+XlVN/F8rnqvYpx1rxMZ+Vs9VQpSwQEz0iuYvaCIIk1jmdSJAAAAAKhygl0CSrJTHMb7nngv693KMjlMIavMtEak+L2ZavjpzNNqBGBSFYwOeERGevpCjJo7Lv2DEB0Ubmt+OC+uvVA=="},"uninstall_metrics":{"installation_date2":"1724958661"},"user_experience_metrics":{"client_id2":"{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}C:\\Users\\user0s:92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A","diagnostics":{"last_data_collection_level_on_launch":1},"low_entropy_source3":7790,"pseudo_low_entropy_source":2631,"reset_client_id_deterministic":true,"stability":{"browser_last_live_timestamp":"13369432261291267","stats_buildtime":"1695934310","stats_version":"117.0.2045.47-64","system_crash_count":0}}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):950
                                                                      Entropy (8bit):5.763243745591181
                                                                      Encrypted:false
                                                                      SSDEEP:24:YKWJu5rrtB3jhL+tF8TLFdUBlaeCUWOhCmbvXtlQQRCYfYg:YqfD3jM/8ThdUBlZH8QvAB0
                                                                      MD5:4174B8EECBF601AC37013C11274AB68F
                                                                      SHA1:93C8F04D033829764CC20F9ECA7A12D594C34322
                                                                      SHA-256:93AB8EF692BFAA122F4BA098483831D2C53D55723A5922FC1664C8AA161FB98C
                                                                      SHA-512:30DD97F83AF4E0E9D7A1FF40BA82DA1230FBCF4657A573167CC35EB5B3F48142B424EE2ECBF2D6EE2EACCAA6DB7A039B77A4B3CD6021DA9B6636BDFAA316D124
                                                                      Malicious:false
                                                                      Preview:{"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAADOFkol+YPMRLwhHz+QxDljEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAB8ZS/AV2yQMIRBFjMCx+PTcgh2P3CxX+p11UQG7ddXUgAAAAAOgAAAAAIAACAAAAAIxPwmwMYxmLL9OjK3oD+q5QVB/jKLPUzZQfE+Xmlt6zAAAACnvh0vHaaux5Gf42X+XlVN/F8rnqvYpx1rxMZ+Vs9VQpSwQEz0iuYvaCIIk1jmdSJAAAAAKhygl0CSrJTHMb7nngv693KMjlMIavMtEak+L2ZavjpzNNqBGBSFYwOeERGevpCjJo7Lv2DEB0Ubmt+OC+uvVA=="},"uninstall_metrics":{"installation_date2":"1724958661"},"user_experience_metrics":{"client_id2":"{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}C:\\Users\\user0s:92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A","diagnostics":{"last_data_collection_level_on_launch":1},"low_entropy_source3":7790,"pseudo_low_entropy_source":2631,"reset_client_id_deterministic":true,"stability":{"browser_last_live_timestamp":"13369432261291267","stats_buildtime":"1695934310","stats_version":"117.0.2045.47-64","system_crash_count":0}}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):950
                                                                      Entropy (8bit):5.763243745591181
                                                                      Encrypted:false
                                                                      SSDEEP:24:YKWJu5rrtB3jhL+tF8TLFdUBlaeCUWOhCmbvXtlQQRCYfYg:YqfD3jM/8ThdUBlZH8QvAB0
                                                                      MD5:4174B8EECBF601AC37013C11274AB68F
                                                                      SHA1:93C8F04D033829764CC20F9ECA7A12D594C34322
                                                                      SHA-256:93AB8EF692BFAA122F4BA098483831D2C53D55723A5922FC1664C8AA161FB98C
                                                                      SHA-512:30DD97F83AF4E0E9D7A1FF40BA82DA1230FBCF4657A573167CC35EB5B3F48142B424EE2ECBF2D6EE2EACCAA6DB7A039B77A4B3CD6021DA9B6636BDFAA316D124
                                                                      Malicious:false
                                                                      Preview:{"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAADOFkol+YPMRLwhHz+QxDljEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAB8ZS/AV2yQMIRBFjMCx+PTcgh2P3CxX+p11UQG7ddXUgAAAAAOgAAAAAIAACAAAAAIxPwmwMYxmLL9OjK3oD+q5QVB/jKLPUzZQfE+Xmlt6zAAAACnvh0vHaaux5Gf42X+XlVN/F8rnqvYpx1rxMZ+Vs9VQpSwQEz0iuYvaCIIk1jmdSJAAAAAKhygl0CSrJTHMb7nngv693KMjlMIavMtEak+L2ZavjpzNNqBGBSFYwOeERGevpCjJo7Lv2DEB0Ubmt+OC+uvVA=="},"uninstall_metrics":{"installation_date2":"1724958661"},"user_experience_metrics":{"client_id2":"{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}C:\\Users\\user0s:92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A","diagnostics":{"last_data_collection_level_on_launch":1},"low_entropy_source3":7790,"pseudo_low_entropy_source":2631,"reset_client_id_deterministic":true,"stability":{"browser_last_live_timestamp":"13369432261291267","stats_buildtime":"1695934310","stats_version":"117.0.2045.47-64","system_crash_count":0}}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):950
                                                                      Entropy (8bit):5.763243745591181
                                                                      Encrypted:false
                                                                      SSDEEP:24:YKWJu5rrtB3jhL+tF8TLFdUBlaeCUWOhCmbvXtlQQRCYfYg:YqfD3jM/8ThdUBlZH8QvAB0
                                                                      MD5:4174B8EECBF601AC37013C11274AB68F
                                                                      SHA1:93C8F04D033829764CC20F9ECA7A12D594C34322
                                                                      SHA-256:93AB8EF692BFAA122F4BA098483831D2C53D55723A5922FC1664C8AA161FB98C
                                                                      SHA-512:30DD97F83AF4E0E9D7A1FF40BA82DA1230FBCF4657A573167CC35EB5B3F48142B424EE2ECBF2D6EE2EACCAA6DB7A039B77A4B3CD6021DA9B6636BDFAA316D124
                                                                      Malicious:false
                                                                      Preview:{"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAADOFkol+YPMRLwhHz+QxDljEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAB8ZS/AV2yQMIRBFjMCx+PTcgh2P3CxX+p11UQG7ddXUgAAAAAOgAAAAAIAACAAAAAIxPwmwMYxmLL9OjK3oD+q5QVB/jKLPUzZQfE+Xmlt6zAAAACnvh0vHaaux5Gf42X+XlVN/F8rnqvYpx1rxMZ+Vs9VQpSwQEz0iuYvaCIIk1jmdSJAAAAAKhygl0CSrJTHMb7nngv693KMjlMIavMtEak+L2ZavjpzNNqBGBSFYwOeERGevpCjJo7Lv2DEB0Ubmt+OC+uvVA=="},"uninstall_metrics":{"installation_date2":"1724958661"},"user_experience_metrics":{"client_id2":"{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}C:\\Users\\user0s:92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A","diagnostics":{"last_data_collection_level_on_launch":1},"low_entropy_source3":7790,"pseudo_low_entropy_source":2631,"reset_client_id_deterministic":true,"stability":{"browser_last_live_timestamp":"13369432261291267","stats_buildtime":"1695934310","stats_version":"117.0.2045.47-64","system_crash_count":0}}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):950
                                                                      Entropy (8bit):5.763243745591181
                                                                      Encrypted:false
                                                                      SSDEEP:24:YKWJu5rrtB3jhL+tF8TLFdUBlaeCUWOhCmbvXtlQQRCYfYg:YqfD3jM/8ThdUBlZH8QvAB0
                                                                      MD5:4174B8EECBF601AC37013C11274AB68F
                                                                      SHA1:93C8F04D033829764CC20F9ECA7A12D594C34322
                                                                      SHA-256:93AB8EF692BFAA122F4BA098483831D2C53D55723A5922FC1664C8AA161FB98C
                                                                      SHA-512:30DD97F83AF4E0E9D7A1FF40BA82DA1230FBCF4657A573167CC35EB5B3F48142B424EE2ECBF2D6EE2EACCAA6DB7A039B77A4B3CD6021DA9B6636BDFAA316D124
                                                                      Malicious:false
                                                                      Preview:{"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAADOFkol+YPMRLwhHz+QxDljEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAB8ZS/AV2yQMIRBFjMCx+PTcgh2P3CxX+p11UQG7ddXUgAAAAAOgAAAAAIAACAAAAAIxPwmwMYxmLL9OjK3oD+q5QVB/jKLPUzZQfE+Xmlt6zAAAACnvh0vHaaux5Gf42X+XlVN/F8rnqvYpx1rxMZ+Vs9VQpSwQEz0iuYvaCIIk1jmdSJAAAAAKhygl0CSrJTHMb7nngv693KMjlMIavMtEak+L2ZavjpzNNqBGBSFYwOeERGevpCjJo7Lv2DEB0Ubmt+OC+uvVA=="},"uninstall_metrics":{"installation_date2":"1724958661"},"user_experience_metrics":{"client_id2":"{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}C:\\Users\\user0s:92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A","diagnostics":{"last_data_collection_level_on_launch":1},"low_entropy_source3":7790,"pseudo_low_entropy_source":2631,"reset_client_id_deterministic":true,"stability":{"browser_last_live_timestamp":"13369432261291267","stats_buildtime":"1695934310","stats_version":"117.0.2045.47-64","system_crash_count":0}}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.01057775872642915
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsFl:/F
                                                                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                      Malicious:false
                                                                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):270336
                                                                      Entropy (8bit):8.280239615765425E-4
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                                                                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                                                                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                                                                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                                                                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.011852361981932763
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsHlDll:/H
                                                                      MD5:0962291D6D367570BEE5454721C17E11
                                                                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):8192
                                                                      Entropy (8bit):0.012340643231932763
                                                                      Encrypted:false
                                                                      SSDEEP:3:MsGl3ll:/y
                                                                      MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):262512
                                                                      Entropy (8bit):9.553120663130604E-4
                                                                      Encrypted:false
                                                                      SSDEEP:3:LsNlqp:Ls38
                                                                      MD5:B20F4CBDF801AA8BC5F9F7CF7B8842D9
                                                                      SHA1:A6127220BFE5588E160497751E85F64C4F090DAD
                                                                      SHA-256:F55A6478AC021213A76DED255EFBB10BCDAA0DE30AAD7A45FFBE6AA204319AFE
                                                                      SHA-512:1CAF735EADAA5739E4C93B94F6F8F90C9F81C840B15C6E9FC97971ECCF3ADDA4955AF4145139706043DCFAB8869DA5A745E7636593C4509ADD68A5C31358885C
                                                                      Malicious:false
                                                                      Preview:...........................................m./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):86
                                                                      Entropy (8bit):4.3751917412896075
                                                                      Encrypted:false
                                                                      SSDEEP:3:YQ3JYq9xSs0dMEJAELJ2rjozQan:YQ3Kq9X0dMgAEwjM
                                                                      MD5:961E3604F228B0D10541EBF921500C86
                                                                      SHA1:6E00570D9F78D9CFEBE67D4DA5EFE546543949A7
                                                                      SHA-256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
                                                                      SHA-512:535F930AFD2EF50282715C7E48859CC2D7B354FF4E6C156B94D5A2815F589B33189FFEDFCAF4456525283E993087F9F560D84CFCF497D189AB8101510A09C472
                                                                      Malicious:false
                                                                      Preview:{"user_experience_metrics.stability.exited_cleanly":false,"variations_crash_streak":0}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):17638
                                                                      Entropy (8bit):6.061415516447503
                                                                      Encrypted:false
                                                                      SSDEEP:384:dtMGQ7LBjuYXGIgtDAW5u0TDJ2q03WNBSBtAjSExgac83i3F3v:XMGQ7FCYXGIgtDAWtJ4m2Exgac83i1f
                                                                      MD5:B0C5EEA8E0740CC40C65A22372253B63
                                                                      SHA1:11D501043EBECAABF8E928ABBA9E4860518483B5
                                                                      SHA-256:B520E67435939C64C93991B123FEFB5EC6F48C73BE66FBD87637191AA4F17669
                                                                      SHA-512:25F51B8E246B30D25D1B93FB411F5F2D9158578DBA6EA2715026B6F1261446E4D83081909D1389ABC5B983C778945B4770CBA6302DA1452829DEAA555A0B76BB
                                                                      Malicious:false
                                                                      Preview:{"desktop_session_duration_tracker":{"last_session_end_timestamp":"1724958670"},"domain_actions_config":"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
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):950
                                                                      Entropy (8bit):5.763243745591181
                                                                      Encrypted:false
                                                                      SSDEEP:24:YKWJu5rrtB3jhL+tF8TLFdUBlaeCUWOhCmbvXtlQQRCYfYg:YqfD3jM/8ThdUBlZH8QvAB0
                                                                      MD5:4174B8EECBF601AC37013C11274AB68F
                                                                      SHA1:93C8F04D033829764CC20F9ECA7A12D594C34322
                                                                      SHA-256:93AB8EF692BFAA122F4BA098483831D2C53D55723A5922FC1664C8AA161FB98C
                                                                      SHA-512:30DD97F83AF4E0E9D7A1FF40BA82DA1230FBCF4657A573167CC35EB5B3F48142B424EE2ECBF2D6EE2EACCAA6DB7A039B77A4B3CD6021DA9B6636BDFAA316D124
                                                                      Malicious:false
                                                                      Preview:{"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAADOFkol+YPMRLwhHz+QxDljEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAB8ZS/AV2yQMIRBFjMCx+PTcgh2P3CxX+p11UQG7ddXUgAAAAAOgAAAAAIAACAAAAAIxPwmwMYxmLL9OjK3oD+q5QVB/jKLPUzZQfE+Xmlt6zAAAACnvh0vHaaux5Gf42X+XlVN/F8rnqvYpx1rxMZ+Vs9VQpSwQEz0iuYvaCIIk1jmdSJAAAAAKhygl0CSrJTHMb7nngv693KMjlMIavMtEak+L2ZavjpzNNqBGBSFYwOeERGevpCjJo7Lv2DEB0Ubmt+OC+uvVA=="},"uninstall_metrics":{"installation_date2":"1724958661"},"user_experience_metrics":{"client_id2":"{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}C:\\Users\\user0s:92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A","diagnostics":{"last_data_collection_level_on_launch":1},"low_entropy_source3":7790,"pseudo_low_entropy_source":2631,"reset_client_id_deterministic":true,"stability":{"browser_last_live_timestamp":"13369432261291267","stats_buildtime":"1695934310","stats_version":"117.0.2045.47-64","system_crash_count":0}}}
                                                                      Process:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):16404
                                                                      Entropy (8bit):6.0667482984380845
                                                                      Encrypted:false
                                                                      SSDEEP:384:dtMGQ7LBjuYXGIgtDAW5u0TDJ2q03XNBSBtAzac83i3F3v:XMGQ7FCYXGIgtDAWtJ41zac83i1f
                                                                      MD5:B68AD5D7AFDB81AEE73849FC41B86E33
                                                                      SHA1:95240C244F7D11F5138315D5E2ADEE2D3114846B
                                                                      SHA-256:9CCE30BBDAE77E1DF3F50EE44B35440FA4EA49E64DB4B3A5D4668E537EA648B3
                                                                      SHA-512:0ABE5E9F0CD15FFFB950E935E9693EB06E0FD80AA67FDD8C410B4C0049E117CF3204F7DE5C9AF2F2D6A8A54DBD6065ECE91F34B5ABB0BAA26256A2A46CEC402D
                                                                      Malicious:false
                                                                      Preview:{"desktop_session_duration_tracker":{"last_session_end_timestamp":"1724958670"},"domain_actions_config":"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
                                                                      File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                      Entropy (8bit):6.6354082462978345
                                                                      TrID:
                                                                      • Win64 Executable (generic) (12005/4) 74.95%
                                                                      • Generic Win/DOS Executable (2004/3) 12.51%
                                                                      • DOS Executable Generic (2002/1) 12.50%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                                                      File name:BrowserUpdateTool.exe
                                                                      File size:99'319'784 bytes
                                                                      MD5:9e89fefaa6e3d99c3824d5e68dc8d3a2
                                                                      SHA1:d11ea624bdc348af474128d338f012b7caf4b2d3
                                                                      SHA256:162e4277a4cb2e3703df74529d83d47b66a5b46b0a93b3ac902b56da3e588fe9
                                                                      SHA512:a88e8f52c056770ab7f92aa68dd0368b4e9e4eb74e6330540443c024a113dfbf5d3eb0da99164d7cce4ada04430c22678339208f7621d5f0f5f0d36324814ff3
                                                                      SSDEEP:786432:JnhTkZZxLpDNxtavMkhotsqVA5aT2sClw3J0urMO7BNi:pujH4vMzAMTXt0/
                                                                      TLSH:EA288C0BF99441D6C5AAD138CA229723FBB17C454B3067C72A60FB651F73BE09A7A350
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................).r...N.................@.............................`............`... ............................
                                                                      Icon Hash:2f232d67b7934633
                                                                      Entrypoint:0x1400013e0
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:true
                                                                      Imagebase:0x140000000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                      TLS Callbacks:0x41bf6650, 0x1, 0x41bf6620, 0x1
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:6
                                                                      OS Version Minor:1
                                                                      File Version Major:6
                                                                      File Version Minor:1
                                                                      Subsystem Version Major:6
                                                                      Subsystem Version Minor:1
                                                                      Import Hash:cf8502cf2766a8df8e10b04e66bbe111
                                                                      Signature Valid:true
                                                                      Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                                                                      Signature Validation Error:The operation completed successfully
                                                                      Error Number:0
                                                                      Not Before, Not After
                                                                      • 20/06/2024 04:32:00 21/06/2025 04:32:00
                                                                      Subject Chain
                                                                      • CN=CONG TY TNHH SAN XUAT VA THUONG MAI HUU BANG, OU=IT Department, O=CONG TY TNHH SAN XUAT VA THUONG MAI HUU BANG, STREET="Xom 2, thon Don Nong, Xa Doan Hung, Huyen Hung Ha", L=Thai Binh, S=Thai Binh, C=VN, OID.1.3.6.1.4.1.311.60.2.1.2=Thai Binh, OID.1.3.6.1.4.1.311.60.2.1.3=VN, SERIALNUMBER=1001266910, OID.2.5.4.15=Private Organization
                                                                      Version:3
                                                                      Thumbprint MD5:B5CC946563F6AAACED5A8DD211A7C866
                                                                      Thumbprint SHA-1:96E65313B167FF117658D4143A1B861DFAA76F7D
                                                                      Thumbprint SHA-256:FB2E428E2DE6C9861D5D5A18B136F65BB1D1B8C123A2687C24C01FE62643DA2B
                                                                      Serial:05B7F83D956379CDF5C31382
                                                                      Instruction
                                                                      push ebp
                                                                      dec eax
                                                                      mov ebp, esp
                                                                      dec eax
                                                                      sub esp, 20h
                                                                      dec eax
                                                                      mov eax, dword ptr [03BB1A61h]
                                                                      mov dword ptr [eax], 00000001h
                                                                      call 00007FE3F8BF3AFBh
                                                                      nop
                                                                      nop
                                                                      dec eax
                                                                      add esp, 20h
                                                                      pop ebp
                                                                      ret
                                                                      nop word ptr [eax+eax+00000000h]
                                                                      nop dword ptr [eax]
                                                                      push ebp
                                                                      dec eax
                                                                      mov ebp, esp
                                                                      dec eax
                                                                      sub esp, 20h
                                                                      dec eax
                                                                      mov eax, dword ptr [03BB1A31h]
                                                                      mov dword ptr [eax], 00000000h
                                                                      call 00007FE3F8BF3ACBh
                                                                      nop
                                                                      nop
                                                                      dec eax
                                                                      add esp, 20h
                                                                      pop ebp
                                                                      ret
                                                                      nop word ptr [eax+eax+00000000h]
                                                                      nop dword ptr [eax]
                                                                      push ebp
                                                                      dec eax
                                                                      mov ebp, esp
                                                                      dec eax
                                                                      sub esp, 20h
                                                                      call 00007FE3FA7EA848h
                                                                      dec eax
                                                                      cmp eax, 01h
                                                                      sbb eax, eax
                                                                      dec eax
                                                                      add esp, 20h
                                                                      pop ebp
                                                                      ret
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      dec eax
                                                                      lea ecx, dword ptr [00000009h]
                                                                      jmp 00007FE3F8BF3D39h
                                                                      nop dword ptr [eax+00h]
                                                                      ret
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      dec esp
                                                                      lea esp, dword ptr [esp-000000C0h]
                                                                      dec ebp
                                                                      cmp esp, dword ptr [esi+10h]
                                                                      jbe 00007FE3F8BF3FACh
                                                                      push ebp
                                                                      dec eax
                                                                      mov ebp, esp
                                                                      dec eax
                                                                      sub esp, 00000138h
                                                                      dec eax
                                                                      mov dword ptr [esp+00000148h], eax
                                                                      call 00007FE3F8BFD29Bh
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x3cf60000x35d.edata
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3cf70000x1054.idata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d5b0000x220a3be.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3bb40000x93bac.pdata
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x5eb52000x2de8.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x3cfb0000x5fa00.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x3bb2aa00x28.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x3cf73d80x398.idata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000x1bf71000x1bf72000c52b9ddead73fce63b6abd0521a0957unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .data0x1bf90000x8faf300x8fb0006ea310cc0c3bece0cfce2029c75e2027unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .rdata0x24f40000x16bfd100x16bfe0053b0242a8809d63d227b3fb964f7c750unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .pdata0x3bb40000x93bac0x93c00ccc0a304b3cb853aa749d64dfc53a5f6False0.3925863869500846data6.134604920814271IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .xdata0x3c480000x39bc0x3a000d02282846fa215030844c977b115bbcFalse0.1978717672413793data4.6548096068747755IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .bss0x3c4c0000xa91700x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .edata0x3cf60000x35d0x400878d2e44fd5d50f38cc8be2eade6fa01False0.4892578125data4.818950041997484IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .idata0x3cf70000x10540x120058e9d0e7b6af27ecde98e1cd97e831f6False0.3059895833333333data4.4451542728541185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .CRT0x3cf90000x600x200f908b3bd73508fc29d882903e1de8d7fFalse0.068359375data0.3256869142480582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .tls0x3cfa0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .reloc0x3cfb0000x5fa000x5fa00c19463cddbd469e9996bc4cd10683014False0.1312780841503268data5.461968979720515IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x3d5b0000x220a3be0x220a400af6a481894ad25a94e76cfdba7798e6funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      BINARY0x3d5b6cc0x1046a08PE32+ executable (DLL) (console) x86-64, for MS Windows0.5078086853027344
                                                                      BINARY0x4da20d40x97c38PE32+ executable (DLL) (console) x86-64, for MS Windows0.48935208421811255
                                                                      CERTIFICATE0x4e39d0c0x3daCertificate, Version=3 Certificate, Version=010.7870182555780934
                                                                      CERTIFICATE0x4e3a0e80x709Certificate, Version=30.8695169350360911
                                                                      CERTIFICATE0x4e3a7f40x609Certificate, Version=30.9087378640776699
                                                                      CERTIFICATE0x4e3ae000x416Certificate, Version=30.7523900573613767
                                                                      CERTIFICATE0x4e3b2180x59dCertificate, Version=30.941544885177453
                                                                      CERTIFICATE0x4e3b7b80x5f1Certificate, Version=30.9171597633136095
                                                                      MSTESTROOT0x4e3bdac0x601Certificate, Version=30.9141184124918673
                                                                      MSTESTROOT0x4e3c3b00xff1Certificate, Version=30.41607449154618964
                                                                      REGISTRY0x4e3d3a40x7fASCII text, with CRLF line terminators0.7322834645669292
                                                                      REGISTRY0x4e3d4240xd2ASCII text, with CRLF line terminators0.819047619047619
                                                                      REGISTRY0x4e3d4f80xd6ASCII text, with CRLF line terminators0.822429906542056
                                                                      REGISTRY0x4e3d5d00xdeASCII text, with CRLF line terminators0.8108108108108109
                                                                      REGISTRY0x4e3d6b00x145ASCII text, with CRLF line terminators0.7446153846153846
                                                                      TYPELIB0x4e3d7f80x2c0cdataEnglishUnited States0.34808442710180915
                                                                      RT_ICON0x4e404040x128Device independent bitmap graphic, 16 x 32 x 4, image size 192, 16 important colorsEnglishUnited States0.6317567567567568
                                                                      RT_ICON0x4e4052c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.5823699421965318
                                                                      RT_ICON0x4e40a940x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640, 16 important colorsEnglishUnited States0.5120967741935484
                                                                      RT_ICON0x4e40d7c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.5455776173285198
                                                                      RT_ICON0x4e416240x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.36341463414634145
                                                                      RT_ICON0x4e41c8c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.42350746268656714
                                                                      RT_RCDATA0x4e42b340x1122830PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows0.6795015335083008
                                                                      RT_GROUP_ICON0x5f653640x5adataEnglishUnited States0.7333333333333333
                                                                      DLLImport
                                                                      KERNEL32.dllAddVectoredExceptionHandler, CancelIo, CloseHandle, CreateEventA, CreateFileA, CreateFileW, CreateIoCompletionPort, CreateThread, CreateWaitableTimerExW, DeleteCriticalSection, DeviceIoControl, DuplicateHandle, EnterCriticalSection, ExitProcess, FormatMessageW, FreeEnvironmentStringsW, FreeLibrary, GetConsoleMode, GetCurrentThreadId, GetEnvironmentStringsW, GetErrorMode, GetLastError, GetOverlappedResult, GetProcAddress, GetProcessAffinityMask, GetQueuedCompletionStatusEx, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetThreadContext, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, LoadLibraryExW, LoadLibraryW, MultiByteToWideChar, PostQueuedCompletionStatus, RaiseFailFastException, ReadFile, ResetEvent, ResumeThread, SetConsoleCtrlHandler, SetErrorMode, SetEvent, SetProcessPriorityBoost, SetThreadContext, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SuspendThread, SwitchToThread, TlsAlloc, TlsGetValue, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WerGetFlags, WerSetFlags, WideCharToMultiByte, WriteConsoleW, WriteFile, __C_specific_handler
                                                                      msvcrt.dll___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _assert, _beginthread, _cexit, _commode, _errno, fwprintf, _fmode, _initterm, _lock, _onexit, _unlock, _wcsdup, abort, calloc, clock, exit, fflush, fprintf, fputc, fputwc, free, fwrite, localeconv, malloc, memcmp, memcpy, memmove, memset, qsort, signal, strerror, strlen, strncmp, towupper, vfprintf, wcscmp, wcslen, wcsncpy, wcsstr, wcstol
                                                                      NameOrdinalAddress
                                                                      _cgo_dummy_export10x143cf4550
                                                                      hid_close20x141b40fe0
                                                                      hid_enumerate30x141b40300
                                                                      hid_error40x141b41460
                                                                      hid_exit50x141b40290
                                                                      hid_free_enumeration60x141b40660
                                                                      hid_get_device_info70x141b411f0
                                                                      hid_get_feature_report80x141b40fc0
                                                                      hid_get_indexed_string90x141b41240
                                                                      hid_get_input_report100x141b40fd0
                                                                      hid_get_manufacturer_string110x141b41010
                                                                      hid_get_product_string120x141b410b0
                                                                      hid_get_report_descriptor130x141b43550
                                                                      hid_get_serial_number_string140x141b41150
                                                                      hid_init150x141b40230
                                                                      hid_open160x141b40aa0
                                                                      hid_open_path170x141b40720
                                                                      hid_read180x141b40eb0
                                                                      hid_read_timeout190x141b40ce0
                                                                      hid_send_feature_report200x141b40ed0
                                                                      hid_set_nonblocking210x141b40ec0
                                                                      hid_version220x141b40210
                                                                      hid_version_str230x141b40220
                                                                      hid_winapi_descriptor_reconstruct_pp_data240x141b414a0
                                                                      hid_winapi_get_container_id250x141b412a0
                                                                      hid_write260x141b40b60
                                                                      secp256k1GoPanicError270x141b438e0
                                                                      secp256k1GoPanicIllegal280x141b43890
                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      EnglishUnited States
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Aug 29, 2024 21:11:04.929063082 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:04.929094076 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:04.929178953 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:04.937205076 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:04.937221050 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.465688944 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.466398001 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.466409922 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.467749119 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.467848063 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.468900919 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.468962908 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.469660997 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.469667912 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.567018986 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.608726978 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.609042883 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.609069109 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.609095097 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.609097958 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.609108925 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.609134912 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.609843969 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.610006094 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.610018015 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.610622883 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.610660076 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.610932112 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.610939980 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.610980988 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.611180067 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.613720894 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.613904953 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.613913059 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.642847061 CEST49741443192.168.2.4185.199.111.133
                                                                      Aug 29, 2024 21:11:05.642894983 CEST44349741185.199.111.133192.168.2.4
                                                                      Aug 29, 2024 21:11:05.643018961 CEST49741443192.168.2.4185.199.111.133
                                                                      Aug 29, 2024 21:11:05.649033070 CEST49741443192.168.2.4185.199.111.133
                                                                      Aug 29, 2024 21:11:05.649048090 CEST44349741185.199.111.133192.168.2.4
                                                                      Aug 29, 2024 21:11:05.668443918 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.711473942 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.711488962 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.711524010 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.711539030 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.711550951 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.711564064 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.711574078 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.712042093 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.721573114 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.721581936 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.721610069 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.721641064 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.721647978 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.721661091 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:05.721671104 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:05.727060080 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:06.050062895 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:06.050076008 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:06.050103903 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:06.050188065 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:06.050188065 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:06.050200939 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:06.052206993 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:06.054737091 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:06.054744959 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:06.054769039 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:06.054801941 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:06.054810047 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:06.054852009 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:06.054852009 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:06.055882931 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:06.055951118 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:06.055975914 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:06.057029009 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:06.058850050 CEST49739443192.168.2.4151.101.130.137
                                                                      Aug 29, 2024 21:11:06.058859110 CEST44349739151.101.130.137192.168.2.4
                                                                      Aug 29, 2024 21:11:06.128284931 CEST44349741185.199.111.133192.168.2.4
                                                                      Aug 29, 2024 21:11:06.128606081 CEST49741443192.168.2.4185.199.111.133
                                                                      Aug 29, 2024 21:11:06.128628016 CEST44349741185.199.111.133192.168.2.4
                                                                      Aug 29, 2024 21:11:06.129661083 CEST44349741185.199.111.133192.168.2.4
                                                                      Aug 29, 2024 21:11:06.129736900 CEST49741443192.168.2.4185.199.111.133
                                                                      Aug 29, 2024 21:11:06.135267019 CEST49741443192.168.2.4185.199.111.133
                                                                      Aug 29, 2024 21:11:06.135324955 CEST44349741185.199.111.133192.168.2.4
                                                                      Aug 29, 2024 21:11:06.135552883 CEST49741443192.168.2.4185.199.111.133
                                                                      Aug 29, 2024 21:11:06.135559082 CEST44349741185.199.111.133192.168.2.4
                                                                      Aug 29, 2024 21:11:06.182271004 CEST49741443192.168.2.4185.199.111.133
                                                                      Aug 29, 2024 21:11:06.284020901 CEST44349741185.199.111.133192.168.2.4
                                                                      Aug 29, 2024 21:11:06.285311937 CEST44349741185.199.111.133192.168.2.4
                                                                      Aug 29, 2024 21:11:06.285373926 CEST49741443192.168.2.4185.199.111.133
                                                                      Aug 29, 2024 21:11:06.285716057 CEST49741443192.168.2.4185.199.111.133
                                                                      Aug 29, 2024 21:11:06.285731077 CEST44349741185.199.111.133192.168.2.4
                                                                      Aug 29, 2024 21:11:09.224987984 CEST49747443192.168.2.4172.64.41.3
                                                                      Aug 29, 2024 21:11:09.225033998 CEST44349747172.64.41.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.225090981 CEST49747443192.168.2.4172.64.41.3
                                                                      Aug 29, 2024 21:11:09.225527048 CEST49747443192.168.2.4172.64.41.3
                                                                      Aug 29, 2024 21:11:09.225541115 CEST44349747172.64.41.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.226072073 CEST49748443192.168.2.4162.159.61.3
                                                                      Aug 29, 2024 21:11:09.226079941 CEST44349748162.159.61.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.226124048 CEST49748443192.168.2.4162.159.61.3
                                                                      Aug 29, 2024 21:11:09.226341009 CEST49748443192.168.2.4162.159.61.3
                                                                      Aug 29, 2024 21:11:09.226350069 CEST44349748162.159.61.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.723613977 CEST44349748162.159.61.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.723932981 CEST49748443192.168.2.4162.159.61.3
                                                                      Aug 29, 2024 21:11:09.723949909 CEST44349748162.159.61.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.724910975 CEST44349747172.64.41.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.725071907 CEST44349748162.159.61.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.725131989 CEST49748443192.168.2.4162.159.61.3
                                                                      Aug 29, 2024 21:11:09.725291967 CEST49747443192.168.2.4172.64.41.3
                                                                      Aug 29, 2024 21:11:09.725297928 CEST44349747172.64.41.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.726311922 CEST44349747172.64.41.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.726366997 CEST49747443192.168.2.4172.64.41.3
                                                                      Aug 29, 2024 21:11:09.735810041 CEST49748443192.168.2.4162.159.61.3
                                                                      Aug 29, 2024 21:11:09.735893965 CEST44349748162.159.61.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.736128092 CEST49748443192.168.2.4162.159.61.3
                                                                      Aug 29, 2024 21:11:09.736133099 CEST44349748162.159.61.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.736469030 CEST49747443192.168.2.4172.64.41.3
                                                                      Aug 29, 2024 21:11:09.736538887 CEST44349747172.64.41.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.739084959 CEST49747443192.168.2.4172.64.41.3
                                                                      Aug 29, 2024 21:11:09.739094973 CEST44349747172.64.41.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.788336039 CEST49748443192.168.2.4162.159.61.3
                                                                      Aug 29, 2024 21:11:09.788404942 CEST49747443192.168.2.4172.64.41.3
                                                                      Aug 29, 2024 21:11:09.856853008 CEST44349748162.159.61.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.856916904 CEST44349748162.159.61.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.856965065 CEST49748443192.168.2.4162.159.61.3
                                                                      Aug 29, 2024 21:11:09.857286930 CEST49748443192.168.2.4162.159.61.3
                                                                      Aug 29, 2024 21:11:09.857300043 CEST44349748162.159.61.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.861434937 CEST44349747172.64.41.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.861490011 CEST44349747172.64.41.3192.168.2.4
                                                                      Aug 29, 2024 21:11:09.861530066 CEST49747443192.168.2.4172.64.41.3
                                                                      Aug 29, 2024 21:11:09.861861944 CEST49747443192.168.2.4172.64.41.3
                                                                      Aug 29, 2024 21:11:09.861866951 CEST44349747172.64.41.3192.168.2.4
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Aug 29, 2024 21:11:04.909310102 CEST5490653192.168.2.41.1.1.1
                                                                      Aug 29, 2024 21:11:04.909849882 CEST5327753192.168.2.41.1.1.1
                                                                      Aug 29, 2024 21:11:04.928420067 CEST53532771.1.1.1192.168.2.4
                                                                      Aug 29, 2024 21:11:04.928433895 CEST53549061.1.1.1192.168.2.4
                                                                      Aug 29, 2024 21:11:05.620537043 CEST5675953192.168.2.41.1.1.1
                                                                      Aug 29, 2024 21:11:05.620537043 CEST6531253192.168.2.41.1.1.1
                                                                      Aug 29, 2024 21:11:05.637213945 CEST53589081.1.1.1192.168.2.4
                                                                      Aug 29, 2024 21:11:05.641777992 CEST53567591.1.1.1192.168.2.4
                                                                      Aug 29, 2024 21:11:05.641901970 CEST53653121.1.1.1192.168.2.4
                                                                      Aug 29, 2024 21:11:06.615345001 CEST53582211.1.1.1192.168.2.4
                                                                      Aug 29, 2024 21:11:09.213874102 CEST5151153192.168.2.41.1.1.1
                                                                      Aug 29, 2024 21:11:09.214313030 CEST6460953192.168.2.41.1.1.1
                                                                      Aug 29, 2024 21:11:09.214731932 CEST4988153192.168.2.41.1.1.1
                                                                      Aug 29, 2024 21:11:09.214946985 CEST5297453192.168.2.41.1.1.1
                                                                      Aug 29, 2024 21:11:09.224278927 CEST53515111.1.1.1192.168.2.4
                                                                      Aug 29, 2024 21:11:09.224328041 CEST53646091.1.1.1192.168.2.4
                                                                      Aug 29, 2024 21:11:09.225104094 CEST53498811.1.1.1192.168.2.4
                                                                      Aug 29, 2024 21:11:09.225115061 CEST53529741.1.1.1192.168.2.4
                                                                      Aug 29, 2024 21:11:33.535164118 CEST5361979162.159.36.2192.168.2.4
                                                                      Aug 29, 2024 21:11:34.042834997 CEST4922353192.168.2.41.1.1.1
                                                                      Aug 29, 2024 21:11:34.051213980 CEST53492231.1.1.1192.168.2.4
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Aug 29, 2024 21:11:04.909310102 CEST192.168.2.41.1.1.10x7a65Standard query (0)code.jquery.comA (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:04.909849882 CEST192.168.2.41.1.1.10x3028Standard query (0)code.jquery.com65IN (0x0001)false
                                                                      Aug 29, 2024 21:11:05.620537043 CEST192.168.2.41.1.1.10x6991Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:05.620537043 CEST192.168.2.41.1.1.10xb609Standard query (0)raw.githubusercontent.com65IN (0x0001)false
                                                                      Aug 29, 2024 21:11:09.213874102 CEST192.168.2.41.1.1.10xc8ebStandard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:09.214313030 CEST192.168.2.41.1.1.10xe92cStandard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                      Aug 29, 2024 21:11:09.214731932 CEST192.168.2.41.1.1.10xc960Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:09.214946985 CEST192.168.2.41.1.1.10xfefcStandard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                      Aug 29, 2024 21:11:34.042834997 CEST192.168.2.41.1.1.10x6f03Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Aug 29, 2024 21:11:04.928433895 CEST1.1.1.1192.168.2.40x7a65No error (0)code.jquery.com151.101.130.137A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:04.928433895 CEST1.1.1.1192.168.2.40x7a65No error (0)code.jquery.com151.101.2.137A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:04.928433895 CEST1.1.1.1192.168.2.40x7a65No error (0)code.jquery.com151.101.194.137A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:04.928433895 CEST1.1.1.1192.168.2.40x7a65No error (0)code.jquery.com151.101.66.137A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:05.641777992 CEST1.1.1.1192.168.2.40x6991No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:05.641777992 CEST1.1.1.1192.168.2.40x6991No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:05.641777992 CEST1.1.1.1192.168.2.40x6991No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:05.641777992 CEST1.1.1.1192.168.2.40x6991No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:09.224278927 CEST1.1.1.1192.168.2.40xc8ebNo error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:09.224278927 CEST1.1.1.1192.168.2.40xc8ebNo error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:09.224328041 CEST1.1.1.1192.168.2.40xe92cNo error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                      Aug 29, 2024 21:11:09.225104094 CEST1.1.1.1192.168.2.40xc960No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:09.225104094 CEST1.1.1.1192.168.2.40xc960No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                                                                      Aug 29, 2024 21:11:09.225115061 CEST1.1.1.1192.168.2.40xfefcNo error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                      Aug 29, 2024 21:11:34.051213980 CEST1.1.1.1192.168.2.40x6f03Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                      • wails.localhost
                                                                        • code.jquery.com
                                                                        • raw.githubusercontent.com
                                                                      • chrome.cloudflare-dns.com
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.449739151.101.130.1374437936C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-08-29 19:11:05 UTC607OUTGET /jquery-3.7.1.min.js HTTP/1.1
                                                                      Host: code.jquery.com
                                                                      Connection: keep-alive
                                                                      Accept: */*
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47 wails.io
                                                                      sec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117", "Microsoft Edge WebView2";v="117"
                                                                      sec-ch-ua-mobile: ?0
                                                                      sec-ch-ua-platform: "Windows"
                                                                      Sec-Fetch-Site: cross-site
                                                                      Sec-Fetch-Mode: no-cors
                                                                      Sec-Fetch-Dest: script
                                                                      Referer: http://wails.localhost/
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Accept-Language: en-GB,en;q=0.9,en-US;q=0.8
                                                                      2024-08-29 19:11:05 UTC613INHTTP/1.1 200 OK
                                                                      Connection: close
                                                                      Content-Length: 87533
                                                                      Server: nginx
                                                                      Content-Type: application/javascript; charset=utf-8
                                                                      Last-Modified: Fri, 18 Oct 1991 12:00:00 GMT
                                                                      ETag: "28feccc0-155ed"
                                                                      Cache-Control: public, max-age=31536000, stale-while-revalidate=604800
                                                                      Access-Control-Allow-Origin: *
                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                      Via: 1.1 varnish, 1.1 varnish
                                                                      Accept-Ranges: bytes
                                                                      Date: Thu, 29 Aug 2024 19:11:05 GMT
                                                                      Age: 1949469
                                                                      X-Served-By: cache-lga21978-LGA, cache-ewr-kewr1740024-EWR
                                                                      X-Cache: HIT, HIT
                                                                      X-Cache-Hits: 2248, 6
                                                                      X-Timer: S1724958666.556856,VS0,VE0
                                                                      Vary: Accept-Encoding
                                                                      2024-08-29 19:11:05 UTC1378INData Raw: 2f 2a 21 20 6a 51 75 65 72 79 20 76 33 2e 37 2e 31 20 7c 20 28 63 29 20 4f 70 65 6e 4a 53 20 46 6f 75 6e 64 61 74 69 6f 6e 20 61 6e 64 20 6f 74 68 65 72 20 63 6f 6e 74 72 69 62 75 74 6f 72 73 20 7c 20 6a 71 75 65 72 79 2e 6f 72 67 2f 6c 69 63 65 6e 73 65 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 65 2c 74 29 7b 22 75 73 65 20 73 74 72 69 63 74 22 3b 22 6f 62 6a 65 63 74 22 3d 3d 74 79 70 65 6f 66 20 6d 6f 64 75 6c 65 26 26 22 6f 62 6a 65 63 74 22 3d 3d 74 79 70 65 6f 66 20 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 3f 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 3d 65 2e 64 6f 63 75 6d 65 6e 74 3f 74 28 65 2c 21 30 29 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 69 66 28 21 65 2e 64 6f 63 75 6d 65 6e 74 29 74 68 72 6f 77 20 6e 65 77 20 45 72 72 6f 72 28 22 6a 51 75
                                                                      Data Ascii: /*! jQuery v3.7.1 | (c) OpenJS Foundation and other contributors | jquery.org/license */!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQu
                                                                      2024-08-29 19:11:05 UTC1378INData Raw: 3d 3d 74 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 7d 63 65 2e 66 6e 3d 63 65 2e 70 72 6f 74 6f 74 79 70 65 3d 7b 6a 71 75 65 72 79 3a 74 2c 63 6f 6e 73 74 72 75 63 74 6f 72 3a 63 65 2c 6c 65 6e 67 74 68 3a 30 2c 74 6f 41 72 72 61 79 3a 66 75 6e 63 74 69 6f 6e 28 29 7b 72 65 74 75 72 6e 20 61 65 2e 63 61 6c 6c 28 74 68 69 73 29 7d 2c 67 65 74 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 72 65 74 75 72 6e 20 6e 75 6c 6c 3d 3d 65 3f 61 65 2e 63 61 6c 6c 28 74 68 69 73 29 3a 65 3c 30 3f 74 68 69 73 5b 65 2b 74 68 69 73 2e 6c 65 6e 67 74 68 5d 3a 74 68 69 73 5b 65 5d 7d 2c 70 75 73 68 53 74 61 63 6b 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 76 61 72 20 74 3d 63 65 2e 6d 65 72 67 65 28 74 68 69 73 2e 63 6f 6e 73 74 72 75 63 74 6f 72 28 29 2c 65 29 3b 72 65 74 75 72 6e
                                                                      Data Ascii: ==t.toLowerCase()}ce.fn=ce.prototype={jquery:t,constructor:ce,length:0,toArray:function(){return ae.call(this)},get:function(e){return null==e?ae.call(this):e<0?this[e+this.length]:this[e]},pushStack:function(e){var t=ce.merge(this.constructor(),e);return
                                                                      2024-08-29 19:11:05 UTC1378INData Raw: 22 2b 28 74 2b 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 29 2e 72 65 70 6c 61 63 65 28 2f 5c 44 2f 67 2c 22 22 29 2c 69 73 52 65 61 64 79 3a 21 30 2c 65 72 72 6f 72 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 74 68 72 6f 77 20 6e 65 77 20 45 72 72 6f 72 28 65 29 7d 2c 6e 6f 6f 70 3a 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 2c 69 73 50 6c 61 69 6e 4f 62 6a 65 63 74 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 76 61 72 20 74 2c 6e 3b 72 65 74 75 72 6e 21 28 21 65 7c 7c 22 5b 6f 62 6a 65 63 74 20 4f 62 6a 65 63 74 5d 22 21 3d 3d 69 2e 63 61 6c 6c 28 65 29 29 26 26 28 21 28 74 3d 72 28 65 29 29 7c 7c 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 28 6e 3d 75 65 2e 63 61 6c 6c 28 74 2c 22 63 6f 6e 73 74 72 75 63 74 6f 72 22 29 26 26 74 2e 63 6f 6e 73 74 72 75 63 74 6f 72
                                                                      Data Ascii: "+(t+Math.random()).replace(/\D/g,""),isReady:!0,error:function(e){throw new Error(e)},noop:function(){},isPlainObject:function(e){var t,n;return!(!e||"[object Object]"!==i.call(e))&&(!(t=r(e))||"function"==typeof(n=ue.call(t,"constructor")&&t.constructor
                                                                      2024-08-29 19:11:05 UTC1378INData Raw: 74 75 72 6e 20 67 28 61 29 7d 2c 67 75 69 64 3a 31 2c 73 75 70 70 6f 72 74 3a 6c 65 7d 29 2c 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 53 79 6d 62 6f 6c 26 26 28 63 65 2e 66 6e 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 6f 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 29 2c 63 65 2e 65 61 63 68 28 22 42 6f 6f 6c 65 61 6e 20 4e 75 6d 62 65 72 20 53 74 72 69 6e 67 20 46 75 6e 63 74 69 6f 6e 20 41 72 72 61 79 20 44 61 74 65 20 52 65 67 45 78 70 20 4f 62 6a 65 63 74 20 45 72 72 6f 72 20 53 79 6d 62 6f 6c 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 66 75 6e 63 74 69 6f 6e 28 65 2c 74 29 7b 6e 5b 22 5b 6f 62 6a 65 63 74 20 22 2b 74 2b 22 5d 22 5d 3d 74 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 7d 29 3b 76 61 72 20 70 65 3d 6f 65 2e
                                                                      Data Ascii: turn g(a)},guid:1,support:le}),"function"==typeof Symbol&&(ce.fn[Symbol.iterator]=oe[Symbol.iterator]),ce.each("Boolean Number String Function Array Date RegExp Object Error Symbol".split(" "),function(e,t){n["[object "+t+"]"]=t.toLowerCase()});var pe=oe.
                                                                      2024-08-29 19:11:05 UTC1378INData Raw: 67 45 78 70 28 22 5e 22 2b 67 65 2b 22 2a 2c 22 2b 67 65 2b 22 2a 22 29 2c 6d 3d 6e 65 77 20 52 65 67 45 78 70 28 22 5e 22 2b 67 65 2b 22 2a 28 5b 3e 2b 7e 5d 7c 22 2b 67 65 2b 22 29 22 2b 67 65 2b 22 2a 22 29 2c 78 3d 6e 65 77 20 52 65 67 45 78 70 28 67 65 2b 22 7c 3e 22 29 2c 6a 3d 6e 65 77 20 52 65 67 45 78 70 28 67 29 2c 41 3d 6e 65 77 20 52 65 67 45 78 70 28 22 5e 22 2b 74 2b 22 24 22 29 2c 44 3d 7b 49 44 3a 6e 65 77 20 52 65 67 45 78 70 28 22 5e 23 28 22 2b 74 2b 22 29 22 29 2c 43 4c 41 53 53 3a 6e 65 77 20 52 65 67 45 78 70 28 22 5e 5c 5c 2e 28 22 2b 74 2b 22 29 22 29 2c 54 41 47 3a 6e 65 77 20 52 65 67 45 78 70 28 22 5e 28 22 2b 74 2b 22 7c 5b 2a 5d 29 22 29 2c 41 54 54 52 3a 6e 65 77 20 52 65 67 45 78 70 28 22 5e 22 2b 70 29 2c 50 53 45 55 44 4f
                                                                      Data Ascii: gExp("^"+ge+"*,"+ge+"*"),m=new RegExp("^"+ge+"*([>+~]|"+ge+")"+ge+"*"),x=new RegExp(ge+"|>"),j=new RegExp(g),A=new RegExp("^"+t+"$"),D={ID:new RegExp("^#("+t+")"),CLASS:new RegExp("^\\.("+t+")"),TAG:new RegExp("^("+t+"|[*])"),ATTR:new RegExp("^"+p),PSEUDO
                                                                      2024-08-29 19:11:05 UTC1378INData Raw: 26 28 75 3d 4c 2e 65 78 65 63 28 74 29 29 29 69 66 28 69 3d 75 5b 31 5d 29 7b 69 66 28 39 3d 3d 3d 70 29 7b 69 66 28 21 28 61 3d 65 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 69 29 29 29 72 65 74 75 72 6e 20 6e 3b 69 66 28 61 2e 69 64 3d 3d 3d 69 29 72 65 74 75 72 6e 20 6b 2e 63 61 6c 6c 28 6e 2c 61 29 2c 6e 7d 65 6c 73 65 20 69 66 28 66 26 26 28 61 3d 66 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 69 29 29 26 26 49 2e 63 6f 6e 74 61 69 6e 73 28 65 2c 61 29 26 26 61 2e 69 64 3d 3d 3d 69 29 72 65 74 75 72 6e 20 6b 2e 63 61 6c 6c 28 6e 2c 61 29 2c 6e 7d 65 6c 73 65 7b 69 66 28 75 5b 32 5d 29 72 65 74 75 72 6e 20 6b 2e 61 70 70 6c 79 28 6e 2c 65 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 54 61 67 4e 61 6d 65 28 74 29 29 2c 6e 3b 69 66 28 28 69 3d 75
                                                                      Data Ascii: &(u=L.exec(t)))if(i=u[1]){if(9===p){if(!(a=e.getElementById(i)))return n;if(a.id===i)return k.call(n,a),n}else if(f&&(a=f.getElementById(i))&&I.contains(e,a)&&a.id===i)return k.call(n,a),n}else{if(u[2])return k.apply(n,e.getElementsByTagName(t)),n;if((i=u
                                                                      2024-08-29 19:11:05 UTC1378INData Raw: 65 29 3d 3d 3d 74 3a 65 2e 64 69 73 61 62 6c 65 64 3d 3d 3d 74 3a 22 6c 61 62 65 6c 22 69 6e 20 65 26 26 65 2e 64 69 73 61 62 6c 65 64 3d 3d 3d 74 7d 7d 66 75 6e 63 74 69 6f 6e 20 58 28 61 29 7b 72 65 74 75 72 6e 20 46 28 66 75 6e 63 74 69 6f 6e 28 6f 29 7b 72 65 74 75 72 6e 20 6f 3d 2b 6f 2c 46 28 66 75 6e 63 74 69 6f 6e 28 65 2c 74 29 7b 76 61 72 20 6e 2c 72 3d 61 28 5b 5d 2c 65 2e 6c 65 6e 67 74 68 2c 6f 29 2c 69 3d 72 2e 6c 65 6e 67 74 68 3b 77 68 69 6c 65 28 69 2d 2d 29 65 5b 6e 3d 72 5b 69 5d 5d 26 26 28 65 5b 6e 5d 3d 21 28 74 5b 6e 5d 3d 65 5b 6e 5d 29 29 7d 29 7d 29 7d 66 75 6e 63 74 69 6f 6e 20 55 28 65 29 7b 72 65 74 75 72 6e 20 65 26 26 22 75 6e 64 65 66 69 6e 65 64 22 21 3d 74 79 70 65 6f 66 20 65 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 54
                                                                      Data Ascii: e)===t:e.disabled===t:"label"in e&&e.disabled===t}}function X(a){return F(function(o){return o=+o,F(function(e,t){var n,r=a([],e.length,o),i=r.length;while(i--)e[n=r[i]]&&(e[n]=!(t[n]=e[n]))})})}function U(e){return e&&"undefined"!=typeof e.getElementsByT
                                                                      2024-08-29 19:11:05 UTC1378INData Raw: 28 28 6e 3d 6f 2e 67 65 74 41 74 74 72 69 62 75 74 65 4e 6f 64 65 28 22 69 64 22 29 29 26 26 6e 2e 76 61 6c 75 65 3d 3d 3d 65 29 72 65 74 75 72 6e 5b 6f 5d 3b 69 3d 74 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 4e 61 6d 65 28 65 29 2c 72 3d 30 3b 77 68 69 6c 65 28 6f 3d 69 5b 72 2b 2b 5d 29 69 66 28 28 6e 3d 6f 2e 67 65 74 41 74 74 72 69 62 75 74 65 4e 6f 64 65 28 22 69 64 22 29 29 26 26 6e 2e 76 61 6c 75 65 3d 3d 3d 65 29 72 65 74 75 72 6e 5b 6f 5d 7d 72 65 74 75 72 6e 5b 5d 7d 7d 29 2c 62 2e 66 69 6e 64 2e 54 41 47 3d 66 75 6e 63 74 69 6f 6e 28 65 2c 74 29 7b 72 65 74 75 72 6e 22 75 6e 64 65 66 69 6e 65 64 22 21 3d 74 79 70 65 6f 66 20 74 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 54 61 67 4e 61 6d 65 3f 74 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 54 61
                                                                      Data Ascii: ((n=o.getAttributeNode("id"))&&n.value===e)return[o];i=t.getElementsByName(e),r=0;while(o=i[r++])if((n=o.getAttributeNode("id"))&&n.value===e)return[o]}return[]}}),b.find.TAG=function(e,t){return"undefined"!=typeof t.getElementsByTagName?t.getElementsByTa
                                                                      2024-08-29 19:11:05 UTC1378INData Raw: 3d 28 65 2e 6f 77 6e 65 72 44 6f 63 75 6d 65 6e 74 7c 7c 65 29 3d 3d 28 74 2e 6f 77 6e 65 72 44 6f 63 75 6d 65 6e 74 7c 7c 74 29 3f 65 2e 63 6f 6d 70 61 72 65 44 6f 63 75 6d 65 6e 74 50 6f 73 69 74 69 6f 6e 28 74 29 3a 31 29 7c 7c 21 6c 65 2e 73 6f 72 74 44 65 74 61 63 68 65 64 26 26 74 2e 63 6f 6d 70 61 72 65 44 6f 63 75 6d 65 6e 74 50 6f 73 69 74 69 6f 6e 28 65 29 3d 3d 3d 6e 3f 65 3d 3d 3d 54 7c 7c 65 2e 6f 77 6e 65 72 44 6f 63 75 6d 65 6e 74 3d 3d 79 65 26 26 49 2e 63 6f 6e 74 61 69 6e 73 28 79 65 2c 65 29 3f 2d 31 3a 74 3d 3d 3d 54 7c 7c 74 2e 6f 77 6e 65 72 44 6f 63 75 6d 65 6e 74 3d 3d 79 65 26 26 49 2e 63 6f 6e 74 61 69 6e 73 28 79 65 2c 74 29 3f 31 3a 6f 3f 73 65 2e 63 61 6c 6c 28 6f 2c 65 29 2d 73 65 2e 63 61 6c 6c 28 6f 2c 74 29 3a 30 3a 34 26
                                                                      Data Ascii: =(e.ownerDocument||e)==(t.ownerDocument||t)?e.compareDocumentPosition(t):1)||!le.sortDetached&&t.compareDocumentPosition(e)===n?e===T||e.ownerDocument==ye&&I.contains(ye,e)?-1:t===T||t.ownerDocument==ye&&I.contains(ye,t)?1:o?se.call(o,e)-se.call(o,t):0:4&
                                                                      2024-08-29 19:11:05 UTC1378INData Raw: 72 3a 7b 41 54 54 52 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 72 65 74 75 72 6e 20 65 5b 31 5d 3d 65 5b 31 5d 2e 72 65 70 6c 61 63 65 28 4f 2c 50 29 2c 65 5b 33 5d 3d 28 65 5b 33 5d 7c 7c 65 5b 34 5d 7c 7c 65 5b 35 5d 7c 7c 22 22 29 2e 72 65 70 6c 61 63 65 28 4f 2c 50 29 2c 22 7e 3d 22 3d 3d 3d 65 5b 32 5d 26 26 28 65 5b 33 5d 3d 22 20 22 2b 65 5b 33 5d 2b 22 20 22 29 2c 65 2e 73 6c 69 63 65 28 30 2c 34 29 7d 2c 43 48 49 4c 44 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 72 65 74 75 72 6e 20 65 5b 31 5d 3d 65 5b 31 5d 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 2c 22 6e 74 68 22 3d 3d 3d 65 5b 31 5d 2e 73 6c 69 63 65 28 30 2c 33 29 3f 28 65 5b 33 5d 7c 7c 49 2e 65 72 72 6f 72 28 65 5b 30 5d 29 2c 65 5b 34 5d 3d 2b 28 65 5b 34 5d 3f 65 5b 35 5d 2b 28 65 5b 36 5d 7c
                                                                      Data Ascii: r:{ATTR:function(e){return e[1]=e[1].replace(O,P),e[3]=(e[3]||e[4]||e[5]||"").replace(O,P),"~="===e[2]&&(e[3]=" "+e[3]+" "),e.slice(0,4)},CHILD:function(e){return e[1]=e[1].toLowerCase(),"nth"===e[1].slice(0,3)?(e[3]||I.error(e[0]),e[4]=+(e[4]?e[5]+(e[6]|


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.449741185.199.111.1334437936C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-08-29 19:11:06 UTC712OUTGET /n3r4zzurr0/svg-spinners/main/preview/90-ring-with-bg-black-36.svg HTTP/1.1
                                                                      Host: raw.githubusercontent.com
                                                                      Connection: keep-alive
                                                                      Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47 wails.io
                                                                      sec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117", "Microsoft Edge WebView2";v="117"
                                                                      sec-ch-ua-mobile: ?0
                                                                      sec-ch-ua-platform: "Windows"
                                                                      Sec-Fetch-Site: cross-site
                                                                      Sec-Fetch-Mode: no-cors
                                                                      Sec-Fetch-Dest: image
                                                                      Referer: http://wails.localhost/
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Accept-Language: en-GB,en;q=0.9,en-US;q=0.8
                                                                      2024-08-29 19:11:06 UTC886INHTTP/1.1 200 OK
                                                                      Connection: close
                                                                      Content-Length: 531
                                                                      Cache-Control: max-age=300
                                                                      Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                      Content-Type: image/svg+xml
                                                                      ETag: "27865e1fad782aec8742a813a703a426396454d54d88d07c4559f769814d403a"
                                                                      Strict-Transport-Security: max-age=31536000
                                                                      X-Content-Type-Options: nosniff
                                                                      X-Frame-Options: deny
                                                                      X-XSS-Protection: 1; mode=block
                                                                      X-GitHub-Request-Id: 5633:7F44E:82B60F:8F94B9:66D0C7C9
                                                                      Accept-Ranges: bytes
                                                                      Date: Thu, 29 Aug 2024 19:11:06 GMT
                                                                      Via: 1.1 varnish
                                                                      X-Served-By: cache-ewr-kewr1740055-EWR
                                                                      X-Cache: MISS
                                                                      X-Cache-Hits: 0
                                                                      X-Timer: S1724958666.186851,VS0,VE51
                                                                      Vary: Authorization,Accept-Encoding,Origin
                                                                      Access-Control-Allow-Origin: *
                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                      X-Fastly-Request-ID: 5147675e1ef5b5d37c2baa10f6f5d547126d2d9a
                                                                      Expires: Thu, 29 Aug 2024 19:16:06 GMT
                                                                      Source-Age: 0
                                                                      2024-08-29 19:11:06 UTC531INData Raw: 3c 73 76 67 20 77 69 64 74 68 3d 22 33 36 22 20 68 65 69 67 68 74 3d 22 33 36 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 32 34 20 32 34 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 3e 3c 73 74 79 6c 65 3e 2e 73 70 69 6e 6e 65 72 5f 61 6a 50 59 7b 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 63 65 6e 74 65 72 3b 61 6e 69 6d 61 74 69 6f 6e 3a 73 70 69 6e 6e 65 72 5f 41 74 61 42 20 2e 37 35 73 20 69 6e 66 69 6e 69 74 65 20 6c 69 6e 65 61 72 7d 40 6b 65 79 66 72 61 6d 65 73 20 73 70 69 6e 6e 65 72 5f 41 74 61 42 7b 31 30 30 25 7b 74 72 61 6e 73 66 6f 72 6d 3a 72 6f 74 61 74 65 28 33 36 30 64 65 67 29 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 70 61 74 68 20 64 3d 22 4d 31 32 2c 31 41 31 31 2c 31 31
                                                                      Data Ascii: <svg width="36" height="36" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"><style>.spinner_ajPY{transform-origin:center;animation:spinner_AtaB .75s infinite linear}@keyframes spinner_AtaB{100%{transform:rotate(360deg)}}</style><path d="M12,1A11,11


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.449748162.159.61.34437936C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-08-29 19:11:09 UTC245OUTPOST /dns-query HTTP/1.1
                                                                      Host: chrome.cloudflare-dns.com
                                                                      Connection: keep-alive
                                                                      Content-Length: 128
                                                                      Accept: application/dns-message
                                                                      Accept-Language: *
                                                                      User-Agent: Chrome
                                                                      Accept-Encoding: identity
                                                                      Content-Type: application/dns-message
                                                                      2024-08-29 19:11:09 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                      Data Ascii: wwwgstaticcom)TP
                                                                      2024-08-29 19:11:09 UTC247INHTTP/1.1 200 OK
                                                                      Server: cloudflare
                                                                      Date: Thu, 29 Aug 2024 19:11:09 GMT
                                                                      Content-Type: application/dns-message
                                                                      Connection: close
                                                                      Access-Control-Allow-Origin: *
                                                                      Content-Length: 468
                                                                      CF-RAY: 8baed8664c220f3b-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      2024-08-29 19:11:09 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 01 1e 00 04 8e fb 23 a3 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                      Data Ascii: wwwgstaticcom#)


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.449747172.64.41.34437936C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-08-29 19:11:09 UTC245OUTPOST /dns-query HTTP/1.1
                                                                      Host: chrome.cloudflare-dns.com
                                                                      Connection: keep-alive
                                                                      Content-Length: 128
                                                                      Accept: application/dns-message
                                                                      Accept-Language: *
                                                                      User-Agent: Chrome
                                                                      Accept-Encoding: identity
                                                                      Content-Type: application/dns-message
                                                                      2024-08-29 19:11:09 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                      Data Ascii: wwwgstaticcom)TP
                                                                      2024-08-29 19:11:09 UTC247INHTTP/1.1 200 OK
                                                                      Server: cloudflare
                                                                      Date: Thu, 29 Aug 2024 19:11:09 GMT
                                                                      Content-Type: application/dns-message
                                                                      Connection: close
                                                                      Access-Control-Allow-Origin: *
                                                                      Content-Length: 468
                                                                      CF-RAY: 8baed8665df94309-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      2024-08-29 19:11:09 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 00 c1 00 04 8e fa 50 43 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                      Data Ascii: wwwgstaticcomPC)


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:15:10:59
                                                                      Start date:29/08/2024
                                                                      Path:C:\Users\user\Desktop\BrowserUpdateTool.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Users\user\Desktop\BrowserUpdateTool.exe"
                                                                      Imagebase:0x7ff6ea600000
                                                                      File size:99'319'784 bytes
                                                                      MD5 hash:9E89FEFAA6E3D99C3824D5E68DC8D3A2
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:Go lang
                                                                      Reputation:low
                                                                      Has exited:false

                                                                      Target ID:2
                                                                      Start time:15:11:00
                                                                      Start date:29/08/2024
                                                                      Path:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=BrowserUpdateTool.exe --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=7536.7584.8340987022922056471
                                                                      Imagebase:0x7ff664760000
                                                                      File size:3'749'328 bytes
                                                                      MD5 hash:9909D978B39FB7369F511D8506C17CA0
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:3
                                                                      Start time:15:11:01
                                                                      Start date:29/08/2024
                                                                      Path:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdfb1c8e88,0x7ffdfb1c8e98,0x7ffdfb1c8ea8
                                                                      Imagebase:0x7ff664760000
                                                                      File size:3'749'328 bytes
                                                                      MD5 hash:9909D978B39FB7369F511D8506C17CA0
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:5
                                                                      Start time:15:11:02
                                                                      Start date:29/08/2024
                                                                      Path:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1788 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2
                                                                      Imagebase:0x7ff664760000
                                                                      File size:3'749'328 bytes
                                                                      MD5 hash:9909D978B39FB7369F511D8506C17CA0
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:6
                                                                      Start time:15:11:02
                                                                      Start date:29/08/2024
                                                                      Path:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2780 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:3
                                                                      Imagebase:0x7ff664760000
                                                                      File size:3'749'328 bytes
                                                                      MD5 hash:9909D978B39FB7369F511D8506C17CA0
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:7
                                                                      Start time:15:11:02
                                                                      Start date:29/08/2024
                                                                      Path:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3020 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:8
                                                                      Imagebase:0x7ff664760000
                                                                      File size:3'749'328 bytes
                                                                      MD5 hash:9909D978B39FB7369F511D8506C17CA0
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:8
                                                                      Start time:15:11:02
                                                                      Start date:29/08/2024
                                                                      Path:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1724954327302821 --launch-time-ticks=4335514542 --mojo-platform-channel-handle=3508 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:1
                                                                      Imagebase:0x7ff664760000
                                                                      File size:3'749'328 bytes
                                                                      MD5 hash:9909D978B39FB7369F511D8506C17CA0
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:15
                                                                      Start time:15:13:02
                                                                      Start date:29/08/2024
                                                                      Path:C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="C:\Users\user\AppData\Roaming\BrowserUpdateTool.exe\EBWebView" --webview-exe-name=BrowserUpdateTool.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4536 --field-trial-handle=1792,i,7808837177777861940,6408982360356111554,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection /prefetch:2
                                                                      Imagebase:0x7ff664760000
                                                                      File size:3'749'328 bytes
                                                                      MD5 hash:9909D978B39FB7369F511D8506C17CA0
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      No disassembly