{"prion": [{"lastseen": "2023-11-20T23:44:28", "description": "Windows Kernel Elevation of Privilege Vulnerability", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T20:15:00", "type": "prion", "title": "Privilege escalation", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35768"], "modified": "2023-05-31T19:15:00", "id": "PRION:CVE-2022-35768", "href": "https://www.prio-n.com/kb/vulnerability/CVE-2022-35768", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}], "mscve": [{"lastseen": "2023-12-03T21:50:33", "description": "", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mscve", "title": "Windows Kernel Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-35768"], "modified": "2022-08-09T07:00:00", "id": "MS:CVE-2022-35768", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35768", "cvss": {"score": 4.3, "vector": "AV:L/AC:L/Au:S/C:P/I:P/A:P"}}], "mskb": [{"lastseen": "2022-08-24T11:36:37", "description": "None\n## **Summary**\n\nThis security update resolves vulnerabilities in Internet Explorer. To learn more about these vulnerabilities, see [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>).Additionally, see the following articles for more information about cumulative updates:\n\n * [Windows Server 2008 SP2 update history](<https://support.microsoft.com/help/4343218>)\n * [Windows 7 SP1 and Windows Server 2008 R2 SP1 update history](<https://support.microsoft.com/help/4009469>)\n * [Windows Server 2012 update history](<https://support.microsoft.com/help/4009471>)\n * [Windows 8.1 and Windows Server 2012 R2 update history](<https://support.microsoft.com/help/4009470>)\n\n**Important**\n\n * As of February 11, 2020, Internet Explorer 10 is no longer in support. To get Internet Explorer 11 for Windows Server 2012 or Windows 8 Embedded Standard, see [KB4492872](<https://support.microsoft.com/help/4492872>). Install one of the following applicable updates to stay updated with the latest security improvements:\n * Cumulative Update for Internet Explorer 11 for Windows Server 2012.\n * Cumulative Update for Internet Explorer 11 for Windows 8 Embedded Standard.\n * The August 2022 Monthly Rollup.\n * Some customers using Windows Server 2008 R2 SP1 who activated their ESU multiple activation key (MAK) add-on before installing the January 14, 2020 updates might need to re-activate their key. Re-activation of affected devices should only be required once. For information on activation, see this [blog](<https://aka.ms/Windows7ESU>) post.\n * WSUS scan cab files will continue to be available for Windows 7 SP1 and Windows Server 2008 R2 SP1. If you have a subset of devices running these operating systems without ESU, they might show as non-compliant in your update management and compliance toolsets.\n * Microsoft Internet Explorer has reached the end of servicing as of June 15, 2022 for certain operating systems. To continue receiving security and quality updates, we recommend that you update to [Microsoft Edge](<https://www.microsoft.com/en-us/edge>). For more information on the lifecycle policy for Internet Explorer, see [here](<https://docs.microsoft.com/en-us/lifecycle/faq/internet-explorer-microsoft-edge#what-is-the-lifecycle-policy-for-internet-explorer->).\n\nThis update applies to the following:\n\n * Internet Explorer 11 on Windows Server 2012 R2\n * Internet Explorer 11 on Windows 8.1\n * Internet Explorer 11 on Windows Server 2012\n * Internet Explorer 11 on Windows Server 2008 R2 SP1\n * Internet Explorer 11 on Windows 7 SP1\n\n**Note: **There is no update this release for Internet Explorer 9 on Windows Server 2008 SP2. For the latest update for Internet Explorer 9, see update [KB5011486](<https://support.microsoft.com/help/5011486>).\n\n**Important**\n\n * The improvements that are included in this update are also included in the August 2022 Security Monthly Quality Rollup. Installing either this update or the Security Monthly Quality Rollup installs the same improvements.\n * This update is not applicable for installation on a device on which the Security Monthly Quality Rollup from August 2022 (or a later month) is already installed. This is because that update contains all the same improvements that are included in this update.\n * If you use update management processes other than Windows Update and you automatically approve all security update classifications for deployment, this update, the August 2022 Security Only Quality Update, and the August 2022 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/library/hh825699>).\n\n## **Known issues in this security update**\n\nWe are currently not aware of any issues in this update.\n\n## **How to get and install this update**\n\n**Before installing this update**To install Windows 7 SP1, Windows Server 2008 R2 SP1, or Windows Server 2008 SP2 updates released on or after July 2019, you must have the following required updates installed. If you use Windows Update, these required updates will be offered automatically as needed.\n\n * Install the SHA-2 code signing support updates: \n \nFor Windows 7 SP1, Windows Server 2008 R2, and Windows Server 2008 SP2, you must have the SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) that is dated September 23, 2019 or a later SHA-2 update installed and then restart your device before you apply this update. For more information about SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>). \n \nFor Windows 7 SP1 and Windows Server 2008 R2 SP1, you must have installed the servicing stack update (SSU) ([KB4490628](<https://support.microsoft.com/help/4490628>)) that is dated March 12, 2019. After update [KB4490628](<https://support.microsoft.com/help/4490628>) is installed, we recommend that you install the July 12, 2022 SSU ([KB5016057](<https://support.microsoft.com/help/5016057>)) or a later SSU update. For more information about the latest SSU updates, see [ADV990001 | Latest Servicing Stack Updates](<https://portal.msrc.microsoft.com/security-guidance/advisory/ADV990001>). \n \nFor Windows Server 2008 SP2, you must have installed the servicing stack update (SSU) ([KB4493730](<https://support.microsoft.com/help/4493730>)) that is dated April 9, 2019. After update [KB4493730](<https://support.microsoft.com/help/4493730>) is installed, we recommend that you install the July 12, 2022 SSU ([KB5016129](<https://support.microsoft.com/help/5016129>)) or a later SSU update. For more information about the latest SSU updates, see [ADV990001 | Latest Servicing Stack Updates](<https://portal.msrc.microsoft.com/security-guidance/advisory/ADV990001>).\n * Install the Extended Security Update (ESU): \n \nFor Windows 7 SP1 and Windows Server 2008 R2 SP1, you must have installed the \"Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4538483](<https://support.microsoft.com/en/help/4538483>)) or the \"Update for the Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4575903](<https://support.microsoft.com/help/4575903>)). The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). \n \nFor Windows 7 SP1, Windows Server 2008 R2 SP1, and Windows Server 2008 SP2, you must have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems and follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ends. Extended support ends as follows:\n * For Windows 7 SP1, Windows Server 2008 R2 SP1, and Windows Server 2008 SP2, extended support ended on January 14, 2020.\n * For Windows Embedded Standard 7, extended support ended on October 13, 2020.\nFor more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>). \n \nFor Windows Embedded Standard 7, Windows Management Instrumentation (WMI) must be enabled to get updates from Windows Update or Windows Server Update Services.\n\n**Important** You must restart your device after you install these required updates.\n\n**Install this update**To install this update, use one of the following release channels.**Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other following options. \nWindows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016618>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically synchronize with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2008 Service Pack 2, Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1, Windows Server 2012, Windows Embedded 8 Standard, Windows 8.1, Windows Server 2012 R2**Classification**: Security Updates \n \n## **File information**\n\nThe English (United States) version of this software update installs files that have the attributes that are listed in the following tables.**Note** The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.\n\n### **Windows 8.1, Windows RT 8.1 and Windows Server 2012 R2**\n\n## \n\n__\n\nInternet Explorer 11 on all supported x86-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nactxprxy.dll| 6.3.9600.20512| 11-Jul-2022| 20:51| 1,049,600 \nhlink.dll| 6.3.9600.20512| 11-Jul-2022| 21:11| 103,936 \npngfilt.dll| 11.0.9600.20512| 11-Jul-2022| 21:24| 58,368 \nurlmon.dll| 11.0.9600.20512| 11-Jul-2022| 20:45| 1,342,976 \niexplore.exe| 11.0.9600.20512| 11-Jul-2022| 22:23| 811,416 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 31,232 \nWininetPlugin.dll| 6.3.9600.20512| 11-Jul-2022| 21:15| 35,328 \nhtml.iec| 2019.0.0.20512| 11-Jul-2022| 21:22| 341,504 \ninetcpl.cpl| 11.0.9600.20512| 11-Jul-2022| 20:57| 2,058,752 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:03| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:37| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 243,200 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 73,728 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 78,848 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 74,752 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 62,464 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 75,264 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 72,192 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 73,216 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 41,472 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 37,888 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 70,656 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 71,680 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 69,632 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 59,904 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 69,120 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 29,696 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 30,720 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 30,720 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 60,416 \nDiagnosticsHub.ScriptedSandboxPlugin.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 230,912 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 35,328 \nwininet.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 4,387,840 \njsproxy.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 47,104 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:03| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 88,064 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 74,752 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 75,776 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 75,776 \nieui.dll| 11.0.9600.20512| 11-Jul-2022| 21:16| 476,160 \niedkcs32.dll| 18.0.9600.20512| 11-Jul-2022| 20:58| 333,312 \ninstall.ins| Not versioned| 11-Jul-2022| 19:17| 464 \nieapfltr.dat| 10.0.9301.0| 18-Jan-2022| 16:54| 616,104 \nieapfltr.dll| 11.0.9600.20512| 11-Jul-2022| 20:41| 710,656 \niepeers.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 128,512 \nlicmgr10.dll| 11.0.9600.20512| 11-Jul-2022| 21:11| 27,136 \ntdc.ocx| 11.0.9600.20512| 11-Jul-2022| 21:06| 73,728 \nDiagnosticsHub.DataWarehouse.dll| 11.0.9600.20512| 11-Jul-2022| 21:25| 489,472 \niedvtool.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 772,608 \nDiagnosticsHub_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:26| 38,912 \ndxtmsft.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 415,744 \ndxtrans.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 280,064 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 3,584 \nF12.dll| 11.0.9600.20512| 11-Jul-2022| 21:01| 1,207,808 \nDiagnosticsTap.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 175,104 \nMicrosoft-Windows-IE-F12-Provider.ptxml| Not versioned| 11-Jul-2022| 19:27| 11,892 \nF12Resources.dll| 11.0.9600.20512| 11-Jul-2022| 21:28| 10,948,096 \nF12Tools.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 256,000 \nmsfeedsbs.mof| Not versioned| 18-Jan-2022| 16:55| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 52,736 \nmsfeedssync.exe| 11.0.9600.20512| 11-Jul-2022| 21:23| 11,776 \nmsfeeds.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 696,320 \nmsfeeds.mof| Not versioned| 18-Jan-2022| 16:55| 1,518 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,066,432 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:36| 2,121,216 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,075,136 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:38| 2,063,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,314,240 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,390,528 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,034,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:05| 2,033,152 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,255,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,061,312 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,326,016 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,019,840 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,071,040 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,082,816 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,170,368 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,153,984 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,291,712 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,283,520 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,052,096 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,301,952 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,093,056 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,075,648 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 2,299,392 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 2,094,592 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,316,800 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 2,305,536 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,286,080 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,060,288 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 2,315,776 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 2,324,992 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 2,098,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 1,890,304 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 1,890,304 \nieframe.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 13,885,440 \nieframe.ptxml| Not versioned| 18-Jan-2022| 16:55| 24,486 \nmshta.exe| 11.0.9600.20512| 11-Jul-2022| 21:25| 12,800 \nmshtmled.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 76,800 \nmshtml.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 20,296,192 \nmshtml.tlb| 11.0.9600.16384| 18-Jan-2022| 16:55| 2,724,864 \nMicrosoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 18-Jan-2022| 16:55| 3,228 \nIEAdvpack.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 112,128 \nieetwcollector.exe| 11.0.9600.20512| 11-Jul-2022| 21:16| 104,960 \nieetwproxystub.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 47,616 \nieetwcollectorres.dll| 11.0.9600.16384| 18-Jan-2022| 16:55| 4,096 \nielowutil.exe| 11.0.9600.20512| 11-Jul-2022| 21:17| 221,184 \nieproxy.dll| 11.0.9600.20512| 11-Jul-2022| 20:40| 310,784 \nIEShims.dll| 11.0.9600.20512| 11-Jul-2022| 20:43| 290,304 \niexpress.exe| 11.0.9600.20512| 11-Jul-2022| 21:24| 152,064 \nwextract.exe| 11.0.9600.20512| 11-Jul-2022| 21:25| 137,728 \nimgutil.dll| 11.0.9600.20512| 11-Jul-2022| 20:49| 40,448 \nExtExport.exe| 11.0.9600.20512| 11-Jul-2022| 21:20| 25,600 \nieinstal.exe| 11.0.9600.20512| 11-Jul-2022| 21:03| 475,648 \nWindows Pop-up Blocked.wav| Not versioned| 18-Jan-2022| 16:55| 85,548 \nWindows Information Bar.wav| Not versioned| 18-Jan-2022| 16:55| 23,308 \nWindows Feed Discovered.wav| Not versioned| 18-Jan-2022| 16:55| 19,884 \nWindows Navigation Start.wav| Not versioned| 18-Jan-2022| 16:55| 11,340 \nbing.ico| Not versioned| 18-Jan-2022| 16:55| 5,430 \nieUnatt.exe| 11.0.9600.20512| 11-Jul-2022| 21:15| 115,712 \nMicrosoft-Windows-IE-InternetExplorer-ppdlic.xrm-ms| Not versioned| 11-Jul-2022| 22:13| 2,956 \njsdbgui.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 459,776 \njsprofilerui.dll| 11.0.9600.20512| 11-Jul-2022| 21:05| 579,584 \nMemoryAnalyzer.dll| 11.0.9600.20512| 11-Jul-2022| 21:14| 1,399,296 \nMshtmlDac.dll| 11.0.9600.20512| 11-Jul-2022| 21:21| 64,000 \nnetworkinspection.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 1,075,200 \noccache.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 130,048 \ndesktop.ini| Not versioned| 18-Jan-2022| 16:55| 65 \nwebcheck.dll| 11.0.9600.20512| 11-Jul-2022| 20:58| 230,400 \ndesktop.ini| Not versioned| 18-Jan-2022| 16:55| 65 \npdm.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 442,992 \nmsdbg2.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 315,008 \npdmproxy100.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 99,984 \nmsrating.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 168,960 \nicrav03.rat| Not versioned| 18-Jan-2022| 16:55| 8,798 \nticrf.rat| Not versioned| 18-Jan-2022| 16:55| 1,988 \niertutil.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 2,309,120 \ninseng.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 91,136 \nie4uinit.exe| 11.0.9600.20512| 11-Jul-2022| 20:57| 692,224 \niernonce.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 30,720 \niesetup.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 62,464 \nieuinit.inf| Not versioned| 11-Jul-2022| 20:25| 16,303 \niesysprep.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 90,624 \nTimeline.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 154,112 \nTimeline_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 124,928 \nTimeline.cpu.xml| Not versioned| 29-Jun-2022| 19:04| 3,197 \nVGX.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 818,176 \nurl.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 235,520 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:34| 526,294 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 499,654 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:33| 552,337 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:31| 944,559 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:03| 457,561 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:36| 543,946 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:36| 526,557 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 575,838 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:30| 570,737 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:36| 548,119 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:33| 639,271 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 525,504 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:36| 488,488 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:35| 548,494 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 559,343 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 535,067 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:31| 541,455 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:28| 804,470 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:32| 503,909 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:27| 521,583 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:24| 420,082 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:37| 436,651 \nInetRes.adml| Not versioned| 11-Jul-2022| 23:34| 436,651 \ninetres.admx| Not versioned| 29-Jun-2022| 19:09| 1,678,023 \ninetcomm.dll| 6.3.9600.20512| 11-Jul-2022| 21:01| 880,640 \nINETRES.dll| 6.3.9600.16384| 18-Jan-2022| 16:55| 84,480 \njscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:16| 653,824 \njscript9.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 4,119,040 \njscript9diag.dll| 11.0.9600.20512| 11-Jul-2022| 21:15| 620,032 \nvbscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:23| 498,176 \n \n## \n\n__\n\nInternet Explorer 11 on all supported x64-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nactxprxy.dll| 6.3.9600.20512| 12-Jul-2022| 14:59| 2,882,048 \nhlink.dll| 6.3.9600.20512| 12-Jul-2022| 15:32| 113,664 \npngfilt.dll| 11.0.9600.20512| 12-Jul-2022| 15:49| 65,024 \nurlmon.dll| 11.0.9600.20512| 12-Jul-2022| 15:00| 1,563,648 \niexplore.exe| 11.0.9600.20512| 12-Jul-2022| 16:44| 811,432 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:34| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:03| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:32| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:03| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:03| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:03| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:34| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 31,232 \nWininetPlugin.dll| 6.3.9600.20512| 12-Jul-2022| 15:37| 43,008 \nhtml.iec| 2019.0.0.20512| 12-Jul-2022| 15:47| 417,280 \ninetcpl.cpl| 11.0.9600.20512| 12-Jul-2022| 15:10| 2,132,992 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:06| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:32| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:06| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:06| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:06| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:42| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 243,200 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 73,728 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 78,848 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:33| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 74,752 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:10| 62,464 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:40| 75,264 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:06| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 72,192 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 73,216 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 41,472 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 37,888 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:42| 70,656 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 71,680 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 69,632 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 59,904 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 69,120 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 29,696 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 30,720 \nF12Resources.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 30,720 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 12-Jul-2022| 15:25| 77,824 \nDiagnosticsHub.ScriptedSandboxPlugin.dll| 11.0.9600.20512| 12-Jul-2022| 15:26| 276,480 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:40| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:31| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:07| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:40| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:29| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 35,328 \nwininet.dll| 11.0.9600.20512| 12-Jul-2022| 15:14| 4,858,880 \njsproxy.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 54,784 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 16:32| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:07| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:07| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:42| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:41| 88,064 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:39| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 22:42| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:31| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 74,752 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 75,776 \ninetcpl.cpl.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 75,776 \nieui.dll| 11.0.9600.20512| 12-Jul-2022| 15:39| 615,936 \niedkcs32.dll| 18.0.9600.20512| 12-Jul-2022| 15:10| 381,952 \ninstall.ins| Not versioned| 12-Jul-2022| 13:18| 464 \nieapfltr.dat| 10.0.9301.0| 31-Dec-2021| 23:57| 616,104 \nieapfltr.dll| 11.0.9600.20512| 12-Jul-2022| 14:44| 800,768 \niepeers.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 145,920 \nlicmgr10.dll| 11.0.9600.20512| 12-Jul-2022| 15:31| 33,280 \ntdc.ocx| 11.0.9600.20512| 12-Jul-2022| 15:24| 88,064 \nDiagnosticsHub.DataWarehouse.dll| 11.0.9600.20512| 12-Jul-2022| 15:50| 666,624 \niedvtool.dll| 11.0.9600.20512| 12-Jul-2022| 16:13| 950,784 \nDiagnosticsHub_is.dll| 11.0.9600.20512| 12-Jul-2022| 15:51| 50,176 \ndxtmsft.dll| 11.0.9600.20512| 12-Jul-2022| 15:30| 491,008 \ndxtrans.dll| 11.0.9600.20512| 12-Jul-2022| 15:20| 316,416 \nEscMigPlugin.dll| 11.0.9600.20512| 12-Jul-2022| 15:36| 124,416 \nescUnattend.exe| 11.0.9600.20512| 12-Jul-2022| 15:49| 87,040 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:38| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:31| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:04| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:07| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:05| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:07| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 3,584 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 3,584 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:42| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:40| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:33| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:32| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:26| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:29| 3,584 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 3,584 \nF12.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 3,584 \nF12.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 1,422,848 \nDiagnosticsTap.dll| 11.0.9600.20512| 12-Jul-2022| 15:29| 245,248 \nMicrosoft-Windows-IE-F12-Provider.ptxml| Not versioned| 12-Jul-2022| 13:27| 11,892 \nF12Resources.dll| 11.0.9600.20512| 12-Jul-2022| 15:54| 10,949,120 \nF12Tools.dll| 11.0.9600.20512| 12-Jul-2022| 15:28| 372,224 \nmsfeedsbs.mof| Not versioned| 1-Jan-2022| 0:03| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 60,416 \nmsfeedssync.exe| 11.0.9600.20512| 12-Jul-2022| 15:48| 13,312 \nmsfeeds.dll| 11.0.9600.20512| 12-Jul-2022| 15:10| 809,472 \nmsfeeds.mof| Not versioned| 1-Jan-2022| 0:02| 1,518 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:41| 2,066,432 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 2,121,216 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:40| 2,075,136 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:41| 2,063,872 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 2,314,240 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 2,390,528 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 2,034,176 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 16:32| 2,033,152 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 2,255,872 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:11| 2,061,312 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:39| 2,326,016 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 2,019,840 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:08| 2,071,040 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 23:09| 2,082,816 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 2,170,368 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 2,153,984 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 2,291,712 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:44| 2,283,520 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:45| 2,052,096 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 2,301,952 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 22:43| 2,093,056 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 2,075,648 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 2,299,392 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 2,094,592 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:37| 2,316,800 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 2,305,536 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:36| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 2,286,080 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:35| 2,060,288 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 2,315,776 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:29| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:29| 2,324,992 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:30| 2,098,176 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:40| 1,890,304 \nieframe.dll.mui| 11.0.9600.20512| 12-Jul-2022| 6:41| 1,890,304 \nieframe.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 15,509,504 \nieframe.ptxml| Not versioned| 31-Dec-2021| 23:57| 24,486 \nmshta.exe| 11.0.9600.20512| 12-Jul-2022| 15:50| 13,824 \nmshtmled.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 92,672 \nmshtml.dll| 11.0.9600.20512| 12-Jul-2022| 16:13| 25,761,280 \nmshtml.tlb| 11.0.9600.16384| 31-Dec-2021| 23:57| 2,724,864 \nMicrosoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 31-Dec-2021| 23:57| 3,228 \nIEAdvpack.dll| 11.0.9600.20512| 12-Jul-2022| 15:40| 132,096 \nieetwcollector.exe| 11.0.9600.20512| 12-Jul-2022| 15:38| 116,224 \nieetwproxystub.dll| 11.0.9600.20512| 12-Jul-2022| 15:47| 48,640 \nieetwcollectorres.dll| 11.0.9600.16384| 31-Dec-2021| 23:57| 4,096 \nielowutil.exe| 11.0.9600.20512| 12-Jul-2022| 15:40| 222,720 \nieproxy.dll| 11.0.9600.20512| 12-Jul-2022| 14:43| 870,400 \nIEShims.dll| 11.0.9600.20512| 12-Jul-2022| 14:48| 387,072 \niexpress.exe| 11.0.9600.20512| 12-Jul-2022| 15:50| 167,424 \nwextract.exe| 11.0.9600.20512| 12-Jul-2022| 15:50| 143,872 \nimgutil.dll| 11.0.9600.20512| 12-Jul-2022| 14:56| 51,712 \nieinstal.exe| 11.0.9600.20512| 12-Jul-2022| 15:20| 492,032 \nWindows Pop-up Blocked.wav| Not versioned| 31-Dec-2021| 23:57| 85,548 \nWindows Information Bar.wav| Not versioned| 31-Dec-2021| 23:57| 23,308 \nWindows Feed Discovered.wav| Not versioned| 31-Dec-2021| 23:57| 19,884 \nWindows Navigation Start.wav| Not versioned| 31-Dec-2021| 23:57| 11,340 \nbing.ico| Not versioned| 31-Dec-2021| 23:57| 5,430 \nieUnatt.exe| 11.0.9600.20512| 12-Jul-2022| 15:38| 144,384 \nMicrosoft-Windows-IE-InternetExplorer-ppdlic.xrm-ms| Not versioned| 12-Jul-2022| 16:40| 2,956 \njsdbgui.dll| 11.0.9600.20512| 12-Jul-2022| 15:22| 591,872 \njsprofilerui.dll| 11.0.9600.20512| 12-Jul-2022| 15:23| 628,736 \nMemoryAnalyzer.dll| 11.0.9600.20512| 12-Jul-2022| 15:36| 1,862,656 \nMshtmlDac.dll| 11.0.9600.20512| 12-Jul-2022| 15:46| 88,064 \nnetworkinspection.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 1,217,024 \noccache.dll| 11.0.9600.20512| 12-Jul-2022| 15:19| 152,064 \ndesktop.ini| Not versioned| 31-Dec-2021| 23:57| 65 \nwebcheck.dll| 11.0.9600.20512| 12-Jul-2022| 15:12| 262,144 \ndesktop.ini| Not versioned| 1-Jan-2022| 0:00| 65 \npdm.dll| 12.0.41202.0| 12-Jul-2022| 12:34| 579,192 \nmsdbg2.dll| 12.0.41202.0| 12-Jul-2022| 12:34| 403,592 \npdmproxy100.dll| 12.0.41202.0| 12-Jul-2022| 12:34| 107,152 \nmsrating.dll| 11.0.9600.20512| 12-Jul-2022| 15:22| 199,680 \nicrav03.rat| Not versioned| 1-Jan-2022| 0:02| 8,798 \nticrf.rat| Not versioned| 1-Jan-2022| 0:02| 1,988 \niertutil.dll| 11.0.9600.20512| 12-Jul-2022| 15:52| 2,917,888 \ninseng.dll| 11.0.9600.20512| 12-Jul-2022| 15:24| 107,520 \nie4uinit.exe| 11.0.9600.20512| 12-Jul-2022| 15:10| 728,064 \niernonce.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 34,304 \niesetup.dll| 11.0.9600.20512| 12-Jul-2022| 15:47| 66,560 \nieuinit.inf| Not versioned| 12-Jul-2022| 14:27| 16,303 \niesysprep.dll| 11.0.9600.20512| 12-Jul-2022| 15:25| 111,616 \nTimeline.dll| 11.0.9600.20512| 12-Jul-2022| 15:24| 219,648 \nTimeline_is.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 172,032 \nTimeline.cpu.xml| Not versioned| 7-Jul-2022| 17:20| 3,197 \nVGX.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 1,018,880 \nurl.dll| 11.0.9600.20512| 12-Jul-2022| 15:47| 237,568 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:41| 526,294 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:37| 499,654 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:37| 552,337 \nInetRes.adml| Not versioned| 12-Jul-2022| 23:07| 944,559 \nInetRes.adml| Not versioned| 12-Jul-2022| 16:32| 457,561 \nInetRes.adml| Not versioned| 12-Jul-2022| 23:08| 543,946 \nInetRes.adml| Not versioned| 12-Jul-2022| 23:06| 526,557 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:37| 575,838 \nInetRes.adml| Not versioned| 12-Jul-2022| 23:10| 570,737 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:43| 548,119 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:43| 639,271 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:43| 525,504 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:43| 488,488 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:44| 548,494 \nInetRes.adml| Not versioned| 12-Jul-2022| 22:44| 559,343 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:35| 535,067 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:36| 541,455 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:32| 804,470 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:36| 503,909 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:30| 521,583 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:29| 420,082 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:37| 436,651 \nInetRes.adml| Not versioned| 12-Jul-2022| 6:38| 436,651 \ninetres.admx| Not versioned| 12-Jul-2022| 12:37| 1,678,023 \ninetcomm.dll| 6.3.9600.20512| 12-Jul-2022| 15:16| 1,033,216 \nINETRES.dll| 6.3.9600.16384| 1-Jan-2022| 0:03| 84,480 \njscript.dll| 5.8.9600.20512| 12-Jul-2022| 15:38| 785,408 \njscript9.dll| 11.0.9600.20512| 12-Jul-2022| 15:53| 5,508,096 \njscript9diag.dll| 11.0.9600.20512| 12-Jul-2022| 15:37| 814,592 \nvbscript.dll| 5.8.9600.20512| 12-Jul-2022| 15:47| 581,120 \niexplore.exe| 11.0.9600.20512| 11-Jul-2022| 22:23| 811,416 \nhtml.iec| 2019.0.0.20512| 11-Jul-2022| 21:22| 341,504 \nieui.dll| 11.0.9600.20512| 11-Jul-2022| 21:16| 476,160 \niepeers.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 128,512 \ntdc.ocx| 11.0.9600.20512| 11-Jul-2022| 21:06| 73,728 \ndxtmsft.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 415,744 \ndxtrans.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 280,064 \nmsfeeds.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 696,320 \nmsfeeds.mof| Not versioned| 31-Dec-2021| 23:57| 1,518 \nieframe.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 13,885,440 \nie9props.propdesc| Not versioned| 31-Dec-2021| 23:57| 2,843 \nwow64_ieframe.ptxml| Not versioned| 31-Dec-2021| 23:57| 24,486 \nmshta.exe| 11.0.9600.20512| 11-Jul-2022| 21:25| 12,800 \nmshtmled.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 76,800 \nmshtml.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 20,296,192 \nmshtml.tlb| 11.0.9600.16384| 31-Dec-2021| 23:58| 2,724,864 \nwow64_Microsoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 31-Dec-2021| 23:58| 3,228 \nieetwproxystub.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 47,616 \nieUnatt.exe| 11.0.9600.20512| 11-Jul-2022| 21:15| 115,712 \noccache.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 130,048 \nwebcheck.dll| 11.0.9600.20512| 11-Jul-2022| 20:58| 230,400 \niernonce.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 30,720 \niesetup.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 62,464 \nieuinit.inf| Not versioned| 11-Jul-2022| 20:25| 16,303 \niesysprep.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 90,624 \njscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:16| 653,824 \njscript9.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 4,119,040 \njscript9diag.dll| 11.0.9600.20512| 11-Jul-2022| 21:15| 620,032 \nvbscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:23| 498,176 \nactxprxy.dll| 6.3.9600.20512| 11-Jul-2022| 20:51| 1,049,600 \nhlink.dll| 6.3.9600.20512| 11-Jul-2022| 21:11| 103,936 \npngfilt.dll| 11.0.9600.20512| 11-Jul-2022| 21:24| 58,368 \nurlmon.dll| 11.0.9600.20512| 11-Jul-2022| 20:45| 1,342,976 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:26| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 31,232 \nWininetPlugin.dll| 6.3.9600.20512| 11-Jul-2022| 21:15| 35,328 \ninetcpl.cpl| 11.0.9600.20512| 11-Jul-2022| 20:57| 2,058,752 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:03| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:37| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 243,200 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 60,416 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:02| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 35,328 \nwininet.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 4,387,840 \njsproxy.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 47,104 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:03| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 88,064 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:24| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:25| 74,752 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 75,776 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 75,776 \niedkcs32.dll| 18.0.9600.20512| 11-Jul-2022| 20:58| 333,312 \ninstall.ins| Not versioned| 11-Jul-2022| 19:17| 464 \nieapfltr.dat| 10.0.9301.0| 31-Dec-2021| 23:58| 616,104 \nieapfltr.dll| 11.0.9600.20512| 11-Jul-2022| 20:41| 710,656 \nlicmgr10.dll| 11.0.9600.20512| 11-Jul-2022| 21:11| 27,136 \niedvtool.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 772,608 \nDiagnosticsTap.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 175,104 \nF12Tools.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 256,000 \nmsfeedsbs.mof| Not versioned| 1-Jan-2022| 0:02| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 52,736 \nmsfeedssync.exe| 11.0.9600.20512| 11-Jul-2022| 21:23| 11,776 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,066,432 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:36| 2,121,216 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,075,136 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:38| 2,063,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,314,240 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,390,528 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,034,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:05| 2,033,152 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:32| 2,255,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,061,312 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,326,016 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,019,840 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,071,040 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,082,816 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,170,368 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,153,984 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,291,712 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:33| 2,283,520 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,052,096 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 2,301,952 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:35| 2,093,056 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,075,648 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 2,299,392 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 2,094,592 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,316,800 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:29| 2,305,536 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,286,080 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:31| 2,060,288 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:27| 2,315,776 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:28| 2,324,992 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:30| 2,098,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 1,890,304 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 23:34| 1,890,304 \nIEAdvpack.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 112,128 \nielowutil.exe| 11.0.9600.20512| 11-Jul-2022| 21:17| 221,184 \nieproxy.dll| 11.0.9600.20512| 11-Jul-2022| 20:40| 310,784 \nIEShims.dll| 11.0.9600.20512| 11-Jul-2022| 20:43| 290,304 \niexpress.exe| 11.0.9600.20512| 11-Jul-2022| 21:24| 152,064 \nwextract.exe| 11.0.9600.20512| 11-Jul-2022| 21:25| 137,728 \nimgutil.dll| 11.0.9600.20512| 11-Jul-2022| 20:49| 40,448 \nExtExport.exe| 11.0.9600.20512| 11-Jul-2022| 21:20| 25,600 \nieinstal.exe| 11.0.9600.20512| 11-Jul-2022| 21:03| 475,648 \njsdbgui.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 459,776 \njsprofilerui.dll| 11.0.9600.20512| 11-Jul-2022| 21:05| 579,584 \nMshtmlDac.dll| 11.0.9600.20512| 11-Jul-2022| 21:21| 64,000 \nnetworkinspection.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 1,075,200 \npdm.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 442,992 \nmsdbg2.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 315,008 \npdmproxy100.dll| 12.0.41202.0| 29-Jun-2022| 19:04| 99,984 \nmsrating.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 168,960 \nicrav03.rat| Not versioned| 31-Dec-2021| 23:57| 8,798 \nticrf.rat| Not versioned| 31-Dec-2021| 23:57| 1,988 \niertutil.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 2,309,120 \ninseng.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 91,136 \nVGX.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 818,176 \nurl.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 235,520 \ninetcomm.dll| 6.3.9600.20512| 11-Jul-2022| 21:01| 880,640 \nINETRES.dll| 6.3.9600.16384| 1-Jan-2022| 0:02| 84,480 \n \n## \n\n__\n\nInternet Explorer 11 on all supported Arm-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nactxprxy.dll| 6.3.9600.20512| 11-Jul-2022| 20:36| 1,064,960 \nhlink.dll| 6.3.9600.20512| 11-Jul-2022| 20:57| 73,216 \npngfilt.dll| 11.0.9600.20512| 11-Jul-2022| 21:10| 47,616 \nurlmon.dll| 11.0.9600.20512| 11-Jul-2022| 20:28| 1,035,264 \niexplore.exe| 11.0.9600.20512| 11-Jul-2022| 21:48| 808,864 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:38| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 31,232 \nwininet.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 31,232 \nWininetPlugin.dll| 6.3.9600.16384| 28-Dec-2021| 18:02| 33,792 \nhtml.iec| 2019.0.0.20512| 11-Jul-2022| 21:08| 320,000 \ninetcpl.cpl| 11.0.9600.20512| 11-Jul-2022| 20:44| 2,007,040 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:39| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:18| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 243,200 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 73,728 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:18| 78,848 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:39| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 74,752 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 62,464 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 75,264 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 72,192 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 73,216 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 41,472 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 37,888 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 70,656 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 71,680 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 69,632 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 59,904 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 69,120 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 29,696 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 30,720 \nF12Resources.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 30,720 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 11-Jul-2022| 20:53| 63,488 \nDiagnosticsHub.ScriptedSandboxPlugin.dll| 11.0.9600.20512| 11-Jul-2022| 20:54| 215,552 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:39| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 35,328 \nwininet.dll| 11.0.9600.20512| 11-Jul-2022| 20:27| 4,147,712 \njsproxy.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 39,936 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 21:40| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 88,064 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 74,752 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 75,776 \ninetcpl.cpl.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 75,776 \nieui.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 427,520 \niedkcs32.dll| 18.0.9600.20512| 11-Jul-2022| 20:44| 292,864 \ninstall.ins| Not versioned| 11-Jul-2022| 19:18| 464 \nieapfltr.dat| 10.0.9301.0| 28-Dec-2021| 18:02| 616,104 \nieapfltr.dll| 11.0.9600.20512| 11-Jul-2022| 20:30| 548,864 \niepeers.dll| 11.0.9600.20512| 11-Jul-2022| 20:49| 107,008 \nlicmgr10.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 23,552 \ntdc.ocx| 11.0.9600.20512| 11-Jul-2022| 20:52| 62,464 \nDiagnosticsHub.DataWarehouse.dll| 11.0.9600.20512| 11-Jul-2022| 21:10| 495,616 \niedvtool.dll| 11.0.9600.20512| 11-Jul-2022| 21:01| 726,016 \nDiagnosticsHub_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:11| 39,936 \ndxtmsft.dll| 11.0.9600.20512| 11-Jul-2022| 20:56| 364,032 \ndxtrans.dll| 11.0.9600.20512| 11-Jul-2022| 20:49| 221,696 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:39| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:14| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 4,096 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:12| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 3,584 \nF12.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 3,584 \nF12.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 1,186,304 \nDiagnosticsTap.dll| 11.0.9600.20512| 11-Jul-2022| 20:56| 175,616 \nMicrosoft-Windows-IE-F12-Provider.ptxml| Not versioned| 11-Jul-2022| 19:24| 11,892 \nF12Resources.dll| 11.0.9600.20512| 11-Jul-2022| 21:13| 10,948,608 \nF12Tools.dll| 11.0.9600.20512| 11-Jul-2022| 20:55| 263,680 \nmsfeedsbs.mof| Not versioned| 28-Dec-2021| 18:03| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 11-Jul-2022| 20:50| 43,520 \nmsfeedssync.exe| 11.0.9600.16384| 28-Dec-2021| 18:03| 11,776 \nmsfeeds.dll| 11.0.9600.20512| 11-Jul-2022| 20:44| 587,776 \nmsfeeds.mof| Not versioned| 28-Dec-2021| 18:02| 1,518 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,066,432 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,121,216 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,075,136 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,063,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,314,240 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,390,528 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,034,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 21:39| 2,033,152 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,307,584 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,255,872 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,061,312 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:18| 2,326,016 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:18| 2,019,840 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,071,040 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,082,816 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,170,368 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,153,984 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,291,712 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,283,520 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,052,096 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,301,952 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 2,093,056 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,075,648 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,299,392 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 2,094,592 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,316,800 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,305,536 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:16| 2,286,080 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:15| 2,060,288 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 2,315,776 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 2,278,912 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 2,324,992 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:13| 2,098,176 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:17| 1,890,304 \nieframe.dll.mui| 11.0.9600.20512| 11-Jul-2022| 22:18| 1,890,304 \nieframe.dll| 11.0.9600.20512| 11-Jul-2022| 20:32| 12,318,720 \nieframe.ptxml| Not versioned| 28-Dec-2021| 18:03| 24,486 \nmshtmled.dll| 11.0.9600.20512| 11-Jul-2022| 20:50| 73,216 \nmshtml.dll| 11.0.9600.20512| 11-Jul-2022| 20:44| 16,229,888 \nmshtml.tlb| 11.0.9600.16384| 28-Dec-2021| 18:01| 2,724,864 \nMicrosoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 28-Dec-2021| 18:01| 3,228 \nIEAdvpack.dll| 11.0.9600.16384| 28-Dec-2021| 18:01| 98,816 \nieetwcollector.exe| 11.0.9600.20512| 11-Jul-2022| 21:02| 98,816 \nieetwproxystub.dll| 11.0.9600.16384| 28-Dec-2021| 18:03| 43,008 \nieetwcollectorres.dll| 11.0.9600.16384| 28-Dec-2021| 18:03| 4,096 \nielowutil.exe| 11.0.9600.20512| 11-Jul-2022| 21:03| 222,208 \nieproxy.dll| 11.0.9600.20512| 11-Jul-2022| 20:29| 308,224 \nIEShims.dll| 11.0.9600.20512| 11-Jul-2022| 20:32| 268,800 \nimgutil.dll| 11.0.9600.20512| 11-Jul-2022| 20:37| 34,816 \nWindows Pop-up Blocked.wav| Not versioned| 28-Dec-2021| 18:01| 85,548 \nWindows Information Bar.wav| Not versioned| 28-Dec-2021| 18:01| 23,308 \nWindows Feed Discovered.wav| Not versioned| 28-Dec-2021| 18:01| 19,884 \nWindows Navigation Start.wav| Not versioned| 28-Dec-2021| 18:01| 11,340 \nbing.ico| Not versioned| 28-Dec-2021| 18:01| 5,430 \nieUnatt.exe| 11.0.9600.16384| 28-Dec-2021| 18:01| 112,128 \nMicrosoft-Windows-IE-InternetExplorer-ppdlic.xrm-ms| Not versioned| 11-Jul-2022| 21:45| 2,956 \njsdbgui.dll| 11.0.9600.20512| 11-Jul-2022| 20:51| 457,216 \njsprofilerui.dll| 11.0.9600.20512| 11-Jul-2022| 20:51| 574,976 \nMemoryAnalyzer.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 1,935,360 \nMshtmlDac.dll| 11.0.9600.20512| 11-Jul-2022| 21:07| 60,928 \nnetworkinspection.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 1,105,408 \noccache.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 121,856 \ndesktop.ini| Not versioned| 28-Dec-2021| 18:03| 65 \nwebcheck.dll| 11.0.9600.20512| 11-Jul-2022| 20:45| 201,216 \ndesktop.ini| Not versioned| 28-Dec-2021| 18:03| 65 \npdm.dll| 12.0.20712.1| 28-Dec-2021| 18:02| 420,752 \nmsdbg2.dll| 12.0.20712.1| 28-Dec-2021| 18:02| 295,320 \npdmproxy100.dll| 12.0.20712.1| 28-Dec-2021| 18:02| 76,712 \nmsrating.dll| 11.0.9600.20512| 11-Jul-2022| 20:51| 157,184 \nicrav03.rat| Not versioned| 28-Dec-2021| 18:01| 8,798 \nticrf.rat| Not versioned| 28-Dec-2021| 18:01| 1,988 \niertutil.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 2,186,752 \ninseng.dll| 11.0.9600.16384| 28-Dec-2021| 18:01| 77,312 \nie4uinit.exe| 11.0.9600.20512| 11-Jul-2022| 20:44| 678,400 \niernonce.dll| 11.0.9600.16384| 28-Dec-2021| 18:02| 28,160 \niesetup.dll| 11.0.9600.16384| 28-Dec-2021| 18:02| 59,904 \nieuinit.inf| Not versioned| 11-Jul-2022| 20:17| 16,303 \niesysprep.dll| 11.0.9600.20512| 11-Jul-2022| 20:52| 87,552 \nTimeline.dll| 11.0.9600.20512| 11-Jul-2022| 20:52| 155,648 \nTimeline_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 130,048 \nTimeline.cpu.xml| Not versioned| 2-Jun-2022| 17:43| 3,197 \nVGX.dll| 11.0.9600.20512| 11-Jul-2022| 20:50| 734,720 \nurl.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 236,032 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 526,294 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:16| 499,654 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 552,337 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:18| 944,559 \nInetRes.adml| Not versioned| 11-Jul-2022| 21:40| 457,561 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 543,946 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 526,557 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 575,838 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 570,737 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 548,119 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:16| 639,271 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 525,504 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 488,488 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 548,494 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 559,343 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:15| 535,067 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:15| 541,455 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:16| 804,470 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:16| 503,909 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:13| 521,583 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:14| 420,082 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:18| 436,651 \nInetRes.adml| Not versioned| 11-Jul-2022| 22:17| 436,651 \ninetres.admx| Not versioned| 7-Jun-2022| 12:03| 1,678,023 \ninetcomm.dll| 6.3.9600.20512| 11-Jul-2022| 20:46| 675,328 \nINETRES.dll| 6.3.9600.16384| 28-Dec-2021| 18:02| 84,480 \njscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:02| 516,096 \njscript9.dll| 11.0.9600.20512| 11-Jul-2022| 20:38| 3,571,712 \njscript9diag.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 557,568 \nvbscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:07| 403,968 \n \n### **Windows Server 2012**\n\n## \n\n__\n\nInternet Explorer 11 on all supported x86-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nFileinfo.xml| Not versioned| 14-Jul-22| 3:34| 592,235 \nIe11-windows6.2-kb5016618-x86-express.cab| Not versioned| 14-Jul-22| 3:18| 741,463 \nIe11-windows6.2-kb5016618-x86.msu| Not versioned| 14-Jul-22| 2:57| 27,691,365 \nIe11-windows6.2-kb5016618-x86.psf| Not versioned| 14-Jul-22| 3:08| 184,707,453 \nPackageinfo.xml| Not versioned| 14-Jul-22| 3:35| 1,133 \nPackagestructure.xml| Not versioned| 14-Jul-22| 3:34| 149,919 \nPrebvtpackageinfo.xml| Not versioned| 14-Jul-22| 3:34| 573 \nIe11-windows6.2-kb5016618-x86.cab| Not versioned| 14-Jul-22| 9:47| 27,558,707 \nIe11-windows6.2-kb5016618-x86.xml| Not versioned| 14-Jul-22| 9:51| 450 \nWsusscan.cab| Not versioned| 14-Jul-22| 9:54| 175,478 \nHlink.dll| 6.3.9600.20512| 12-Jul-22| 4:11| 103,936 \nUrlmon.dll| 11.0.9600.20512| 12-Jul-22| 3:45| 1,342,976 \nIexplore.exe| 11.0.9600.20512| 13-Jul-22| 22:48| 811,448 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 46,592 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 56,320 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 57,856 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 47,616 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 49,152 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 55,296 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 45,056 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 39,424 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 35,840 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 53,760 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 30,720 \nInetcpl.cpl| 11.0.9600.20512| 12-Jul-22| 3:57| 2,058,752 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 307,200 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 293,888 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 290,304 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 299,008 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 303,104 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 282,112 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 283,648 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 291,840 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 299,520 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 275,968 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 293,376 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 258,048 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 256,512 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 288,256 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 285,184 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 297,472 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 288,768 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 286,208 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 281,600 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 286,720 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 292,352 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 242,176 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 243,200 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 46,080 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 51,712 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 54,272 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 45,056 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 39,936 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 39,424 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 51,200 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:19| 35,328 \nJsproxy.dll| 11.0.9600.20512| 12-Jul-22| 4:18| 47,104 \nWininet.dll| 11.0.9600.20512| 12-Jul-22| 3:48| 4,387,840 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 114,176 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 124,928 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 122,880 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 130,048 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 138,240 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 114,688 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 131,584 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 117,760 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 122,368 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 134,144 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 107,008 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 127,488 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 128,512 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 88,576 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 82,944 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 120,320 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 125,952 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 128,000 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 124,416 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 121,856 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 115,712 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 72,704 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 73,728 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 73,728 \nMsfeedsbs.dll| 11.0.9600.20512| 12-Jul-22| 4:04| 52,736 \nMsfeedsbs.mof| Not versioned| 12-Jul-22| 2:34| 1,574 \nMsfeedssync.exe| 11.0.9600.20512| 12-Jul-22| 4:23| 11,776 \nMicrosoft-windows-ie-htmlrendering.ptxml| Not versioned| 12-Jul-22| 2:27| 3,228 \nMshtml.dll| 11.0.9600.20512| 12-Jul-22| 4:40| 20,296,192 \nMshtml.tlb| 11.0.9600.20512| 12-Jul-22| 4:31| 2,724,864 \nIeproxy.dll| 11.0.9600.20512| 12-Jul-22| 3:40| 310,784 \nIeshims.dll| 11.0.9600.20512| 12-Jul-22| 3:43| 290,304 \nIertutil.dll| 11.0.9600.20512| 12-Jul-22| 4:22| 2,309,120 \nSqmapi.dll| 6.2.9200.16384| 13-Jul-22| 22:48| 229,304 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 2,066,432 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 2,121,216 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 2,063,872 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 2,314,240 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 2,390,528 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 2,033,152 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 2,255,872 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 2,061,312 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 2,326,016 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 2,019,840 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 2,071,040 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 2,082,816 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 2,170,368 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 2,153,984 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 2,291,712 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 2,283,520 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 2,052,096 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 2,301,952 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 2,093,056 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 2,299,392 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 2,094,592 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 2,316,800 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 2,305,536 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 2,278,912 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 2,285,568 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 2,060,288 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 2,315,776 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 2,279,424 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 2,324,992 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 2,098,176 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 1,890,304 \nIeframe.dll| 11.0.9600.20512| 12-Jul-22| 4:04| 13,885,440 \nIeframe.ptxml| Not versioned| 12-Jul-22| 2:27| 24,486 \nInetres.adml| Not versioned| 13-Jul-22| 22:50| 463,373 \nInetres.adml| Not versioned| 13-Jul-22| 22:51| 751,353 \nInetres.adml| Not versioned| 13-Jul-22| 22:52| 526,345 \nInetres.adml| Not versioned| 13-Jul-22| 22:53| 499,703 \nInetres.adml| Not versioned| 13-Jul-22| 22:54| 552,387 \nInetres.adml| Not versioned| 13-Jul-22| 22:54| 944,611 \nInetres.adml| Not versioned| 14-Jul-22| 1:44| 457,561 \nInetres.adml| Not versioned| 13-Jul-22| 22:55| 543,996 \nInetres.adml| Not versioned| 13-Jul-22| 22:56| 751,459 \nInetres.adml| Not versioned| 13-Jul-22| 22:57| 526,605 \nInetres.adml| Not versioned| 13-Jul-22| 22:58| 575,888 \nInetres.adml| Not versioned| 13-Jul-22| 22:59| 463,373 \nInetres.adml| Not versioned| 13-Jul-22| 22:59| 751,277 \nInetres.adml| Not versioned| 13-Jul-22| 23:00| 570,787 \nInetres.adml| Not versioned| 13-Jul-22| 23:01| 548,169 \nInetres.adml| Not versioned| 13-Jul-22| 23:02| 639,283 \nInetres.adml| Not versioned| 13-Jul-22| 23:03| 525,516 \nInetres.adml| Not versioned| 13-Jul-22| 23:04| 751,512 \nInetres.adml| Not versioned| 13-Jul-22| 23:04| 751,242 \nInetres.adml| Not versioned| 13-Jul-22| 23:05| 488,538 \nInetres.adml| Not versioned| 13-Jul-22| 23:06| 548,543 \nInetres.adml| Not versioned| 13-Jul-22| 23:07| 559,391 \nInetres.adml| Not versioned| 13-Jul-22| 23:08| 535,117 \nInetres.adml| Not versioned| 13-Jul-22| 23:09| 541,504 \nInetres.adml| Not versioned| 13-Jul-22| 23:09| 751,415 \nInetres.adml| Not versioned| 13-Jul-22| 23:10| 804,521 \nInetres.adml| Not versioned| 13-Jul-22| 23:11| 751,377 \nInetres.adml| Not versioned| 13-Jul-22| 23:12| 751,273 \nInetres.adml| Not versioned| 13-Jul-22| 23:13| 751,520 \nInetres.adml| Not versioned| 13-Jul-22| 23:13| 503,961 \nInetres.adml| Not versioned| 13-Jul-22| 23:14| 751,418 \nInetres.adml| Not versioned| 13-Jul-22| 23:15| 521,631 \nInetres.adml| Not versioned| 13-Jul-22| 23:15| 751,199 \nInetres.adml| Not versioned| 13-Jul-22| 23:17| 420,094 \nInetres.adml| Not versioned| 13-Jul-22| 23:17| 436,663 \nInetres.adml| Not versioned| 13-Jul-22| 23:18| 436,663 \nInetres.admx| Not versioned| 30-Jun-22| 2:09| 1,678,023 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 29,184 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 35,328 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 37,888 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:43| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 27,648 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 33,792 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 23,040 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 22,016 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 31,232 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 35,840 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 34,816 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 32,256 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 30,720 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 16,384 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 16,896 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 16,896 \nJscript9.dll| 11.0.9600.20512| 12-Jul-22| 4:08| 4,119,040 \nJscript9diag.dll| 11.0.9600.20512| 12-Jul-22| 4:15| 620,032 \nJscript.dll| 5.8.9600.20512| 12-Jul-22| 4:16| 653,824 \nVbscript.dll| 5.8.9600.20512| 12-Jul-22| 4:23| 498,176 \nPackage.cab| Not versioned| 14-Jul-22| 9:51| 300,527 \n \n## \n\n__\n\nInternet Explorer 11 on all supported x64-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nFileinfo.xml| Not versioned| 14-Jul-22| 3:37| 921,819 \nIe11-windows6.2-kb5016618-x64-express.cab| Not versioned| 14-Jul-22| 3:20| 1,246,895 \nIe11-windows6.2-kb5016618-x64.msu| Not versioned| 14-Jul-22| 2:59| 48,302,513 \nIe11-windows6.2-kb5016618-x64.psf| Not versioned| 14-Jul-22| 3:11| 283,480,073 \nPackageinfo.xml| Not versioned| 14-Jul-22| 3:37| 1,228 \nPackagestructure.xml| Not versioned| 14-Jul-22| 3:37| 240,590 \nPrebvtpackageinfo.xml| Not versioned| 14-Jul-22| 3:37| 652 \nIe11-windows6.2-kb5016618-x64.cab| Not versioned| 14-Jul-22| 9:51| 48,200,481 \nIe11-windows6.2-kb5016618-x64.xml| Not versioned| 14-Jul-22| 9:51| 452 \nWsusscan.cab| Not versioned| 14-Jul-22| 9:56| 176,342 \nHlink.dll| 6.3.9600.20512| 12-Jul-22| 22:32| 113,664 \nUrlmon.dll| 11.0.9600.20512| 12-Jul-22| 22:00| 1,563,648 \nIexplore.exe| 11.0.9600.20512| 14-Jul-22| 1:08| 811,432 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 46,592 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 56,320 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 57,856 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 49,664 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 47,616 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 49,152 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 55,296 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 45,056 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 39,424 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 35,840 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 53,760 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:35| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 30,720 \nInetcpl.cpl| 11.0.9600.20512| 12-Jul-22| 22:10| 2,132,992 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 307,200 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 293,888 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 290,304 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 299,008 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 303,104 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 282,112 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 283,648 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 291,840 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 299,520 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 275,968 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 293,376 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 258,048 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 256,512 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:23| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 288,256 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 285,184 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 297,472 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 288,768 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 286,208 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 281,600 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 286,720 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:35| 292,352 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 242,176 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 243,200 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 46,080 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 51,712 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 54,272 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 45,056 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 39,936 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 39,424 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 51,200 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:35| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:35| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 35,328 \nJsproxy.dll| 11.0.9600.20512| 12-Jul-22| 22:41| 54,784 \nWininet.dll| 11.0.9600.20512| 12-Jul-22| 22:14| 4,858,880 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 114,176 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 124,928 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 122,880 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 130,048 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 138,240 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 114,688 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 131,584 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 117,760 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 122,368 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 134,144 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 107,008 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 127,488 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 128,512 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 88,576 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 82,944 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:23| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 120,320 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 125,952 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 128,000 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 124,416 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 121,856 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 115,712 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 72,704 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 73,728 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 73,728 \nMsfeedsbs.dll| 11.0.9600.20512| 12-Jul-22| 22:21| 60,416 \nMsfeedsbs.mof| Not versioned| 12-Jul-22| 20:34| 1,574 \nMsfeedssync.exe| 11.0.9600.20512| 12-Jul-22| 22:48| 13,312 \nMicrosoft-windows-ie-htmlrendering.ptxml| Not versioned| 12-Jul-22| 20:27| 3,228 \nMshtml.dll| 11.0.9600.20512| 12-Jul-22| 23:13| 25,761,280 \nMshtml.tlb| 11.0.9600.20512| 12-Jul-22| 22:58| 2,724,864 \nIeproxy.dll| 11.0.9600.20512| 12-Jul-22| 21:43| 870,400 \nIeshims.dll| 11.0.9600.20512| 12-Jul-22| 21:48| 387,072 \nIertutil.dll| 11.0.9600.20512| 12-Jul-22| 22:52| 2,917,888 \nSqmapi.dll| 6.2.9200.16384| 14-Jul-22| 1:08| 287,160 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 2,066,432 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 2,121,216 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 2,063,872 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 2,314,240 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 2,390,528 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 2,033,152 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 2,255,872 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:16| 2,061,312 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 2,326,016 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 2,019,840 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 2,071,040 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 2,082,816 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 2,170,368 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 2,153,984 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:23| 2,291,712 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 2,283,520 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 2,052,096 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 2,301,952 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 2,093,056 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 2,299,392 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 2,094,592 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 2,316,800 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 2,305,536 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 2,278,912 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 2,285,568 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 2,060,288 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 2,315,776 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 2,279,424 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:35| 2,324,992 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 2,098,176 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 1,890,304 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 1,890,304 \nIeframe.dll| 11.0.9600.20512| 12-Jul-22| 22:18| 15,509,504 \nIeframe.ptxml| Not versioned| 12-Jul-22| 20:26| 24,486 \nInetres.adml| Not versioned| 14-Jul-22| 1:10| 463,373 \nInetres.adml| Not versioned| 14-Jul-22| 1:11| 751,513 \nInetres.adml| Not versioned| 14-Jul-22| 1:12| 526,343 \nInetres.adml| Not versioned| 14-Jul-22| 1:12| 499,705 \nInetres.adml| Not versioned| 14-Jul-22| 1:13| 552,388 \nInetres.adml| Not versioned| 14-Jul-22| 1:14| 944,610 \nInetres.adml| Not versioned| 14-Jul-22| 2:06| 457,561 \nInetres.adml| Not versioned| 14-Jul-22| 1:15| 543,995 \nInetres.adml| Not versioned| 14-Jul-22| 1:15| 751,230 \nInetres.adml| Not versioned| 14-Jul-22| 1:17| 526,606 \nInetres.adml| Not versioned| 14-Jul-22| 1:17| 575,890 \nInetres.adml| Not versioned| 14-Jul-22| 1:18| 463,373 \nInetres.adml| Not versioned| 14-Jul-22| 1:19| 751,299 \nInetres.adml| Not versioned| 14-Jul-22| 1:20| 570,786 \nInetres.adml| Not versioned| 14-Jul-22| 1:21| 548,170 \nInetres.adml| Not versioned| 14-Jul-22| 1:21| 639,283 \nInetres.adml| Not versioned| 14-Jul-22| 1:22| 525,516 \nInetres.adml| Not versioned| 14-Jul-22| 1:23| 751,362 \nInetres.adml| Not versioned| 14-Jul-22| 1:24| 751,285 \nInetres.adml| Not versioned| 14-Jul-22| 1:25| 488,537 \nInetres.adml| Not versioned| 14-Jul-22| 1:25| 548,544 \nInetres.adml| Not versioned| 14-Jul-22| 1:26| 559,393 \nInetres.adml| Not versioned| 14-Jul-22| 1:27| 535,120 \nInetres.adml| Not versioned| 14-Jul-22| 1:28| 541,504 \nInetres.adml| Not versioned| 14-Jul-22| 1:29| 751,438 \nInetres.adml| Not versioned| 14-Jul-22| 1:29| 804,519 \nInetres.adml| Not versioned| 14-Jul-22| 1:30| 751,380 \nInetres.adml| Not versioned| 14-Jul-22| 1:31| 751,416 \nInetres.adml| Not versioned| 14-Jul-22| 1:32| 751,343 \nInetres.adml| Not versioned| 14-Jul-22| 1:32| 503,961 \nInetres.adml| Not versioned| 14-Jul-22| 1:33| 751,315 \nInetres.adml| Not versioned| 14-Jul-22| 1:34| 521,632 \nInetres.adml| Not versioned| 14-Jul-22| 1:35| 751,484 \nInetres.adml| Not versioned| 14-Jul-22| 1:36| 420,094 \nInetres.adml| Not versioned| 14-Jul-22| 1:37| 436,663 \nInetres.admx| Not versioned| 12-Jul-22| 19:37| 1,678,023 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:10| 29,184 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:11| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:12| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:13| 35,328 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:14| 37,888 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 2:06| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:15| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:17| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:18| 27,648 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:19| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:20| 33,792 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:21| 23,040 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 22,016 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:22| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:23| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:24| 31,232 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:25| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:26| 35,840 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:27| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:28| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:29| 34,816 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:30| 32,256 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:31| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:32| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:33| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 30,720 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:34| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 16,384 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:36| 16,896 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:37| 16,896 \nJscript9.dll| 11.0.9600.20512| 12-Jul-22| 22:53| 5,508,096 \nJscript9diag.dll| 11.0.9600.20512| 12-Jul-22| 22:37| 814,592 \nJscript.dll| 5.8.9600.20512| 12-Jul-22| 22:38| 785,408 \nVbscript.dll| 5.8.9600.20512| 12-Jul-22| 22:47| 581,120 \nIexplore.exe| 11.0.9600.20512| 13-Jul-22| 22:48| 811,448 \nMshtml.dll| 11.0.9600.20512| 12-Jul-22| 4:40| 20,296,192 \nMshtml.tlb| 11.0.9600.20512| 12-Jul-22| 4:31| 2,724,864 \nWow64_microsoft-windows-ie-htmlrendering.ptxml| Not versioned| 12-Jul-22| 2:29| 3,228 \nIe9props.propdesc| Not versioned| 30-Jun-22| 2:05| 2,843 \nIeframe.dll| 11.0.9600.20512| 12-Jul-22| 4:04| 13,885,440 \nWow64_ieframe.ptxml| Not versioned| 12-Jul-22| 2:29| 24,486 \nJscript9.dll| 11.0.9600.20512| 12-Jul-22| 4:08| 4,119,040 \nJscript9diag.dll| 11.0.9600.20512| 12-Jul-22| 4:15| 620,032 \nJscript.dll| 5.8.9600.20512| 12-Jul-22| 4:16| 653,824 \nVbscript.dll| 5.8.9600.20512| 12-Jul-22| 4:23| 498,176 \nHlink.dll| 6.3.9600.20512| 12-Jul-22| 4:11| 103,936 \nUrlmon.dll| 11.0.9600.20512| 12-Jul-22| 3:45| 1,342,976 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 46,592 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 56,320 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 57,856 \nWininet.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:43| 49,664 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 47,616 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 49,152 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 55,296 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 45,056 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 39,424 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 35,840 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 53,760 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 54,272 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 51,200 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 53,248 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 52,736 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 51,712 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 50,688 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 50,176 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 30,720 \nWininet.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 30,720 \nInetcpl.cpl| 11.0.9600.20512| 12-Jul-22| 3:57| 2,058,752 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 307,200 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 293,888 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 290,304 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 299,008 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 303,104 \nMshtml.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 282,112 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 283,648 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 291,840 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 299,520 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 275,968 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 293,376 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 296,960 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 258,048 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 256,512 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 289,280 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 288,256 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 285,184 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 297,472 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 295,424 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 294,400 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 292,864 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 290,816 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 288,768 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 286,208 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 281,600 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 286,720 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 292,352 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 242,176 \nMshtml.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 243,200 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 46,080 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 51,712 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 54,272 \nUrlmon.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 45,056 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 39,936 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 39,424 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 47,616 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 51,200 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 50,688 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 50,176 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 49,664 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 48,640 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 49,152 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 48,128 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 35,328 \nUrlmon.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:19| 35,328 \nJsproxy.dll| 11.0.9600.20512| 12-Jul-22| 4:18| 47,104 \nWininet.dll| 11.0.9600.20512| 12-Jul-22| 3:48| 4,387,840 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 114,176 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 124,928 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 122,880 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 130,048 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 138,240 \nInetcpl.cpl.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 114,688 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 131,584 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 117,760 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 122,368 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 134,144 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 107,008 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 127,488 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 128,512 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 88,576 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 82,944 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 123,392 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 120,320 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 130,560 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 125,952 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 128,000 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 129,024 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 124,416 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 121,856 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 115,712 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 123,904 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 125,440 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 72,704 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 73,728 \nInetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 73,728 \nMsfeedsbs.dll| 11.0.9600.20512| 12-Jul-22| 4:04| 52,736 \nMsfeedsbs.mof| Not versioned| 12-Jul-22| 2:34| 1,574 \nMsfeedssync.exe| 11.0.9600.20512| 12-Jul-22| 4:23| 11,776 \nIeproxy.dll| 11.0.9600.20512| 12-Jul-22| 3:40| 310,784 \nIeshims.dll| 11.0.9600.20512| 12-Jul-22| 3:43| 290,304 \nIertutil.dll| 11.0.9600.20512| 12-Jul-22| 4:22| 2,309,120 \nSqmapi.dll| 6.2.9200.16384| 13-Jul-22| 22:48| 229,304 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 2,066,432 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 2,121,216 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:52| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 2,063,872 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 2,314,240 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 2,390,528 \nIeframe.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:44| 2,033,152 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 2,255,872 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 2,061,312 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 2,326,016 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 2,019,840 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 2,071,040 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 2,082,816 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 2,307,584 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 2,170,368 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 2,153,984 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 2,291,712 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 2,283,520 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 2,052,096 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 2,301,952 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:07| 2,093,056 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 2,075,648 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 2,299,392 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:09| 2,094,592 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 2,316,800 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 2,305,536 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 2,278,912 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 2,285,568 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 2,060,288 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 2,315,776 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 2,279,424 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 2,324,992 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 2,098,176 \nIeframe.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 1,890,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:50| 29,184 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:51| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:53| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 35,328 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:54| 37,888 \nJscript9.dll.mui| 11.0.9600.20512| 14-Jul-22| 1:43| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:55| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:56| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:57| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:58| 27,648 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 22:59| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:00| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 33,792 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:01| 23,040 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:02| 22,016 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:03| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:04| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:05| 31,232 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 34,304 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:06| 35,840 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:08| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:10| 34,816 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:11| 33,280 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:12| 32,256 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:13| 32,768 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:14| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:15| 30,720 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 29,696 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:16| 16,384 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:17| 16,896 \nJscript9.dll.mui| 11.0.9600.20512| 13-Jul-22| 23:18| 16,896 \nPackage.cab| Not versioned| 14-Jul-22| 9:52| 301,903 \n \n### **Windows 7 and Windows Server 2008 R2**\n\n## \n\n__\n\nInternet Explorer 11 on all supported x86-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nurlmon.dll| 11.0.9600.20512| 11-Jul-2022| 20:45| 1,342,976 \niexplore.exe| 11.0.9600.20512| 13-Jul-2022| 15:54| 811,440 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 31,744 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 39,424 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 32,768 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 37,376 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 38,400 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 30,720 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 25,600 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 24,576 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 20,992 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 21,504 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 21,504 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \ninetcpl.cpl| 11.0.9600.20512| 11-Jul-2022| 20:57| 2,058,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 10,752 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 288,768 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 243,200 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 73,728 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 78,848 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 74,752 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 62,464 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 75,264 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 72,192 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 73,216 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 41,472 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 37,888 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 70,656 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 71,680 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 69,632 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 59,904 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 69,120 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 29,696 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 60,416 \nDiagnosticsHub.ScriptedSandboxPlugin.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 230,912 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 35,328 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 11,264 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 9,216 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 6,656 \nwininet.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 4,387,840 \njsproxy.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 47,104 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 88,576 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 72,704 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 73,728 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 73,728 \niedkcs32.dll| 18.0.9600.20512| 13-Jul-2022| 15:54| 342,944 \ninstall.ins| Not versioned| 11-Jul-2022| 19:17| 464 \nieapfltr.dat| 10.0.9301.0| 29-Jun-2022| 19:04| 616,104 \nieapfltr.dll| 11.0.9600.20512| 11-Jul-2022| 20:41| 710,656 \ntdc.ocx| 11.0.9600.20512| 11-Jul-2022| 21:06| 73,728 \nDiagnosticsHub.DataWarehouse.dll| 11.0.9600.20512| 11-Jul-2022| 21:25| 489,472 \niedvtool.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 772,608 \nDiagnosticsHub_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:26| 38,912 \ndxtmsft.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 415,744 \ndxtrans.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 280,064 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 3,584 \nF12.dll| 11.0.9600.20512| 11-Jul-2022| 21:01| 1,207,808 \nDiagnosticsTap.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 175,104 \nMicrosoft-Windows-IE-F12-Provider.ptxml| Not versioned| 11-Jul-2022| 19:27| 11,892 \nF12Resources.dll| 11.0.9600.20512| 11-Jul-2022| 21:28| 10,948,096 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 2,048 \nF12Tools.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 256,000 \nmsfeedsbs.mof| Not versioned| 11-Jul-2022| 19:34| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 52,736 \nmsfeedssync.exe| 11.0.9600.20512| 11-Jul-2022| 21:23| 11,776 \nmsfeeds.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 696,320 \nmsfeeds.mof| Not versioned| 11-Jul-2022| 19:34| 1,518 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,066,432 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 2,121,216 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 2,063,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 2,314,240 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,390,528 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 2,033,152 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 2,255,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,061,312 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 2,326,016 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 2,019,840 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,071,040 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,082,816 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,170,368 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 2,153,984 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 2,291,712 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,283,520 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 2,052,096 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 2,301,952 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,093,056 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 2,299,392 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 2,094,592 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,316,800 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 2,305,536 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 2,278,912 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,285,568 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,060,288 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 2,315,776 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 2,279,424 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 2,324,992 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,098,176 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 3,072 \nieframe.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 13,885,440 \nieui.dll| 11.0.9600.20512| 11-Jul-2022| 21:16| 476,160 \nieframe.ptxml| Not versioned| 11-Jul-2022| 19:27| 24,486 \nhtml.iec| 2019.0.0.20512| 11-Jul-2022| 21:22| 341,504 \nmshtmled.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 76,800 \nmshtml.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 20,296,192 \nmshtml.tlb| 11.0.9600.20512| 11-Jul-2022| 21:31| 2,724,864 \nMicrosoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 11-Jul-2022| 19:27| 3,228 \nmshtmlmedia.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 1,155,584 \nieetwcollector.exe| 11.0.9600.20512| 11-Jul-2022| 21:16| 104,960 \nieetwproxystub.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 47,616 \nieetwcollectorres.dll| 11.0.9600.20512| 11-Jul-2022| 21:31| 4,096 \nielowutil.exe| 11.0.9600.20512| 11-Jul-2022| 21:17| 221,184 \nieproxy.dll| 11.0.9600.20512| 11-Jul-2022| 20:40| 310,784 \nIEShims.dll| 11.0.9600.20512| 11-Jul-2022| 20:43| 290,304 \nieinstal.exe| 11.0.9600.20512| 11-Jul-2022| 21:03| 475,648 \nWindows Pop-up Blocked.wav| Not versioned| 29-Jun-2022| 19:06| 85,548 \nWindows Information Bar.wav| Not versioned| 29-Jun-2022| 19:06| 23,308 \nWindows Feed Discovered.wav| Not versioned| 29-Jun-2022| 19:06| 19,884 \nWindows Navigation Start.wav| Not versioned| 29-Jun-2022| 19:06| 11,340 \nbing.ico| Not versioned| 29-Jun-2022| 19:05| 5,430 \nieUnatt.exe| 11.0.9600.20512| 11-Jul-2022| 21:15| 115,712 \nMicrosoft-Windows-IE-InternetExplorer-ppdlic.xrm-ms| Not versioned| 13-Jul-2022| 18:50| 2,956 \njsprofilerui.dll| 11.0.9600.20512| 11-Jul-2022| 21:05| 579,584 \nMemoryAnalyzer.dll| 11.0.9600.20512| 11-Jul-2022| 21:14| 1,399,296 \nMshtmlDac.dll| 11.0.9600.20512| 11-Jul-2022| 21:21| 64,000 \nnetworkinspection.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 1,075,200 \noccache.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 130,048 \ndesktop.ini| Not versioned| 29-Jun-2022| 19:04| 65 \nwebcheck.dll| 11.0.9600.20512| 11-Jul-2022| 20:58| 230,400 \ndesktop.ini| Not versioned| 29-Jun-2022| 19:04| 65 \nmsrating.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 168,960 \nicrav03.rat| Not versioned| 29-Jun-2022| 19:04| 8,798 \nticrf.rat| Not versioned| 29-Jun-2022| 19:04| 1,988 \niertutil.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 2,309,120 \nsqmapi.dll| 6.2.9200.16384| 13-Jul-2022| 15:54| 229,280 \ninseng.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 91,136 \nie4uinit.exe| 11.0.9600.20512| 11-Jul-2022| 20:57| 692,224 \niernonce.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 30,720 \niesetup.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 62,464 \nieuinit.inf| Not versioned| 11-Jul-2022| 20:25| 16,303 \nTimeline.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 154,112 \nTimeline_is.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 124,928 \nTimeline.cpu.xml| Not versioned| 29-Jun-2022| 19:04| 3,197 \nVGX.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 818,176 \nInetRes.adml| Not versioned| 13-Jul-2022| 15:56| 463,373 \nInetRes.adml| Not versioned| 13-Jul-2022| 15:57| 751,228 \nInetRes.adml| Not versioned| 13-Jul-2022| 15:58| 526,345 \nInetRes.adml| Not versioned| 13-Jul-2022| 15:58| 499,706 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:00| 552,385 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:01| 944,611 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:51| 457,561 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:01| 543,995 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:02| 751,322 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:03| 526,608 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:04| 575,886 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:05| 463,373 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:06| 751,347 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:07| 570,788 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:07| 548,173 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:08| 639,283 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:09| 525,516 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:10| 751,330 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:11| 751,298 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:12| 488,539 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:12| 548,543 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:14| 559,395 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:15| 535,116 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:16| 541,504 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:16| 751,467 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:17| 804,519 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:18| 751,243 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:18| 751,362 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:20| 751,387 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:20| 503,959 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:21| 751,443 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:22| 521,632 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:23| 751,358 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:24| 420,094 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:25| 436,663 \nInetRes.adml| Not versioned| 13-Jul-2022| 16:26| 436,663 \ninetres.admx| Not versioned| 29-Jun-2022| 19:09| 1,678,023 \nMsSpellCheckingFacility.exe| 6.3.9600.20512| 11-Jul-2022| 21:12| 668,672 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 29,184 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 35,328 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 37,888 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 27,648 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 33,792 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 23,040 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 22,016 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 31,232 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 35,840 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 34,816 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 32,256 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 30,720 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 16,384 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 16,896 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 16,896 \njscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:16| 653,824 \njscript9.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 4,119,040 \njscript9diag.dll| 11.0.9600.20512| 11-Jul-2022| 21:15| 620,032 \nvbscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:23| 498,176 \n \n## \n\n__\n\nInternet Explorer 11 on all supported x64-based versions\n\n**File name**| **File version**| **Date**| **Time**| **File size** \n---|---|---|---|--- \nurlmon.dll| 11.0.9600.20512| 12-Jul-2022| 15:00| 1,563,648 \niexplore.exe| 11.0.9600.20512| 13-Jul-2022| 18:15| 811,448 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 31,744 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 39,424 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 32,768 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 37,376 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 38,400 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 30,720 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 25,600 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 24,576 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 20,992 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 21,504 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 21,504 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 30,720 \ninetcpl.cpl| 11.0.9600.20512| 12-Jul-2022| 15:10| 2,132,992 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 10,752 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 288,768 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 243,200 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 73,728 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 78,848 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 61,440 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 74,752 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 62,464 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 75,264 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 72,192 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 73,216 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 41,472 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 37,888 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 67,584 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 74,240 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 70,656 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 71,680 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 71,168 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 69,632 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 68,608 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 68,096 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 59,904 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 65,536 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 69,120 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 29,696 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 30,720 \nF12Resources.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 30,720 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 12-Jul-2022| 15:25| 77,824 \nDiagnosticsHub.ScriptedSandboxPlugin.dll| 11.0.9600.20512| 12-Jul-2022| 15:26| 276,480 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 35,328 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 11,264 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 9,216 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 6,656 \nwininet.dll| 11.0.9600.20512| 12-Jul-2022| 15:14| 4,858,880 \njsproxy.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 54,784 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 88,576 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 72,704 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 73,728 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 73,728 \niedkcs32.dll| 18.0.9600.20512| 13-Jul-2022| 18:15| 391,608 \ninstall.ins| Not versioned| 12-Jul-2022| 13:18| 464 \nieapfltr.dat| 10.0.9301.0| 7-Jul-2022| 17:17| 616,104 \nieapfltr.dll| 11.0.9600.20512| 12-Jul-2022| 14:44| 800,768 \ntdc.ocx| 11.0.9600.20512| 12-Jul-2022| 15:24| 88,064 \nDiagnosticsHub.DataWarehouse.dll| 11.0.9600.20512| 12-Jul-2022| 15:50| 666,624 \niedvtool.dll| 11.0.9600.20512| 12-Jul-2022| 16:13| 950,784 \nDiagnosticsHub_is.dll| 11.0.9600.20512| 12-Jul-2022| 15:51| 50,176 \ndxtmsft.dll| 11.0.9600.20512| 12-Jul-2022| 15:30| 491,008 \ndxtrans.dll| 11.0.9600.20512| 12-Jul-2022| 15:20| 316,416 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 4,096 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 3,584 \nF12.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 3,584 \nF12.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 1,422,848 \nDiagnosticsTap.dll| 11.0.9600.20512| 12-Jul-2022| 15:29| 245,248 \nMicrosoft-Windows-IE-F12-Provider.ptxml| Not versioned| 12-Jul-2022| 13:27| 11,892 \nF12Resources.dll| 11.0.9600.20512| 12-Jul-2022| 15:54| 10,949,120 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 2,048 \nF12Tools.dll| 11.0.9600.20512| 12-Jul-2022| 15:28| 372,224 \nmsfeedsbs.mof| Not versioned| 12-Jul-2022| 13:34| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 60,416 \nmsfeedssync.exe| 11.0.9600.20512| 12-Jul-2022| 15:48| 13,312 \nmsfeeds.dll| 11.0.9600.20512| 12-Jul-2022| 15:10| 809,472 \nmsfeeds.mof| Not versioned| 12-Jul-2022| 13:34| 1,518 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 2,066,432 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 2,121,216 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 2,063,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 2,314,240 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 2,390,528 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 2,033,152 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 2,255,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 2,061,312 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 2,326,016 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 2,019,840 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 2,071,040 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 2,082,816 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 2,170,368 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 2,153,984 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 2,291,712 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 2,283,520 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 2,052,096 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 2,301,952 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 2,093,056 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 2,299,392 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 2,094,592 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:36| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 2,316,800 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 2,305,536 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 2,278,912 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 2,285,568 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 2,060,288 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 2,315,776 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 2,279,424 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 2,324,992 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 2,098,176 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:45| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 3,072 \nieframe.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 15,509,504 \nieui.dll| 11.0.9600.20512| 12-Jul-2022| 15:39| 615,936 \nieframe.ptxml| Not versioned| 12-Jul-2022| 13:26| 24,486 \nhtml.iec| 2019.0.0.20512| 12-Jul-2022| 15:47| 417,280 \nmshtmled.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 92,672 \nmshtml.dll| 11.0.9600.20512| 12-Jul-2022| 16:13| 25,761,280 \nmshtml.tlb| 11.0.9600.20512| 12-Jul-2022| 15:58| 2,724,864 \nMicrosoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 12-Jul-2022| 13:27| 3,228 \nmshtmlmedia.dll| 11.0.9600.20512| 12-Jul-2022| 15:10| 1,359,872 \nieetwcollector.exe| 11.0.9600.20512| 12-Jul-2022| 15:38| 116,224 \nieetwproxystub.dll| 11.0.9600.20512| 12-Jul-2022| 15:47| 48,640 \nieetwcollectorres.dll| 11.0.9600.20512| 12-Jul-2022| 15:58| 4,096 \nielowutil.exe| 11.0.9600.20512| 12-Jul-2022| 15:40| 222,720 \nieproxy.dll| 11.0.9600.20512| 12-Jul-2022| 14:43| 870,400 \nIEShims.dll| 11.0.9600.20512| 12-Jul-2022| 14:48| 387,072 \nieinstal.exe| 11.0.9600.20512| 12-Jul-2022| 15:20| 492,032 \nWindows Pop-up Blocked.wav| Not versioned| 7-Jul-2022| 17:30| 85,548 \nWindows Information Bar.wav| Not versioned| 7-Jul-2022| 17:30| 23,308 \nWindows Feed Discovered.wav| Not versioned| 7-Jul-2022| 17:30| 19,884 \nWindows Navigation Start.wav| Not versioned| 7-Jul-2022| 17:30| 11,340 \nbing.ico| Not versioned| 7-Jul-2022| 17:24| 5,430 \nieUnatt.exe| 11.0.9600.20512| 12-Jul-2022| 15:38| 144,384 \nMicrosoft-Windows-IE-InternetExplorer-ppdlic.xrm-ms| Not versioned| 13-Jul-2022| 19:11| 2,956 \njsprofilerui.dll| 11.0.9600.20512| 12-Jul-2022| 15:23| 628,736 \nMemoryAnalyzer.dll| 11.0.9600.20512| 12-Jul-2022| 15:36| 1,862,656 \nMshtmlDac.dll| 11.0.9600.20512| 12-Jul-2022| 15:46| 88,064 \nnetworkinspection.dll| 11.0.9600.20512| 12-Jul-2022| 15:18| 1,217,024 \noccache.dll| 11.0.9600.20512| 12-Jul-2022| 15:19| 152,064 \ndesktop.ini| Not versioned| 7-Jul-2022| 17:20| 65 \nwebcheck.dll| 11.0.9600.20512| 12-Jul-2022| 15:12| 262,144 \ndesktop.ini| Not versioned| 7-Jul-2022| 17:20| 65 \nmsrating.dll| 11.0.9600.20512| 12-Jul-2022| 15:22| 199,680 \nicrav03.rat| Not versioned| 7-Jul-2022| 17:20| 8,798 \nticrf.rat| Not versioned| 7-Jul-2022| 17:20| 1,988 \niertutil.dll| 11.0.9600.20512| 12-Jul-2022| 15:52| 2,917,888 \nsqmapi.dll| 6.2.9200.16384| 13-Jul-2022| 18:15| 287,160 \ninseng.dll| 11.0.9600.20512| 12-Jul-2022| 15:24| 107,520 \nie4uinit.exe| 11.0.9600.20512| 12-Jul-2022| 15:10| 728,064 \niernonce.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 34,304 \niesetup.dll| 11.0.9600.20512| 12-Jul-2022| 15:47| 66,560 \nieuinit.inf| Not versioned| 12-Jul-2022| 14:27| 16,303 \nTimeline.dll| 11.0.9600.20512| 12-Jul-2022| 15:24| 219,648 \nTimeline_is.dll| 11.0.9600.20512| 12-Jul-2022| 15:41| 172,032 \nTimeline.cpu.xml| Not versioned| 7-Jul-2022| 17:20| 3,197 \nVGX.dll| 11.0.9600.20512| 12-Jul-2022| 15:21| 1,018,880 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:18| 463,373 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:19| 751,409 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:20| 526,344 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:20| 499,703 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:21| 552,387 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:22| 944,611 \nInetRes.adml| Not versioned| 13-Jul-2022| 19:12| 457,561 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:22| 543,998 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:23| 751,514 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:24| 526,607 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:25| 575,886 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:26| 463,373 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:26| 751,324 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:27| 570,788 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:28| 548,171 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:29| 639,283 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:30| 525,516 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:30| 751,192 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:31| 751,355 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:32| 488,539 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:32| 548,543 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:33| 559,394 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:34| 535,117 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:35| 541,504 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:36| 751,453 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:37| 804,521 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:37| 751,267 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:38| 751,412 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:39| 751,409 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:40| 503,958 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:40| 751,415 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:41| 521,634 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:42| 751,348 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:43| 420,094 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:44| 436,663 \nInetRes.adml| Not versioned| 13-Jul-2022| 18:44| 436,663 \ninetres.admx| Not versioned| 12-Jul-2022| 12:37| 1,678,023 \nMsSpellCheckingFacility.exe| 6.3.9600.20512| 12-Jul-2022| 15:33| 970,752 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:17| 29,184 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:18| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:19| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:20| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 35,328 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:21| 37,888 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 19:12| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:22| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:23| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:24| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:25| 27,648 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:26| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:27| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:28| 33,792 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 23,040 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:29| 22,016 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:30| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:31| 31,232 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:32| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:33| 35,840 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:34| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:35| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 34,816 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:37| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:38| 32,256 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:39| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:40| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 30,720 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:41| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:42| 16,384 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:43| 16,896 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:44| 16,896 \njscript.dll| 5.8.9600.20512| 12-Jul-2022| 15:38| 785,408 \njscript9.dll| 11.0.9600.20512| 12-Jul-2022| 15:53| 5,508,096 \njscript9diag.dll| 11.0.9600.20512| 12-Jul-2022| 15:37| 814,592 \nvbscript.dll| 5.8.9600.20512| 12-Jul-2022| 15:47| 581,120 \niexplore.exe| 11.0.9600.20512| 13-Jul-2022| 15:54| 811,440 \ntdc.ocx| 11.0.9600.20512| 11-Jul-2022| 21:06| 73,728 \ndxtmsft.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 415,744 \ndxtrans.dll| 11.0.9600.20512| 11-Jul-2022| 21:03| 280,064 \nmsfeeds.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 696,320 \nmsfeeds.mof| Not versioned| 11-Jul-2022| 19:34| 1,518 \nieframe.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 13,885,440 \nieui.dll| 11.0.9600.20512| 11-Jul-2022| 21:16| 476,160 \nie9props.propdesc| Not versioned| 29-Jun-2022| 19:05| 2,843 \nwow64_ieframe.ptxml| Not versioned| 11-Jul-2022| 19:29| 24,486 \nmshtmled.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 76,800 \nmshtml.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 20,296,192 \nmshtml.tlb| 11.0.9600.20512| 11-Jul-2022| 21:31| 2,724,864 \nwow64_Microsoft-Windows-IE-HTMLRendering.ptxml| Not versioned| 11-Jul-2022| 19:29| 3,228 \nmshtmlmedia.dll| 11.0.9600.20512| 11-Jul-2022| 20:57| 1,155,584 \nieetwproxystub.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 47,616 \nieUnatt.exe| 11.0.9600.20512| 11-Jul-2022| 21:15| 115,712 \noccache.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 130,048 \nwebcheck.dll| 11.0.9600.20512| 11-Jul-2022| 20:58| 230,400 \niernonce.dll| 11.0.9600.20512| 11-Jul-2022| 21:17| 30,720 \niesetup.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 62,464 \nieuinit.inf| Not versioned| 11-Jul-2022| 20:25| 16,303 \njscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:16| 653,824 \njscript9.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 4,119,040 \njscript9diag.dll| 11.0.9600.20512| 11-Jul-2022| 21:15| 620,032 \nvbscript.dll| 5.8.9600.20512| 11-Jul-2022| 21:23| 498,176 \nurlmon.dll| 11.0.9600.20512| 11-Jul-2022| 20:45| 1,342,976 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 31,744 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 39,424 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 32,768 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 37,376 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 38,400 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 30,720 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 35,328 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 36,864 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 25,600 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 24,576 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 36,352 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 35,840 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 34,816 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 33,280 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 34,304 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 20,992 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 21,504 \nwebcheck.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 21,504 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 46,592 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 56,320 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 57,856 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 49,664 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 47,616 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 49,152 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 55,296 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 45,056 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 39,424 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 35,840 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 53,760 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 54,272 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 51,200 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 53,248 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 52,736 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 51,712 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 50,688 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 50,176 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \nwininet.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 30,720 \ninetcpl.cpl| 11.0.9600.20512| 11-Jul-2022| 20:57| 2,058,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 10,752 \nDiagnosticsTap.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 10,752 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 307,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 293,888 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 290,304 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 299,008 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 303,104 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 282,112 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 283,648 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 291,840 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 299,520 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 275,968 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 293,376 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 296,960 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 258,048 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 256,512 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 289,280 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 288,256 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 285,184 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 297,472 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 295,424 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 294,400 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 292,864 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 290,816 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 288,768 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 286,208 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 281,600 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 286,720 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 292,352 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 242,176 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 243,200 \nmshtml.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 243,200 \nJavaScriptCollectionAgent.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 60,416 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 46,080 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 51,712 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 54,272 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 45,056 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 39,936 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 39,424 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 47,616 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 51,200 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 50,688 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 50,176 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 49,664 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 48,640 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 49,152 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 48,128 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 35,328 \nurlmon.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 35,328 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 11,264 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 9,216 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 7,680 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 10,752 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 9,728 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 10,240 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 6,656 \noccache.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 6,656 \nwininet.dll| 11.0.9600.20512| 11-Jul-2022| 20:48| 4,387,840 \njsproxy.dll| 11.0.9600.20512| 11-Jul-2022| 21:18| 47,104 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 114,176 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 124,928 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 122,880 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 130,048 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 138,240 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 114,688 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 131,584 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 117,760 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 122,368 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 134,144 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 107,008 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 127,488 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 128,512 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 88,576 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 82,944 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 123,392 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 120,320 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 130,560 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 125,952 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 128,000 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 129,024 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 124,416 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 121,856 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 115,712 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 123,904 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 125,440 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 72,704 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 73,728 \ninetcpl.cpl.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 73,728 \niedkcs32.dll| 18.0.9600.20512| 13-Jul-2022| 15:54| 342,944 \ninstall.ins| Not versioned| 11-Jul-2022| 19:17| 464 \nieapfltr.dat| 10.0.9301.0| 29-Jun-2022| 19:04| 616,104 \nieapfltr.dll| 11.0.9600.20512| 11-Jul-2022| 20:41| 710,656 \niedvtool.dll| 11.0.9600.20512| 11-Jul-2022| 21:40| 772,608 \nDiagnosticsTap.dll| 11.0.9600.20512| 11-Jul-2022| 21:09| 175,104 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,048 \nF12Tools.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 2,048 \nF12Tools.dll| 11.0.9600.20512| 11-Jul-2022| 21:08| 256,000 \nmsfeedsbs.mof| Not versioned| 11-Jul-2022| 19:34| 1,574 \nmsfeedsbs.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 52,736 \nmsfeedssync.exe| 11.0.9600.20512| 11-Jul-2022| 21:23| 11,776 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 2,066,432 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 2,121,216 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 2,063,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 2,314,240 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,390,528 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 2,033,152 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:51| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:01| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 2,255,872 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 2,061,312 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 2,326,016 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 2,019,840 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,071,040 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 2,082,816 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:06| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 2,307,584 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 2,170,368 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 2,153,984 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 2,291,712 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 2,283,520 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 2,052,096 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 2,301,952 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,093,056 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:13| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 2,075,648 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:15| 2,299,392 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 2,094,592 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 2,316,800 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 2,305,536 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 2,278,912 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,285,568 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 3,584 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 2,060,288 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 2,315,776 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 2,279,424 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 2,324,992 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 2,098,176 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 3,072 \nieframe.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:26| 1,890,304 \nieui.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 3,072 \nhtml.iec| 2019.0.0.20512| 11-Jul-2022| 21:22| 341,504 \nielowutil.exe| 11.0.9600.20512| 11-Jul-2022| 21:17| 221,184 \nieproxy.dll| 11.0.9600.20512| 11-Jul-2022| 20:40| 310,784 \nIEShims.dll| 11.0.9600.20512| 11-Jul-2022| 20:43| 290,304 \nieinstal.exe| 11.0.9600.20512| 11-Jul-2022| 21:03| 475,648 \njsprofilerui.dll| 11.0.9600.20512| 11-Jul-2022| 21:05| 579,584 \nMshtmlDac.dll| 11.0.9600.20512| 11-Jul-2022| 21:21| 64,000 \nnetworkinspection.dll| 11.0.9600.20512| 11-Jul-2022| 21:02| 1,075,200 \nmsrating.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 168,960 \nicrav03.rat| Not versioned| 29-Jun-2022| 19:04| 8,798 \nticrf.rat| Not versioned| 29-Jun-2022| 19:04| 1,988 \niertutil.dll| 11.0.9600.20512| 11-Jul-2022| 21:22| 2,309,120 \nsqmapi.dll| 6.2.9200.16384| 13-Jul-2022| 15:54| 229,280 \ninseng.dll| 11.0.9600.20512| 11-Jul-2022| 21:06| 91,136 \nVGX.dll| 11.0.9600.20512| 11-Jul-2022| 21:04| 818,176 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:56| 29,184 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:57| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:58| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 15:59| 35,328 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:00| 37,888 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 18:50| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:02| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:03| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:04| 27,648 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:05| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:07| 33,792 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:08| 23,040 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:09| 22,016 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:10| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:11| 31,232 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:12| 34,304 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 35,840 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:14| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:16| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:17| 34,816 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 33,280 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:18| 32,256 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:19| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:20| 32,768 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:21| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:22| 30,720 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:23| 29,696 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:24| 16,384 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 16,896 \njscript9.dll.mui| 11.0.9600.20512| 13-Jul-2022| 16:25| 16,896 \n \n## **Information about protection and security**\n\n * Protect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151/windows-security-help>)\n * Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T07:00:00", "type": "mskb", "title": "KB5016618: Cumulative security update for Internet Explorer: August 9, 2022", "bulletinFamily": "microsoft", "cvss2": {}, "cvelist": ["CVE-2022-35768"], "modified": "2022-08-09T07:00:00", "id": "KB5016618", "href": "https://support.microsoft.com/en-us/help/5016618", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-28T09:56:29", "description": "None\n## **Summary**\n\nLearn more about this security-only update, including improvements, any known issues, and how to get the update. \n\n**IMPORTANT **Windows Server 2008 Service Pack 2 (SP2) has reached the end of mainstream support and are now in extended support. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates in the **How to get this update** section before installing this update. Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of this OS must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ended on January 14, 2020. For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>). Because ESU is available as a separate SKU for each of the years in which they are offered (2020, 2021, and 2022)\u2014and because ESU can only be purchased in [specific 12-month periods](<https://docs.microsoft.com/lifecycle/faq/extended-security-updates>)\u2014you must purchase the third year of ESU coverage separately and activate a new key on each applicable device for your devices to continue receiving security updates in 2022.If your organization did not purchase the third year of ESU coverage, you must purchase Year 1, Year 2, and Year 3 ESU for your applicable Windows Server 2008 SP2 devices before you install and activate the Year 3 MAK keys to receive updates. The steps to [install, activate, and deploy ESUs](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) are the same for first, second, and third year coverage. For more information, see [Obtaining Extended Security Updates for eligible Windows devices](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) for the Volume Licensing process and [Purchasing Windows 7 ESUs as a Cloud Solution Provider](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/purchasing-windows-7-esus-as-a-cloud-solution-provider/ba-p/1034637>) for the CSP process. For embedded devices, contact your original equipment manufacturer (OEM).For more information, see the [ESU blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-extended-security-updates-for-windows-7-and-windows/ba-p/1872910>).\n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages for Windows Server 2008 SP2, see the following update history [home page](<https://support.microsoft.com/help/4343218>).\n\n## **Improvements**\n\nThis security-only update includes new improvements for the following issue:\n\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptom**| **Next step** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer\u201d, and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://aka.ms/Windows7ESU>) post. For information on the prerequisites, see the \"How to get this update\" section of this article. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is resolved in [update KB5018446](<https://support.microsoft.com/help/5018446>). \n \n## **How to get this update**\n\n**Before installing this update****IMPORTANT** Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of this OS must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates because extended support ended on January 14, 2020.For more information on ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Prerequisite:**You must install the updates listed below and **restart your device** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The April 9, 2019 servicing stack update (SSU) ([KB4493730](<https://support.microsoft.com/help/4493730>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released October 8, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. The Extended Security Updates (ESU) Licensing Preparation Package ([KB4538484](<https://support.microsoft.com/help/4538484>)) or the Update for the Extended Security Updates (ESU) Licensing Preparation Package ([KB4575904](<https://support.microsoft.com/help/4575904>)). The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter installing the items above, we strongly recommend that you install the latest SSU ([KB5016129](<https://support.microsoft.com/help/5016129>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).\n\n**REMINDER** If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer ([KB5011486](<https://support.microsoft.com/help/5011486>)).\n\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016686>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2008 Service Pack 2**Classification**: Security Updates \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update KB5016686](<https://download.microsoft.com/download/0/6/c/06c0ed9d-28bc-4650-9d3d-4465dd243573/5016686.csv>).\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-11T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016686 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34714", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35747", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793"], "modified": "2022-09-11T00:00:00", "id": "KB5016686", "href": "https://support.microsoft.com/en-us/help/5016686", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:26", "description": "None\n## **Summary**\n\nLearn more about this cumulative security update, including improvements, any known issues, and how to get the update.\n\n**IMPORTANT **Windows Server 2008 Service Pack 2 (SP2) has reached the end of mainstream support and is now in extended support. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates in the **How to get this update** section before installing this update. Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of this OS must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ended on January 14, 2020. For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>). Because ESU is available as a separate SKU for each of the years in which they are offered (2020, 2021, and 2022)\u2014and because ESU can only be purchased in [specific 12-month periods](<https://docs.microsoft.com/lifecycle/faq/extended-security-updates>)\u2014you must purchase the third year of ESU coverage separately and activate a new key on each applicable device for your devices to continue receiving security updates in 2022.If your organization did not purchase the third year of ESU coverage, you must purchase Year 1, Year 2, and Year 3 ESU for your applicable Windows Server 2008 SP2 devices before you install and activate the Year 3 MAK keys to receive updates. The steps to [install, activate, and deploy ESUs](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) are the same for first, second, and third year coverage. For more information, see [Obtaining Extended Security Updates for eligible Windows devices](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) for the Volume Licensing process and [Purchasing Windows 7 ESUs as a Cloud Solution Provider](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/purchasing-windows-7-esus-as-a-cloud-solution-provider/ba-p/1034637>) for the CSP process. For embedded devices, contact your original equipment manufacturer (OEM).For more information, see the [ESU blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-extended-security-updates-for-windows-7-and-windows/ba-p/1872910>).\n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages for Windows Server 2008 SP2, see the following update history [home page](<https://support.microsoft.com/help/4343218>).\n\n## **Improvements**\n\nThis cumulative security update contains improvements that are part of update [KB5015866](<https://support.microsoft.com/help/5015866>) (released July 12, 2022) and includes new improvements for the following issue:\n\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptom**| **Next step** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer\u201d, and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://aka.ms/Windows7ESU>) post. For information on the prerequisites, see the \"How to get this update\" section of this article. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n\u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.| This issue is resolved in [update KB5018450](<https://support.microsoft.com/help/5018450>). \n \n## **How to get this update**\n\n**Before installing this update****IMPORTANT** Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates because extended support ended on January 14, 2020.For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Prerequisite**You must install the updates listed below and **restart your device** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The April 9, 2019 servicing stack update (SSU) ([KB4493730](<https://support.microsoft.com/help/4493730>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released October 8, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. The Extended Security Updates (ESU) Licensing Preparation Package ([KB4538484](<https://support.microsoft.com/help/4538484>)) or the Update for the Extended Security Updates (ESU) Licensing Preparation Package ([KB4575904](<https://support.microsoft.com/help/4575904>)). The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter installing the items above, Microsoft strongly recommends that you install the latest SSU ([KB5016129](<https://support.microsoft.com/help/5016129>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update if you are an ESU customer. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016669>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2008 Service Pack 2**Classification**: Security Updates \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update KB5016669](<https://download.microsoft.com/download/3/1/f/31f985fd-a8b3-4a9e-a3b4-b0d1bf0cf997/5016669.csv>).\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-11T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016669 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34714", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35747", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793"], "modified": "2022-09-11T00:00:00", "id": "KB5016669", "href": "https://support.microsoft.com/en-us/help/5016669", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:27", "description": "None\n**IMPORTANT** Microsoft released update [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n## **Summary**\n\nLearn more about this security-only update, including improvements, any known issues, and how to get the update.\n\n**IMPORTANT** Windows 7, Windows Server 2008 R2, Windows Embedded Standard 7, and Windows Embedded POS Ready 7 have reached the end of mainstream support and are now in extended security update (ESU) support. Windows Thin PC has reached the end of mainstream support; however, ESU support is not available. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates in the **How to get this update** section before installing this update. Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of this OS must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ended on January 14, 2020. For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>). Because ESU is available as a separate SKU for each of the years in which they are offered (2020, 2021, and 2022)\u2014and because ESU can only be purchased in [specific 12-month periods](<https://docs.microsoft.com/lifecycle/faq/extended-security-updates>)\u2014you must purchase the third year of ESU coverage separately and activate a new key on each applicable device for your devices to continue receiving security updates in 2022.If your organization did not purchase the third year of ESU coverage, you must purchase Year 1, Year 2, and Year 3 ESU for your applicable Windows 7 SP1 or Windows Server 2008 R2 SP1 devices before you install and activate the Year 3 MAK keys to receive updates. The steps to [install, activate, and deploy ESUs](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) are the same for first, second, and third year coverage. For more information, see [Obtaining Extended Security Updates for eligible Windows devices](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) for the Volume Licensing process and [Purchasing Windows 7 ESUs as a Cloud Solution Provider](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/purchasing-windows-7-esus-as-a-cloud-solution-provider/ba-p/1034637>) for the CSP process. For embedded devices, contact your original equipment manufacturer (OEM).For more information, see the [ESU blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-extended-security-updates-for-windows-7-and-windows/ba-p/1872910>).\n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages for Windows 7 SP1 and Windows Server 2008 R2 SP1, see the following update history [home page](<https://support.microsoft.com/help/4009469>).\n\n## **Improvements**\n\nThis security-only update includes new improvements for the following issue:\n\n * Addresses an issue in which Speech and Network troubleshooters will not start.\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptom**| **Next step** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \u201cFailure to configure Windows updates. Reverting Changes. Do not turn off your computer,\u201d and the update might show as **Failed **in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\n * If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) post. For information on the prerequisites, see the **How to get this update** section of this article. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n\u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.| This issue is resolved in [update KB5018479](<https://support.microsoft.com/help/5018479>). \n \n## **How to get this update**\n\n**Before installing this update****IMPORTANT** Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates. Extended support ended as follows:\n\n * For Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1, extended support ended on January 14, 2020.\n * For Windows Embedded Standard 7, extended support ended on October 13, 2020.\n * For Windows Embedded POS Ready 7, extended support ended on October 12, 2021.\n * For Windows Thin PC, extended support ended on October 12, 2021. Note that ESU support is not available for Windows Thin PC.\nFor more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Note** For Windows Embedded Standard 7, Windows Management Instrumentation (WMI) must be enabled to get updates from Windows Update or Windows Server Update Services.**Prerequisite:**You must install the updates listed below and **restart your device** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The March 12, 2019 servicing stack update (SSU) ([KB4490628](<https://support.microsoft.com/help/4490628>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released September 10, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. To get this security update, you must reinstall the \"Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4538483](<https://support.microsoft.com/help/4538483>)) or the \"Update for the Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4575903](<https://support.microsoft.com/help/4575903>)) even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter installing the items above, Microsoft strongly recommends that you install the latest SSU ([KB5016057](<https://support.microsoft.com/help/5016057>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).\n\n**REMINDER** If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer ([KB5016618](<https://support.microsoft.com/help/5016618>)).\n\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016679>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1, Windows Embedded Standard 7 Service Pack 1, Windows Embedded POSReady 7**Classification**: Security Updates \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update KB5016679](<https://download.microsoft.com/download/0/7/5/075d3aa5-2a06-4feb-85ee-2b2c583d75a9/5016679.csv>).\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-11T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016679 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35747", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2022-09-11T00:00:00", "id": "KB5016679", "href": "https://support.microsoft.com/en-us/help/5016679", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:26", "description": "None\n**IMPORTANT** Microsoft released update [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n## **Summary**\n\nLearn more about this cumulative security update, including improvements, any known issues, and how to get the update. \n\n**IMPORTANT **Windows 7, Windows Server 2008 R2, Windows Embedded Standard 7, and Windows Embedded POS Ready 7 have reached the end of mainstream support and are now in extended security update (ESU) support. Windows Thin PC has reached the end of mainstream support; however, ESU support is not available. Starting in July 2020, there will no longer be optional, non-security releases (known as \"C\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates in the **How to get this update** section before installing this update. Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of this OS must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates after extended support ended on January 14, 2020. For more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>). Because ESU is available as a separate SKU for each of the years in which they are offered (2020, 2021, and 2022)\u2014and because ESU can only be purchased in [specific 12-month periods](<https://docs.microsoft.com/lifecycle/faq/extended-security-updates>)\u2014you must purchase the third year of ESU coverage separately and activate a new key on each applicable device for your devices to continue receiving security updates in 2022.If your organization did not purchase the third year of ESU coverage, you must purchase Year 1, Year 2, and Year 3 ESU for your applicable Windows 7 SP1 or Windows Server 2008 R2 SP1 devices before you install and activate the Year 3 MAK keys to receive updates. The steps to [install, activate, and deploy ESUs](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) are the same for first, second, and third year coverage. For more information, see [Obtaining Extended Security Updates for eligible Windows devices](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) for the Volume Licensing process and [Purchasing Windows 7 ESUs as a Cloud Solution Provider](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/purchasing-windows-7-esus-as-a-cloud-solution-provider/ba-p/1034637>) for the CSP process. For embedded devices, contact your original equipment manufacturer (OEM).For more information, see the [ESU blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-extended-security-updates-for-windows-7-and-windows/ba-p/1872910>).\n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages for Windows 7 and Windows Server 2008 R2, see the following update history [home page](<https://support.microsoft.com/help/4009469>).\n\n## **Improvements**\n\nThis cumulative security update contains improvements that are part of update [KB5015861](<https://support.microsoft.com/help/5015861>) (released July 12, 2022) and includes new improvements for the following issues:\n\n * Addresses an issue in which Speech and Network troubleshooters will not start.\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptom **| **Next step ** \n---|--- \nAfter installing this update and restarting your device, you might receive the error, \"Failure to configure Windows updates. Reverting Changes. Do not turn off your computer\", and the update might show as **Failed** in **Update History**.| This is expected in the following circumstances:\n\n * If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).\n * If you do not have an ESU MAK add-on key installed and activated.\nIf you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated. For information on activation, please see this [blog](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/obtaining-extended-security-updates-for-eligible-windows-devices/ba-p/1167091>) post. For information on the prerequisites, see the **How to get this update** section of this article. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n\u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.| This issue is resolved in [update KB5018454](<https://support.microsoft.com/help/5018454>). \n \n## **How to get this update**\n\n**Before installing this update****IMPORTANT** Customers who have purchased the [Extended Security Update (ESU)](<https://www.microsoft.com/cloud-platform/extended-security-updates>) for on-premises versions of these operating systems must follow the procedures in [KB4522133](<https://support.microsoft.com/help/4522133>) to continue receiving security updates. Extended support ended as follows:\n\n * For Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1, extended support ended on January 14, 2020.\n * For Windows Embedded Standard 7, extended support ended on October 13, 2020.\n * For Windows Embedded POS Ready 7, extended support ended on October 12, 2021.\n * For Windows Thin PC, extended support ended on October 12, 2021. Note that ESU support is not available for Windows Thin PC.\nFor more information about ESU and which editions are supported, see [KB4497181](<https://support.microsoft.com/help/4497181>).**Note** For Windows Embedded Standard 7, Windows Management Instrumentation (WMI) must be enabled to get updates from Windows Update or Windows Server Update Services.**Prerequisite**You must install the updates listed below and **restart your device** before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.\n\n 1. The March 12, 2019 servicing stack update (SSU) ([KB4490628](<https://support.microsoft.com/help/4490628>)). To get the standalone package for this SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). This update is required to install updates that are only SHA-2 signed.\n 2. The latest SHA-2 update ([KB4474419](<https://support.microsoft.com/help/4474419>)) released September 10, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see [2019 SHA-2 Code Signing Support requirement for Windows and WSUS](<https://support.microsoft.com/help/4472027>).\n 3. To get this security update, you must reinstall the \"Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4538483](<https://support.microsoft.com/help/4538483>)) or the \"Update for the Extended Security Updates (ESU) Licensing Preparation Package\" ([KB4575903](<https://support.microsoft.com/help/4575903>)) even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>).\nAfter you install the items above, we strongly recommend that you install the latest SSU ([KB5016057](<https://support.microsoft.com/help/5016057>)). If you are using Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update if you are an ESU customer. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016676>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1, Windows Embedded Standard 7 Service Pack 1, Windows Embedded POSReady 7**Classification**: Security Updates \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update KB5016676](<https://download.microsoft.com/download/7/5/d/75d1aed6-b246-418e-9f56-efc953ea7e70/5016676.csv>).\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-11T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016676 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35747", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2022-09-11T00:00:00", "id": "KB5016676", "href": "https://support.microsoft.com/en-us/help/5016676", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:26", "description": "None\n**IMPORTANT** Microsoft released update [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n## **Summary**\n\nLearn more about this cumulative security update, including improvements, any known issues, and how to get the update. \n\n**IMPORTANT** Windows Server 2012 has reached the end of mainstream support and is now in extended support. Starting in July 2020, there will no longer be optional releases (known as \"C\" or \"D\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates listed in the **How to get this update** section before installing this update. \n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2012 update history [home page](<https://support.microsoft.com/help/4009471>).\n\n## **Improvements**\n\nThis cumulative security update contains improvements that are part of update [KB5015863](<https://support.microsoft.com/help/5015863>) (released July 12, 2022) and includes new improvements for the following issues:\n\n * Addresses an issue in which Speech and Network troubleshooters will not start.\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptoms**| **Next step** \n---|--- \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is resolved in [update KB5018457](<https://support.microsoft.com/help/5018457>). \n \n## **How to get this update**\n\n**Before installing this update**We strongly recommend that you install the latest servicing stack update (SSU) for your operating system before installing the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB5016263](<https://support.microsoft.com/help/5016263>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016672>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2012, Windows Embedded 8 Standard**Classification**: Security Updates \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update KB5016672](<https://download.microsoft.com/download/b/7/5/b75ea0f1-b444-4851-9385-e368b0b79d66/5016672.csv>).\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-11T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016672 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2022-09-11T00:00:00", "id": "KB5016672", "href": "https://support.microsoft.com/en-us/help/5016672", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:29", "description": "None\n**IMPORTANT** Microsoft released update [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n## **Summary**\n\nLearn more about this security-only update, including improvements, any known issues, and how to get the update. \n\n**IMPORTANT **Windows Server 2012 has reached the end of mainstream support and is now in extended support. Starting in July 2020, there will no longer be optional releases (known as \"C\" or \"D\" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the \"B\" or Update Tuesday release).Verify that** **you have installed the required updates listed in the **How to get this update** section before installing this update. \n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows Server 2012 update history [home page](<https://support.microsoft.com/help/4009471>).\n\n## **Improvements**\n\nThis security-only update includes new improvements for the following issues:\n\n * Addresses an issue in which Speech and Network troubleshooters will not start.\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptoms**| **Next step** \n---|--- \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is resolved in [update KB5018478](<https://support.microsoft.com/help/5018478>). \n \n## **How to get this update**\n\n**Before installing this update**We strongly recommend that you install the latest servicing stack update (SSU) for your operating system before installing the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB5016263](<https://support.microsoft.com/help/5016263>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). \n\n**REMINDER** If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer ([KB5016618](<https://support.microsoft.com/help/5016618>)).\n\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016684>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows Server 2012, Windows Embedded 8 Standard**Classification**: Security Update \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for KB5016684](<https://download.microsoft.com/download/7/d/7/7d74d7ba-e19a-4254-8f45-d3dbcbf08df0/5016684.csv>).\n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-11T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016684 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2022-09-11T00:00:00", "id": "KB5016684", "href": "https://support.microsoft.com/en-us/help/5016684", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:29", "description": "None\n**IMPORTANT** Microsoft released update [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n## **Summary**\n\nLearn more about this cumulative security update, including improvements, any known issues, and how to get the update.\n\n**REMINDER** [Windows 8.1](<https://docs.microsoft.com/lifecycle/products/windows-81>) will reach end of support on January 10, 2023, at which point technical assistance and software updates will no longer be provided. If you have devices running Windows 8.1, we recommend upgrading them to a more current, in-service, and supported Windows release. If devices do not meet the technical requirements to run a more current release of Windows, we recommend that you replace the device with one that supports Windows 11.Microsoft will not be offering an Extended Security Update (ESU) program for Windows 8.1. Continuing to use Windows 8.1 after January 10, 2023 may increase an organization\u2019s exposure to security risks or impact its ability to meet compliance obligations.For more information, see [Windows 8.1 support will end on January 10, 2023](<https://support.microsoft.com/windows/windows-8-1-support-will-end-on-january-10-2023-3cfd4cde-f611-496a-8057-923fba401e93>).[Windows Server 2012 R2](<https://docs.microsoft.com/lifecycle/products/windows-server-2012-r2>) will reach end of support on October 10, 2023 for Datacenter, Essentials, Embedded Systems, Foundation, and Standard.\n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows 8.1 and Windows Server 2012 R2 update history [home page](<https://support.microsoft.com/help/4009470>).\n\n## ****Improvements****\n\nThis cumulative security update includes improvements that are part of update [KB5015874](<https://support.microsoft.com/help/5015874>) (released July 12, 2022) and includes new improvements for the following issues:\n\n * Addresses an issue in which Speech and Network troubleshooters will not start.\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptoms**| **Next step** \n---|--- \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is resolved in [update KB5018454](<https://support.microsoft.com/help/5018454>). \n \n## **How to get this update**\n\n**Before installing this update**We strongly recommend that you install the latest servicing stack update (SSU) for your operating system before you install the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB5016264](<https://support.microsoft.com/help/5016264>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016681>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 8.1, Windows Server 2012 R2, Windows Embedded 8.1 Industry Enterprise, Windows Embedded 8.1 Industry Pro**Classification**: Security Updates \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update 5016681](<https://download.microsoft.com/download/6/0/8/60876bab-f4d8-487f-b72f-ed2484d46fb0/5016681.csv>). \n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-10-10T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016681 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2023-10-10T00:00:00", "id": "KB5016681", "href": "https://support.microsoft.com/en-us/help/5016681", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:29", "description": "None\n**IMPORTANT** Microsoft released update [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n## **Summary**\n\nLearn more about this security-only update, including improvements, any known issues, and how to get the update. \n\n**REMINDER** [Windows 8.1](<https://docs.microsoft.com/lifecycle/products/windows-81>) will reach end of support on January 10, 2023, at which point technical assistance and software updates will no longer be provided. If you have devices running Windows 8.1, we recommend upgrading them to a more current, in-service, and supported Windows release. If devices do not meet the technical requirements to run a more current release of Windows, we recommend that you replace the device with one that supports Windows 11.Microsoft will not be offering an Extended Security Update (ESU) program for Windows 8.1. Continuing to use Windows 8.1 after January 10, 2023 may increase an organization\u2019s exposure to security risks or impact its ability to meet compliance obligations.For more information, see [Windows 8.1 support will end on January 10, 2023](<https://support.microsoft.com/windows/windows-8-1-support-will-end-on-january-10-2023-3cfd4cde-f611-496a-8057-923fba401e93>).[Windows Server 2012 R2](<https://docs.microsoft.com/lifecycle/products/windows-server-2012-r2>) will reach end of support on October 10, 2023 for Datacenter, Essentials, Embedded Systems, Foundation, and Standard.\n\n**Note** For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following [article](<https://support.microsoft.com/help/824684>). To view other notes and messages, see the Windows 8.1 and Windows Server 2012 R2 update history [home page](<https://support.microsoft.com/help/4009470>).\n\n## **Improvements**\n\nThis security-only update includes new improvements for the following issue:\n\n * Addresses an issue in which Speech and Network troubleshooters will not start.\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see [KB5005408](<https://support.microsoft.com/help/5005408>).\nFor more information about the resolved security vulnerabilities, please refer to the [Deployments | Security Update Guide](<https://msrc.microsoft.com/update-guide/deployments>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## **Known issues in this update**\n\n**Symptoms**| **Next step** \n---|--- \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is resolved in [update KB5018476](<https://support.microsoft.com/help/5018476>). \n \n## **How to get this update**\n\n**Before installing this update**We strongly recommend that you install the latest servicing stack update (SSU) for your operating system before you install the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/help/4535697>).If you use Windows Update, the latest SSU ([KB5016264](<https://support.microsoft.com/help/5016264>)) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). \n\n**REMINDER** If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer ([KB5016618](<https://support.microsoft.com/help/5016618>)).\n\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| No| See the other options below. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016683>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 8.1, Windows Server 2012 R2, Windows Embedded 8.1 Industry Enterprise, Windows Embedded 8.1 Industry Pro**Classification**: Security Update \n \n## **File information**\n\nFor a list of the files that are provided in this update, download the [file information for update KB5016683](<https://download.microsoft.com/download/3/2/8/3288a3a1-cf73-4620-aee6-e921b5712083/5016683.csv>). \n\n## **References**\n\nLearn about the [standard terminology](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) that is used to describe Microsoft software updates.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2023-10-10T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016683 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2023-10-10T00:00:00", "id": "KB5016683", "href": "https://support.microsoft.com/en-us/help/5016683", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:26", "description": "None\n**EXPIRATION NOTICE****IMPORTAN**T As of 9/12/2023, this KB is no longer available from Windows Update, the Microsoft Update Catalog, or other release channels. We recommend that you update your devices to the latest security quality update. \n\n**NEW 8/26/22****IMPORTANT **Microsoft released [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n**12/8/20** \nFor information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-quality-updates-primer/ba-p/2569385>). For an overview of Windows 10, version 1507, see its update history page. \n\n## Highlights\n\n * Addresses an issue that prevents certain troubleshooting tools rom opening.\n * Addresses security issues for your Windows operating system. \n\n## Improvements \n\nThis security update includes quality improvements. Key changes include: \n\n * Addresses an issue that prevents certain troubleshooting tools from opening.\nIf you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.For more information about security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website and the [August 2022 Security Updates.](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## Known issues in this update\n\n**Symptoms**| **Workaround** \n---|--- \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| To mitigate this issue, please see [Possible issues caused by new Daylight Savings Time in Chile](<https://docs.microsoft.com/windows/release-health/status-windows-10-1507#2892msgdesc>).We are working on a resolution and will provide an update in an upcoming release.**Note **We plan to release an update to support this change; however, there might be insufficient time to properly build, test, and release such an update before the change goes into effect. Please use the workaround above. \n \n## How to get this update\n\nThis update is no longer available.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-11T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016639 (OS Build 10240.19387) - EXPIRED", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34711", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820", "CVE-2022-35822"], "modified": "2022-09-11T00:00:00", "id": "KB5016639", "href": "https://support.microsoft.com/en-us/help/5016639", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:26", "description": "None\n**NEW 8/26/22****IMPORTANT **Microsoft released [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n**11/19/20** \nFor information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-quality-updates-primer/ba-p/2569385>). For an overview of Windows 10, version 1607, see its update history page. \n\n## Highlights\n\n * Addresses an issue that prevents certain troubleshooting tools from opening.\n * Addresses security issues for your Windows operating system. \n\n## Improvements\n\nThis security update includes quality improvements. Key changes include:\n\n * Addresses an issue that prevents certain troubleshooting tools from opening.\n * Addresses an issue that prevents the Key Distribution Center (KDC) Proxy from properly receiving Kerberos tickets for Key Trust Windows Hello for Business credentials.\n * Addresses an issue that causes the KDC code to incorrectly return the error message \u201cKDC_ERR_TGT_REVOKED\u201d during domain controller shutdown.\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Enforces a hardening change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of [RFC 4556](<https://www.ietf.org/rfc/rfc4556.txt>). If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. For more information about this change, see KB5005408.\nIf you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device. For more information about security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n## Known issues in this update\n\n**Symptoms**| **Workaround** \n---|--- \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| To mitigate this issue, please see [Possible issues caused by new Daylight Savings Time in Chile](<https://docs.microsoft.com/windows/release-health/status-windows-10-1607-and-windows-server-2016#2892msgdesc>).We are working on a resolution and will provide an update in an upcoming release.**Note **We plan to release an update to support this change; however, there might be insufficient time to properly build, test, and release such an update before the change goes into effect. Please use the workaround above. \n \n## How to get this update\n\n**Before installing this update**Microsoft strongly recommends you install the latest servicing stack update (SSU) for your operating system before installing the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU and applying Microsoft security updates. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/topic/servicing-stack-updates-ssu-frequently-asked-questions-06b62771-1cb0-368c-09cf-87c4efc4f2fe>). If you are using Windows Update, the latest SSU (KB5017095) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/home.aspx>). **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nWindows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016622>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 10**Classification**: Security Updates \n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 5016622](<https://download.microsoft.com/download/e/c/3/ec385e2a-7904-4114-9a1c-d9c011d412bf/5016622.csv>).\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-11T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016622 (OS Build 14393.5291)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34711", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820", "CVE-2022-35822"], "modified": "2022-09-11T00:00:00", "id": "KB5016622", "href": "https://support.microsoft.com/en-us/help/5016622", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:26", "description": "None\n**NEW 8/26/22****IMPORTANT **Microsoft released [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\nFor information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-quality-updates-primer/ba-p/2569385>). For an overview of Windows Server 2022, see its update history page. **Note **Follow [@WindowsUpdate](<https://twitter.com/windowsupdate>) to find out when new content is published to the Windows release health dashboard. \n\n## Improvements\n\nThis security update includes improvements that were a part of update KB5015879 (released July 19, 2022) and also addresses the following issues: \n\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\nIf you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.For more information about security vulnerabilities, please refer to the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>) and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>)\n\n### Windows 10 servicing stack update - 20348.850\n\nThis update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.\n\n## Known issues in this update\n\n**Symptom**| **Workaround** \n---|--- \nAfter installing this update, IE mode tabs in Microsoft Edge might stop responding when a site displays a modal dialog box. A modal dialog box is a form or dialog box that requires the user to respond before continuing or interacting with other portions of the webpage or app. **Developer Note** Sites affected by this issue call **window.focus**.| This issue is addressed in KB5016693. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is addressed in KB5017381. \n \n## How to get this update\n\n**Before installing this update**Microsoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/topic/servicing-stack-updates-ssu-frequently-asked-questions-06b62771-1cb0-368c-09cf-87c4efc4f2fe>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nWindows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016627>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Microsoft Server operating system-21H2**Classification**: Security Updates \n \n**If you want to remove the LCU**To remove the LCU after installing the combined SSU and LCU package, use the [DISM/Remove-Package](<https://docs.microsoft.com/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options>) command line option with the LCU package name as the argument. You can find the package name by using this command: **DISM /online /get-packages**.Running [Windows Update Standalone Installer](<https://support.microsoft.com/topic/description-of-the-windows-update-standalone-installer-in-windows-799ba3df-ec7e-b05e-ee13-1cdae8f23b19>) (**wusa.exe**) with the **/uninstall **switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.\n\n**File Information**For a list of the files that are provided in this update, download the [file information for cumulative update 5016627](<https://download.microsoft.com/download/c/9/0/c903a6e1-fbe7-4978-8482-9d4c9cd3b5cc/5016627.csv>). For a list of the files that are provided in the servicing stack update, download the [file information for the SSU - version 20348.850](<https://download.microsoft.com/download/9/9/1/9916b98e-3f4e-42ff-8be5-1647dbbe0037/SSU_version_20348_850.csv>). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-11T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016627 (OS Build 20348.887)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34711", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-34715", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35820", "CVE-2022-35822"], "modified": "2022-09-11T00:00:00", "id": "KB5016627", "href": "https://support.microsoft.com/en-us/help/5016627", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:26", "description": "None\n**NEW 8/26/22****IMPORTANT **Microsoft released [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n**7/12/22** \nAfter September 20, 2022, there will no longer be optional, non-security releases (known as \"C\" or preview releases) for the 2019 LTSC editions and Windows Server 2019. Only cumulative monthly security updates (known as the \"B\" or Update Tuesday release) will continue for the 2019 LTSC editions and Windows Server 2019. \n\n**11/17/20** \nFor information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-quality-updates-primer/ba-p/2569385>). For an overview of Windows 10, version 1809, see its update history page. \n\n## Highlights \n\n * Addresses security issues for your Windows operating system. \n\n## Improvements\n\nThis security update includes improvements that were a part of update KB5015880 (released July 21, 2022) and also addresses the following issues:\n\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\nIf you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.For more information about security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n### Windows 10 servicing stack update - 17763.3232\n\nThis update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates. \n\n## Known issues in this update\n\n### \n\n__\n\nClick or tap to view the known issues\n\n**Symptom**| **Workaround** \n---|--- \nAfter installing KB4493509, devices with some Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"| This issue is addressed by updates released June 11, 2019 and later. We recommend you install the latest security updates for your device. Customers installing Windows Server 2019 using media should install the latest [Servicing Stack Update (SSU)](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) before installing the language pack or other optional components. If using the [Volume Licensing Service Center (VLSC)](<https://www.microsoft.com/licensing/servicecenter/default.aspx>), acquire the latest Windows Server 2019 media available. The proper order of installation is as follows:\n\n 1. Install the latest prerequisite SSU, currently [KB5005112](<https://support.microsoft.com/help/5005112>)\n 2. Install optional components or language packs\n 3. Install latest cumulative update\n**Note** Updating your device will prevent this issue, but will have no effect on devices already affected by this issue. If this issue is present in your device, you will need to use the workaround steps to repair it.**Workaround:**\n\n 1. Uninstall and reinstall any recently added language packs. For instructions, see [Manage the input and display language settings in Windows 10](<https://support.microsoft.com/windows/manage-the-input-and-display-language-settings-in-windows-12a10cb4-8626-9b77-0ccb-5013e0c7c7a2>).\n 2. Click **Check for Updates **and install the April 2019 Cumulative Update or later. For instructions, see [Update Windows 10](<https://support.microsoft.com/windows/update-windows-3c5ae7fc-9fb6-9af1-1984-b5e0412c556a>).\n**Note **If reinstalling the language pack does not mitigate the issue, use the In-Place-Upgrade feature. For guidance, see [How to do an in-place upgrade on Windows](<https://docs.microsoft.com/troubleshoot/windows-server/deployment/repair-or-in-place-upgrade>), and [Perform an in-place upgrade of Windows Server](<https://docs.microsoft.com/windows-server/get-started/perform-in-place-upgrade>). \nAfter installing KB5001342 or later, the Cluster Service might fail to start because a Cluster Network Driver is not found.| This issue occurs because of an update to the PnP class drivers used by this service. After about 20 minutes, you should be able to restart your device and not encounter this issue. \nFor more information about the specific errors, cause, and workaround for this issue, please see KB5003571. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is addressed in KB5017379. \n \n## How to get this update\n\n**Before installing this update**Microsoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU. For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/topic/servicing-stack-updates-ssu-frequently-asked-questions-06b62771-1cb0-368c-09cf-87c4efc4f2fe>).Prerequisite:You **must **install the August 10, 2021 SSU (KB5005112) before installing the LCU. **Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nWindows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016623>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 10**Classification**: Security Updates \n \n**If you want to remove the LCU**To remove the LCU after installing the combined SSU and LCU package, use the [DISM/Remove-Package](<https://docs.microsoft.com/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options>) command line option with the LCU package name as the argument. You can find the package name by using this command: **DISM /online /get-packages**.Running [Windows Update Standalone Installer](<https://support.microsoft.com/topic/description-of-the-windows-update-standalone-installer-in-windows-799ba3df-ec7e-b05e-ee13-1cdae8f23b19>) (**wusa.exe**) with the **/uninstall **switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.\n\n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 5016623](<https://download.microsoft.com/download/8/a/8/8a85b65e-7837-4878-a25b-b094c3442c82/5016623.csv>).For a list of the files that are provided in the servicing stack update, download the [file information for the SSU - version 17763.3232](<https://download.microsoft.com/download/f/5/1/f51753ae-66cd-4568-8fb6-5a5cbf79186c/SSU_version_17763_3232.csv>). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-20T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016623 (OS Build 17763.3287)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34711", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35797", "CVE-2022-35820", "CVE-2022-35822"], "modified": "2022-09-20T00:00:00", "id": "KB5016623", "href": "https://support.microsoft.com/en-us/help/5016623", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:26", "description": "None\n**NEW 8/26/22****IMPORTANT **Microsoft released [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\nFor information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-quality-updates-primer/ba-p/2569385>). For an overview of Windows 11 (original release), see its update history page.**Note **Follow [@WindowsUpdate](<https://twitter.com/windowsupdate>) to find out when new content is published to the Windows release health dashboard. \n\n\n\n## Highlights \n\n * Addresses a known issue that might prevent some of you from opening the Start menu.\n * Addresses security issues for your Windows operating system. \n\n## Improvements\n\nThis security update includes improvements that were a part of update KB5015882 (released July 21, 2022) and also addresses the following issues: \n\n * Addresses a known issue that might prevent some of you from opening the Start menu. On the affected devices, clicking or tapping the Start button or using the Windows keyboard shortcut might have no effect.\nIf you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.For more information about security vulnerabilities, please refer to the [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>).\n\n### Windows 11 servicing stack update - 22000.826\n\nThis update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.\n\n## Known issues in this update\n\n**Applies to**| **Symptom**| **Workaround** \n---|---|--- \nIT admins| After installing this update, IE mode tabs in Microsoft Edge might stop responding when a site displays a modal dialog box. A modal dialog box is a form or dialog box that requires the user to respond before continuing or interacting with other portions of the webpage or app. **Developer Note** Sites affected by this issue call **window.focus**.| This issue is addressed in KB5016691. If you do not want to install this update, see the instructions below.This issue is resolved using [Known Issue Rollback (KIR)](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/known-issue-rollback-helping-you-keep-windows-devices-protected/ba-p/2176831>). Please note that it might take up to 24 hours for the resolution to propagate automatically to consumer devices and non-managed business devices. Restarting your Windows device might help the resolution apply to your device faster. For enterprise-managed devices that have installed an affected update and encountered this issue can resolve it by installing and configuring the special Group Policy listed below. For information on deploying and configuring these special Group Policy, please see [How to use Group Policy to deploy a Known Issue Rollback](<https://docs.microsoft.com/troubleshoot/windows-client/group-policy/use-group-policy-to-deploy-known-issue-rollback>).Group Policy downloads with Group Policy name:\n\n * [Download for Windows 11](<https://download.microsoft.com/download/5/e/3/5e356255-fd5f-47b4-b10d-267cbfc24e63/Windows%2011%20\\(original%20release\\)%20KB5014019%20220624_22553%20Known%20Issue%20Rollback.msi>) \\- Windows 11 (original release) KB5014019 220624_22553 Known Issue Rollback\n**Important** You will need to **install **and **configure** the Group Policy for your version of Windows to resolve this issue. \nIT admins| After installing this update, XPS Viewer might be unable to open XML Paper Specification (XPS) documents in some non-English languages, including some Japanese and Chinese character encodings. This issue affects both XML Paper Specification (XPS) and Open XML Paper Specification (OXPS) files. When encountering this issue, you may receive an error, \"This page cannot be displayed\" within XPS Viewer or it might stop responding and have high CPU usage with continually increasing memory usage. When the error is encountered, if XPS Viewer is not closed it might reach up to 2.5GB of memory usage before closing unexpectedly.This issue does not affect most home users. The [XPS Viewer is no longer installed by default as of Windows 10, version 1803](<https://docs.microsoft.com/windows/deployment/planning/windows-10-removed-features>) and [must be manually installed](<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fapplication-management%2Fadd-apps-and-features&data=05%7C01%7Cv-shros%40microsoft.com%7Cf67e41cad4af4dcf09ac08da79a42805%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637956043196783103%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=mAxvq%2BP02NuUNLL2Heb2Ukgr1KQwfN5Gs0xwQBs5egY%3D&reserved=0>).| This issue is addressed in KB5017383. \nAll users| Starting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is addressed in KB5017383. \n \n## How to get this update\n\n**Before installing this update**Microsoft combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/topic/servicing-stack-updates-ssu-frequently-asked-questions-06b62771-1cb0-368c-09cf-87c4efc4f2fe>).**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nWindows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies. \nMicrosoft Update Catalog| Yes| To get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5016629>) website. \nWindows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure **Products and Classifications** as follows:**Product**: Windows 11**Classification**: Security Updates \n \n**If you want to remove the LCU**To remove the LCU after installing the combined SSU and LCU package, use the [DISM/Remove-Package](<https://docs.microsoft.com/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options>) command line option with the LCU package name as the argument. You can find the package name by using this command: **DISM /online /get-packages**.Running [Windows Update Standalone Installer](<https://support.microsoft.com/topic/description-of-the-windows-update-standalone-installer-in-windows-799ba3df-ec7e-b05e-ee13-1cdae8f23b19>) (**wusa.exe**) with the **/uninstall **switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.\n\n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 5016629](<https://download.microsoft.com/download/9/0/4/904f3b7d-8fdb-4582-9421-0b75c1fd1dba/5016629.csv>). For a list of the files that are provided in the servicing stack update, download the [file information for the SSU - version 22000.826](<https://download.microsoft.com/download/5/d/6/5d6bad3d-8606-435d-914a-6d4f78f8bd0c/SSU_version_22000_826.csv>). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-11T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016629 (OS Build 22000.856)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34711", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35797", "CVE-2022-35804", "CVE-2022-35820", "CVE-2022-35822"], "modified": "2022-09-11T00:00:00", "id": "KB5016629", "href": "https://support.microsoft.com/en-us/help/5016629", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-11-28T09:56:26", "description": "None\n**EXPIRATION NOTICE****IMPORTAN**T As of 9/12/2023, this KB is only available from Windows Update. It is no longer available from the Microsoft Update Catalog or other release channels. We recommend that you update your devices to the latest security quality update. \n\n**NEW 8/26/22****IMPORTANT **Microsoft released [KB5012170](<http://support.microsoft.com/help/5012170>) on August 9, 2022. It provides support for Secure Boot Forbidden Signature Database (DBX). This is a standalone, security update. Windows 8.1 and newer clients and Windows Server 2012 and newer servers must install this update regardless of whether BitLocker is enabled or supported on your device. After you install the update, you might receive error \u201c0x800f0922\u201d; see [Update might fail to install and you might receive a 0x800f0922 error](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#2883msgdesc>). After you install the update, your device might start up in [BitLocker recovery mode](<https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn383583\\(v=ws.11\\)>). See [Some devices might start up into BitLocker Recovery](<https://docs.microsoft.com/windows/release-health/status-windows-11-21h2#some-devices-might-start-up-into-bitlocker-recovery>) and [Finding your BitLocker recovery key in Windows](<https://support.microsoft.com/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6>).\n\n**UPDATED 8/9/22** \n**IMPORTANT **Windows Server, version 20H2 is at end of service today, August 9, 2022. After August 9, 2022, these devices will no longer receive monthly security and quality updates that contain protection from the latest security threats. To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows Server. We will continue to service the following editions: Windows 10 Enterprise and Education, Windows 10 IoT Enterprise, Windows 10 Enterprise multi-session, and Windows 10 on Surface Hub. \n\n**5/10/22** \n**REMINDER **To update to one of the newer versions of Windows 10, we recommend that you use the appropriate Enablement Package KB (EKB). Using the EKB makes updating faster and easier and requires a single restart. To find the EKB for a specific OS, go to the **Improvements** section and click or tap the OS name to expand the collapsible section. \n\n**11/17/20**For information about Windows update terminology, see the article about the [types of Windows updates](<https://docs.microsoft.com/troubleshoot/windows-client/deployment/standard-terminology-software-updates>) and the [monthly quality update types](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-quality-updates-primer/ba-p/2569385>). For an overview of Windows 10, version 20H2, see its update history page. **Note **Follow [@WindowsUpdate](<https://twitter.com/windowsupdate>) to find out when new content is published to the Windows release health dashboard.\n\n## Highlights\n\n * Addresses an issue that affects the printing of files you submit to a printer.\n * Addresses a known issue that might prevent the Input Indicator and Language Bar from displaying in the notification area. This issue affects devices that have more than one language installed.\n * Addresses a known issue that might cause printing operations to fail. It might also create printer duplicates on a device. The duplicate printer\u2019s name usually has the suffix \"Copy1\". Applications that refer to the printer by a specific name cannot print.\n\n## Improvements \n\n**Note **To view the list of addressed issues, click or tap the OS name to expand the collapsible section.\n\n### \n\n__\n\nWindows 10, version 21H2\n\n**Important: **Use EKB KB5003791 to update to Windows 10, version 21H2.\n\nThis security update includes quality improvements. Key changes include: \n\n * This build includes all the improvements from Windows 10, version 20H2.\n * No additional issues were documented for this release. \n\n### \n\n__\n\nWindows 10, version 21H1\n\n**Important: **Use EKB KB5000736 to update to Windows 10, version 21H1.\n\nThis security update includes quality improvements. Key changes include: \n\n * This build includes all the improvements from Windows 10, version 20H2.\n * No additional issues were documented for this release.\n\n### \n\n__\n\nWindows Server, version 20H2\n\n**Important: **Use EKB KB4562830 to update to Windows Server, version 20H2.\n\nThis security update includes improvements that were a part of update KB5015878 (released July 26, 2022) and also addresses the following issues: \n\n * Addresses an issue that might cause the Local Security Authority Server Service (LSASS) to leak tokens. This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.\n * Addresses an issue that creates a duplicate print queue. This causes the original print queue to lose functionality.\n * Addresses a known issue that might prevent the Input Indicator and Language Bar from displaying in the notification area. This issue affects devices that have more than one language installed.\n * Addresses a known issue that might cause printing operations to fail. It might also create printer duplicates on a device. The duplicate printer\u2019s name usually has the suffix \"Copy1\". Applications that refer to the printer by a specific name cannot print.\nIf you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device. For more information about security vulnerabilities, please refer to the new [Security Update Guide](<https://msrc.microsoft.com/update-guide>) website and the [August 2022 Security Updates](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>). \n\n### Windows 10 servicing stack update - 19042.1852, 19043.1852, and 19044.1852\n\nThis update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.\n\n## Known issues in this update\n\n### \n\n__\n\nClick or tap to view the known issues\n\n**Symptom**| **Workaround** \n---|--- \nDevices with Windows installations created from custom offline media or custom ISO image might have [Microsoft Edge Legacy](<https://support.microsoft.com/microsoft-edge/what-is-microsoft-edge-legacy-3e779e55-4c55-08e6-ecc8-2333768c0fb0>) removed by this update, but not automatically replaced by the new Microsoft Edge. This issue is only encountered when custom offline media or ISO images are created by slipstreaming this update into the image without having first installed the standalone servicing stack update (SSU) released March 29, 2021 or later.**Note **Devices that connect directly to Windows Update to receive updates are not affected. This includes devices using Windows Update for Business. Any device connecting to Windows Update should always receive the latest versions of the SSU and latest cumulative update (LCU) without any extra steps. | To avoid this issue, be sure to first slipstream the SSU released March 29, 2021 or later into the custom offline media or ISO image before slipstreaming the LCU. To do this with the combined SSU and LCU packages now used for Windows 10, version 20H2 and Windows 10, version 2004, you will need to extract the SSU from the combined package. Use the following steps to extract the SSU:\n\n 1. Extract the cab from the msu via this command line (using the package for KB5000842 as an example): **expand Windows10.0-KB5000842-x64.msu /f:Windows10.0-KB5000842-x64.cab <destination path>**\n 2. Extract the SSU from the previously extracted cab via this command line: **expand Windows10.0-KB5000842-x64.cab /f:* <destination path>**\n 3. You will then have the SSU cab, in this example named **SSU-19041.903-x64.cab**. Slipstream this file into your offline image first, then the LCU.\nIf you have already encountered this issue by installing the OS using affected custom media, you can mitigate it by directly installing the [new Microsoft Edge](<https://www.microsoft.com/edge>). If you need to broadly deploy the new Microsoft Edge for business, see [Download and deploy Microsoft Edge for business](<https://www.microsoft.com/edge/business/download>). \n| \nAfter installing this update, IE mode tabs in Microsoft Edge might stop responding when a site displays a modal dialog box. A modal dialog box is a form or dialog box that requires the user to respond before continuing or interacting with other portions of the webpage or app. **Developer Note** Sites affected by this issue call **window.focus**.| This issue is addressed in KB5016688. If you do not want to install this release, see the instructions below.This issue is resolved using [Known Issue Rollback (KIR)](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/known-issue-rollback-helping-you-keep-windows-devices-protected/ba-p/2176831>). Please note that it might take up to 24 hours for the resolution to propagate automatically to consumer devices and non-managed business devices. Restarting your Windows device might help the resolution apply to your device faster. For enterprise-managed devices that have installed an affected update and encountered this issue can resolve it by installing and configuring the special Group Policy listed below. For information on deploying and configuring these special Group Policy, please see [How to use Group Policy to deploy a Known Issue Rollback](<https://docs.microsoft.com/troubleshoot/windows-client/group-policy/use-group-policy-to-deploy-known-issue-rollback>). Group Policy download with Group Policy name: \n\n * [Download for Windows 10, version 20H2 and Windows 10, version 21H1 - ](<https://download.microsoft.com/download/8/8/0/88004bea-c83b-4d0c-9ac9-1996644578e9/Windows%2010%2020H2,%2021H1%20and%2021H2%20KB5014023%20220624_22551%20Known%20Issue%20Rollback.msi>)Windows 10 20H2, 21H1 and 21H2 KB5014023 220624_22551 Known Issue Rollback\n**Important** You will need to **install **and **configure** the Group Policy for your version of Windows to resolve this issue. \n| \nAfter installing this update, XPS Viewer might be unable to open XML Paper Specification (XPS) documents in some non-English languages, including some Japanese and Chinese character encodings. This issue affects both XML Paper Specification (XPS) and Open XML Paper Specification (OXPS) files. When encountering this issue, you may receive an error, \"This page cannot be displayed\" within XPS Viewer or it might stop responding and have high CPU usage with continually increasing memory usage. When the error is encountered, if XPS Viewer is not closed it might reach up to 2.5GB of memory usage before closing unexpectedly.This issue does not affect most home users. The [XPS Viewer is no longer installed by default as of Windows 10, version 1803](<https://docs.microsoft.com/windows/deployment/planning/windows-10-removed-features>) and [must be manually installed](<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fapplication-management%2Fadd-apps-and-features&data=05%7C01%7Cv-shros%40microsoft.com%7Cf67e41cad4af4dcf09ac08da79a42805%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637956043196783103%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=mAxvq%2BP02NuUNLL2Heb2Ukgr1KQwfN5Gs0xwQBs5egY%3D&reserved=0>).| This issue is addressed in KB5017380. \nAfter installing this update, some Windows devices might have issues with audio not working. Some affected Windows devices might have no audio, but other affected Windows devices might only have issues on certain ports, certain audio devices or only within certain applications. Most affected audio devices drivers have the \"audio enhancements\" setting disabled before installing this update or the sound device driver has issues with the \"audio enhancements\" feature.| This issue can be mitigated differently depending on your symptoms and if you have installed the update already. Please see the known issue on [Windows release health](<https://docs.microsoft.com/windows/release-health/resolved-issues-windows-10-21h2#2887msgdesc>) for instructions to prevent and mitigate this issue.This issue is addressed using a [Known Issue Rollback (KIR)](<https://techcommunity.microsoft.com/t5/windows-it-pro-blog/known-issue-rollback-helping-you-keep-windows-devices-protected/ba-p/2176831>). This KIR will prevent the issue on Windows devices that have not installed KB5015878, but will have no effect on devices already affected by this known issue. Please note that it might take up to 24 hours for the KIR to propagate automatically to consumer devices and non-managed business devices. Restarting your Windows device might help the KIR apply to your device faster. For enterprise-managed devices that have installed an affected update and encountered this issue, you can address it by installing and configuring a special Group Policy. The special Group Policy can be found in **Computer Configuration** > **Administrative Templates**> **<Group Policy name listed below>**. For information about deploying and configuring these special Group Policy, see [How to use Group Policy to deploy a Known Issue Rollback](<https://docs.microsoft.com/troubleshoot/windows-client/group-policy/use-group-policy-to-deploy-known-issue-rollback>).Group Policy downloads with Group Policy name:\n\n * [Download for Windows 10, version 21H2, Windows 10, version 21H2, Windows 10, version 20H2](<https://download.microsoft.com/download/f/f/c/ffc21663-8f01-489a-8797-5fe6def240d7/Windows%2010%2020H2,%2021H1%20and%2021H2%20KB5015878%20220706_045043%20Known%20Issue%20Rollback.msi>) \\- **KB5015878 220706_045043 Known Issue Rollback**\n**Important** You must **install **and **configure** the Group Policy for your version of Windows to resolve this issue. \nStarting at 12:00 A.M. Saturday, September 10, 2022, the official time in Chile will advance 60 minutes in accordance with the August 9, 2022 official announcement by the Chilean government about a daylight saving time (DST) time zone change. This moves the DST change which was previously September 4 to September 10.Symptoms if the workaround is not used on devices between September 4, 2022 and September 11, 2022:\n\n * \u200bTime shown in Windows and apps will not be correct.\n * \u200bApps and cloud services which use date and time for integral functions, such as Microsoft Teams and Microsoft Outlook, notifications and scheduling of meetings might be 60 minutes off.\n * \u200bAutomation that uses date and time, such as Scheduled tasks, might not run at the expected time.\n * \u200bTimestamp on transactions, files, and logs will be 60 minutes off.\n * \u200bOperations that rely on time-dependent protocols such as Kerberos might cause authentication failures when attempting to logon or access resources.\n * \u200bWindows devices and apps outside of Chile might also be affected if they are connecting to servers or devices in Chile or if they are scheduling or attending meetings taking place in Chile from another location or time zone. Windows devices outside of Chile should not use the workaround, as it would change their local time on the device.\n| This issue is addressed in KB5017380. \n \n## How to get this update\n\n**Before installing this update**Microsoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see [Servicing stack updates](<https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates>) and [Servicing Stack Updates (SSU): Frequently Asked Questions](<https://support.microsoft.com/topic/servicing-stack-updates-ssu-frequently-asked-questions-06b62771-1cb0-368c-09cf-87c4efc4f2fe>).Prerequisite:Based on your installation scenario, choose one of the following:\n\n 1. For offline OS image servicing:If your image does not have the March 22, 2022 (KB5011543) or later LCU, you **must **install the special standalone May 10, 2022 SSU (KB5014032) before installing this update.\n 2. For Windows Server Update Services (WSUS) deployment or when installing the standalone package from Microsoft Update Catalog: If your devices do not have the May 11, 2021 (KB5003173) or later LCU, you **must **install the special standalone August 10, 2021 SSU (KB5005260) before installing this update.\n**Install this update****Release Channel**| **Available**| **Next Step** \n---|---|--- \nWindows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update. \nWindows Update for Business| No| No longer available. \nMicrosoft Update Catalog| No| No longer available. \nWindows Server Update Services (WSUS)| No| No longer available. \n \n**If you want to remove the LCU**To remove the LCU after installing the combined SSU and LCU package, use the [DISM/Remove-Package](<https://docs.microsoft.com/windows-hardware/manufacture/desktop/dism-operating-system-package-servicing-command-line-options>) command line option with the LCU package name as the argument. You can find the package name by using this command: **DISM /online /get-packages**.Running [Windows Update Standalone Installer](<https://support.microsoft.com/topic/description-of-the-windows-update-standalone-installer-in-windows-799ba3df-ec7e-b05e-ee13-1cdae8f23b19>) (**wusa.exe**) with the **/uninstall **switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.\n\n**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 5016616](<https://download.microsoft.com/download/d/e/5/de54fe61-84b0-4edc-bb75-be908306ff9e/5016616.csv>). For a list of the files that are provided in the servicing stack update, download the [file information for the SSU - version 19042.1852, 19043.1852, and 19044.1852](<https://download.microsoft.com/download/1/9/2/1920eca0-61e9-4b3a-aa7b-4485627e54f1/SSU_version_19041_1852.csv>). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-09-11T00:00:00", "type": "mskb", "title": "August 9, 2022\u2014KB5016616 (OS Builds 19042.1889, 19043.1889, and 19044.1889)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34711", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35797", "CVE-2022-35820", "CVE-2022-35822"], "modified": "2022-09-11T00:00:00", "id": "KB5016616", "href": "https://support.microsoft.com/en-us/help/5016616", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2023-10-19T15:02:08", "description": "The remote Windows host is missing security update 5016686. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016686: Windows Server 2008 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34714", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35747", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793"], "modified": "2023-10-16T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016686.NASL", "href": "https://www.tenable.com/plugins/nessus/163942", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163942);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/16\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30194\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34714\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35747\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35793\"\n );\n script_xref(name:\"MSKB\", value:\"5016669\");\n script_xref(name:\"MSKB\", value:\"5016686\");\n script_xref(name:\"MSFT\", value:\"MS22-5016669\");\n script_xref(name:\"MSFT\", value:\"MS22-5016686\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016686: Windows Server 2008 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016686. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016669\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016686\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016669\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016686\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016686 or Cumulative Update 5016669\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-35744\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016686',\n '5016669'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(vista:'2') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.0',\n sp:2,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016686, 5016669])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-29T15:30:14", "description": "The remote Windows host is missing security update 5016679. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016679: Windows 7 and Windows Server 2008 R2 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35747", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2023-10-25T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016679.NASL", "href": "https://www.tenable.com/plugins/nessus/163952", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163952);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/25\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30194\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35747\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35756\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35793\",\n \"CVE-2022-35795\",\n \"CVE-2022-35820\"\n );\n script_xref(name:\"MSKB\", value:\"5016676\");\n script_xref(name:\"MSKB\", value:\"5016679\");\n script_xref(name:\"MSFT\", value:\"MS22-5016676\");\n script_xref(name:\"MSFT\", value:\"MS22-5016679\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016679: Windows 7 and Windows Server 2008 R2 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016679. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016676\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016679\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016676\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016679\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016679 or Cumulative Update 5016676\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-35744\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016679',\n '5016676'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.1',\n sp:1,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016679, 5016676])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-27T15:02:30", "description": "The remote Windows host is missing security update 5016684. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016684: Windows Server 2012 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2023-10-25T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016684.NASL", "href": "https://www.tenable.com/plugins/nessus/163948", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163948);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/25\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30194\",\n \"CVE-2022-33670\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35748\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35756\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35793\",\n \"CVE-2022-35795\",\n \"CVE-2022-35820\"\n );\n script_xref(name:\"MSKB\", value:\"5016672\");\n script_xref(name:\"MSKB\", value:\"5016684\");\n script_xref(name:\"MSFT\", value:\"MS22-5016672\");\n script_xref(name:\"MSFT\", value:\"MS22-5016684\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016684: Windows Server 2012 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016684. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016672\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016684\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016672\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016684\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016684 or Cumulative Update 5016672\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-35744\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016684',\n '5016672'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win8:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.2',\n sp:0,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016684, 5016672])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-27T15:02:49", "description": "The remote Windows host is missing security update 5016683. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016683: Windows 8.1 and Windows Server 2012 R2 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2023-10-25T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016683.NASL", "href": "https://www.tenable.com/plugins/nessus/163947", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163947);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/25\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-33670\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35748\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35793\",\n \"CVE-2022-35795\",\n \"CVE-2022-35820\"\n );\n script_xref(name:\"MSKB\", value:\"5016681\");\n script_xref(name:\"MSKB\", value:\"5016683\");\n script_xref(name:\"MSFT\", value:\"MS22-5016681\");\n script_xref(name:\"MSFT\", value:\"MS22-5016683\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016683: Windows 8.1 and Windows Server 2012 R2 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016683. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016681\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016683\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016681\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016683\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016683 or Cumulative Update 5016681\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-35744\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016683',\n '5016681'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.3',\n sp:0,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016683, 5016681])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-27T15:03:38", "description": "The remote Windows host is missing security update 5016639. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016639: Windows 10 LTS 1507 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35793", "CVE-2022-35795"], "modified": "2023-10-25T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016639.NASL", "href": "https://www.tenable.com/plugins/nessus/163941", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163941);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/25\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-33670\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35793\",\n \"CVE-2022-35795\"\n );\n script_xref(name:\"MSKB\", value:\"5016639\");\n script_xref(name:\"MSFT\", value:\"MS22-5016639\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016639: Windows 10 LTS 1507 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016639. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016639\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016639\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016639\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-35744\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016639'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n os_build:10240,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016639])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-27T15:02:30", "description": "The remote Windows host is missing security update 5016623. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016623: Windows 10 version 1809 / Windows Server 2019 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35797"], "modified": "2023-10-25T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016623.NASL", "href": "https://www.tenable.com/plugins/nessus/163946", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163946);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/25\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-30197\",\n \"CVE-2022-33670\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34699\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34705\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35748\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35757\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35761\",\n \"CVE-2022-35762\",\n \"CVE-2022-35763\",\n \"CVE-2022-35764\",\n \"CVE-2022-35765\",\n \"CVE-2022-35766\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35792\",\n \"CVE-2022-35793\",\n \"CVE-2022-35794\",\n \"CVE-2022-35795\",\n \"CVE-2022-35797\"\n );\n script_xref(name:\"MSKB\", value:\"5016623\");\n script_xref(name:\"MSFT\", value:\"MS22-5016623\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016623: Windows 10 version 1809 / Windows Server 2019 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016623. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016623\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016623\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016623\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-35744\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016623'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n os_build:17763,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016623])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-27T15:02:29", "description": "The remote Windows host is missing security update 5016622. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016622: Windows 10 Version 1607 and Windows Server 2016 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-33670", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35795"], "modified": "2023-10-25T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016622.NASL", "href": "https://www.tenable.com/plugins/nessus/163940", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163940);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/25\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-33670\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34699\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35748\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35761\",\n \"CVE-2022-35762\",\n \"CVE-2022-35763\",\n \"CVE-2022-35764\",\n \"CVE-2022-35765\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35792\",\n \"CVE-2022-35793\",\n \"CVE-2022-35795\"\n );\n script_xref(name:\"MSKB\", value:\"5016622\");\n script_xref(name:\"MSFT\", value:\"MS22-5016622\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016622: Windows 10 Version 1607 and Windows Server 2016 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016622. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016622\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016622\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016622\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-35744\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016622'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n os_build:14393,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016622])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-27T15:03:18", "description": "The remote Windows host is missing security update 5016629. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016629: Windows 11 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35797", "CVE-2022-35804", "CVE-2022-35820"], "modified": "2023-10-25T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016629.NASL", "href": "https://www.tenable.com/plugins/nessus/163945", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163945);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/25\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-30197\",\n \"CVE-2022-33670\",\n \"CVE-2022-34301\",\n \"CVE-2022-34302\",\n \"CVE-2022-34303\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34699\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34705\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34712\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35757\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35761\",\n \"CVE-2022-35766\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35793\",\n \"CVE-2022-35794\",\n \"CVE-2022-35795\",\n \"CVE-2022-35797\",\n \"CVE-2022-35804\",\n \"CVE-2022-35820\"\n );\n script_xref(name:\"MSKB\", value:\"5016629\");\n script_xref(name:\"MSFT\", value:\"MS22-5016629\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016629: Windows 11 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016629. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016629\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016629\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016629\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-35804\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2022-35744\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016629'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n os_build:22000,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016629])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-27T15:03:40", "description": "The remote Windows host is missing security update 5016616. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016616: Windows 10 Version 20H2 / 21H1 / 21H2 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35797", "CVE-2022-35820"], "modified": "2023-10-25T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016616.NASL", "href": "https://www.tenable.com/plugins/nessus/163951", "sourceData": "##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163951);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/25\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30144\",\n \"CVE-2022-30194\",\n \"CVE-2022-30197\",\n \"CVE-2022-33670\",\n \"CVE-2022-34301\",\n \"CVE-2022-34302\",\n \"CVE-2022-34303\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34699\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34705\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34712\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35748\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35754\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35757\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35761\",\n \"CVE-2022-35762\",\n \"CVE-2022-35763\",\n \"CVE-2022-35764\",\n \"CVE-2022-35765\",\n \"CVE-2022-35766\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35792\",\n \"CVE-2022-35793\",\n \"CVE-2022-35794\",\n \"CVE-2022-35795\",\n \"CVE-2022-35797\",\n \"CVE-2022-35820\"\n );\n script_xref(name:\"MSKB\", value:\"5016616\");\n script_xref(name:\"MSFT\", value:\"MS22-5016616\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016616: Windows 10 Version 20H2 / 21H1 / 21H2 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016616. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows Bluetooth Service Remote Code Execution Vulnerability (CVE-2022-30144)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016616\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016616\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-35744\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016616'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nvar os_name = get_kb_item(\"SMB/ProductName\");\n\nif ( ( (\"enterprise\" >< tolower(os_name) || \"education\" >< tolower(os_name))\n &&\n smb_check_rollup(os:'10',\n os_build:19042,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016616]) \n )\n ||\n smb_check_rollup(os:'10',\n os_build:19043,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016616])\n || \n smb_check_rollup(os:'10',\n os_build:19044,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016616])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-27T15:03:38", "description": "The remote Windows host is missing security update 5016627. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-08-09T00:00:00", "type": "nessus", "title": "KB5016627: Windows Server 2022 Security Update (August 2022)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34689", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-34715", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2023-10-25T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS22_AUG_5016627.NASL", "href": "https://www.tenable.com/plugins/nessus/163953", "sourceData": "##\n# (C) Tenable, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163953);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/25\");\n\n script_cve_id(\n \"CVE-2022-30133\",\n \"CVE-2022-30194\",\n \"CVE-2022-30197\",\n \"CVE-2022-33670\",\n \"CVE-2022-34301\",\n \"CVE-2022-34302\",\n \"CVE-2022-34303\",\n \"CVE-2022-34689\",\n \"CVE-2022-34690\",\n \"CVE-2022-34691\",\n \"CVE-2022-34696\",\n \"CVE-2022-34699\",\n \"CVE-2022-34701\",\n \"CVE-2022-34702\",\n \"CVE-2022-34703\",\n \"CVE-2022-34704\",\n \"CVE-2022-34705\",\n \"CVE-2022-34706\",\n \"CVE-2022-34707\",\n \"CVE-2022-34708\",\n \"CVE-2022-34709\",\n \"CVE-2022-34710\",\n \"CVE-2022-34712\",\n \"CVE-2022-34713\",\n \"CVE-2022-34714\",\n \"CVE-2022-34715\",\n \"CVE-2022-35743\",\n \"CVE-2022-35744\",\n \"CVE-2022-35745\",\n \"CVE-2022-35746\",\n \"CVE-2022-35747\",\n \"CVE-2022-35748\",\n \"CVE-2022-35749\",\n \"CVE-2022-35750\",\n \"CVE-2022-35751\",\n \"CVE-2022-35752\",\n \"CVE-2022-35753\",\n \"CVE-2022-35755\",\n \"CVE-2022-35756\",\n \"CVE-2022-35757\",\n \"CVE-2022-35758\",\n \"CVE-2022-35759\",\n \"CVE-2022-35760\",\n \"CVE-2022-35761\",\n \"CVE-2022-35762\",\n \"CVE-2022-35763\",\n \"CVE-2022-35764\",\n \"CVE-2022-35765\",\n \"CVE-2022-35766\",\n \"CVE-2022-35767\",\n \"CVE-2022-35768\",\n \"CVE-2022-35769\",\n \"CVE-2022-35771\",\n \"CVE-2022-35792\",\n \"CVE-2022-35793\",\n \"CVE-2022-35794\",\n \"CVE-2022-35795\",\n \"CVE-2022-35820\"\n );\n script_xref(name:\"MSKB\", value:\"5016627\");\n script_xref(name:\"MSFT\", value:\"MS22-5016627\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/08/30\");\n script_xref(name:\"IAVA\", value:\"2022-A-0320-S\");\n script_xref(name:\"IAVA\", value:\"2022-A-0319-S\");\n\n script_name(english:\"KB5016627: Windows Server 2022 Security Update (August 2022)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5016627. It is, therefore, affected by multiple vulnerabilities\n\n - Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability (CVE-2022-35747, CVE-2022-35769)\n\n - Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability (CVE-2022-30133, CVE-2022-35744)\n\n - Windows WebBrowser Control Remote Code Execution Vulnerability (CVE-2022-30194)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5016627\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/help/5016627\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5016627\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-35744\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/08/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS22-08';\nkbs = make_list(\n '5016627'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n os_build:20348,\n rollup_date:'08_2022',\n bulletin:bulletin,\n rollup_kb_list:[5016627])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "kaspersky": [{"lastseen": "2023-12-03T16:59:52", "description": "### *Detect date*:\n08/09/2022\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, obtain sensitive information.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows 7 for x64-based Systems Service Pack 1 \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows Server 2008 for x64-based Systems Service Pack 2\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2022-35759](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35759>) \n[CVE-2022-34690](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34690>) \n[CVE-2022-35745](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35745>) \n[CVE-2022-35750](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35750>) \n[CVE-2022-34708](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34708>) \n[CVE-2022-35753](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35753>) \n[CVE-2022-34691](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34691>) \n[CVE-2022-35751](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35751>) \n[CVE-2022-34701](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34701>) \n[CVE-2022-34707](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34707>) \n[CVE-2022-34713](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713>) \n[CVE-2022-35820](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35820>) \n[CVE-2022-30194](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30194>) \n[CVE-2022-35744](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35744>) \n[CVE-2022-34706](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34706>) \n[CVE-2022-34714](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34714>) \n[CVE-2022-30133](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30133>) \n[CVE-2022-35758](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35758>) \n[CVE-2022-35767](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35767>) \n[CVE-2022-35769](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35769>) \n[CVE-2022-35795](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35795>) \n[CVE-2022-35760](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35760>) \n[CVE-2022-35768](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35768>) \n[CVE-2022-35752](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35752>) \n[CVE-2022-35793](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35793>) \n[CVE-2022-35747](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35747>) \n[CVE-2022-35743](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35743>) \n[CVE-2022-35756](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35756>) \n[CVE-2022-34702](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34702>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *CVE-IDS*:\n[CVE-2022-35759](<https://vulners.com/cve/CVE-2022-35759>)5.0Warning \n[CVE-2022-35751](<https://vulners.com/cve/CVE-2022-35751>)5.0Warning \n[CVE-2022-34707](<https://vulners.com/cve/CVE-2022-34707>)5.0Warning \n[CVE-2022-30194](<https://vulners.com/cve/CVE-2022-30194>)5.0Warning \n[CVE-2022-35744](<https://vulners.com/cve/CVE-2022-35744>)5.0Warning \n[CVE-2022-34714](<https://vulners.com/cve/CVE-2022-34714>)5.0Warning \n[CVE-2022-35767](<https://vulners.com/cve/CVE-2022-35767>)5.0Warning \n[CVE-2022-35769](<https://vulners.com/cve/CVE-2022-35769>)5.0Warning \n[CVE-2022-35795](<https://vulners.com/cve/CVE-2022-35795>)5.0Warning \n[CVE-2022-35760](<https://vulners.com/cve/CVE-2022-35760>)5.0Warning \n[CVE-2022-35793](<https://vulners.com/cve/CVE-2022-35793>)5.0Warning \n[CVE-2022-35747](<https://vulners.com/cve/CVE-2022-35747>)5.0Warning \n[CVE-2022-35743](<https://vulners.com/cve/CVE-2022-35743>)5.0Warning \n[CVE-2022-34702](<https://vulners.com/cve/CVE-2022-34702>)5.0Warning \n[CVE-2022-34690](<https://vulners.com/cve/CVE-2022-34690>)5.0Warning \n[CVE-2022-35745](<https://vulners.com/cve/CVE-2022-35745>)5.0Warning \n[CVE-2022-35750](<https://vulners.com/cve/CVE-2022-35750>)5.0Warning \n[CVE-2022-34708](<https://vulners.com/cve/CVE-2022-34708>)5.0Warning \n[CVE-2022-35753](<https://vulners.com/cve/CVE-2022-35753>)5.0Warning \n[CVE-2022-34701](<https://vulners.com/cve/CVE-2022-34701>)5.0Warning \n[CVE-2022-34691](<https://vulners.com/cve/CVE-2022-34691>)5.0Warning \n[CVE-2022-34713](<https://vulners.com/cve/CVE-2022-34713>)5.0Warning \n[CVE-2022-35820](<https://vulners.com/cve/CVE-2022-35820>)5.0Warning \n[CVE-2022-34706](<https://vulners.com/cve/CVE-2022-34706>)5.0Warning \n[CVE-2022-30133](<https://vulners.com/cve/CVE-2022-30133>)5.0Warning \n[CVE-2022-35758](<https://vulners.com/cve/CVE-2022-35758>)5.0Warning \n[CVE-2022-35768](<https://vulners.com/cve/CVE-2022-35768>)5.0Warning \n[CVE-2022-35752](<https://vulners.com/cve/CVE-2022-35752>)5.0Warning \n[CVE-2022-35756](<https://vulners.com/cve/CVE-2022-35756>)5.0Warning\n\n### *KB list*:\n[5016686](<http://support.microsoft.com/kb/5016686>) \n[5016669](<http://support.microsoft.com/kb/5016669>) \n[5016679](<http://support.microsoft.com/kb/5016679>) \n[5016676](<http://support.microsoft.com/kb/5016676>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T00:00:00", "type": "kaspersky", "title": "KLA12603 Multiple vulnerabilities in Microsoft Products (ESU)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30194", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35747", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35756", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35793", "CVE-2022-35795", "CVE-2022-35820"], "modified": "2023-09-29T00:00:00", "id": "KLA12603", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12603/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-12-03T16:59:53", "description": "### *Detect date*:\n08/09/2022\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, bypass security restrictions, execute arbitrary code, obtain sensitive information.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows 8.1 for x64-based systems \nWindows Server 2012 R2 \nWindows Server 2012 R2 (Server Core installation) \nWindows 10 for 32-bit Systems \nWindows 8.1 for 32-bit systems \nWindows Server 2022 (Server Core installation) \nWindows Server 2019 (Server Core installation) \nWindows Server 2022 \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 20H2 for x64-based Systems \nWindows 10 Version 1607 for x64-based Systems \nWindows Server 2012 (Server Core installation) \nWindows 10 Version 21H2 for x64-based Systems \nWindows 10 Version 21H1 for 32-bit Systems \nWindows Server 2012 \nWindows 10 Version 20H2 for 32-bit Systems \nWindows 11 for ARM64-based Systems \nWindows Server 2016 \nWindows 10 Version 21H2 for ARM64-based Systems \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 Version 21H2 for 32-bit Systems \nWindows Server 2019 \nWindows 10 for x64-based Systems \nWindows Server, version 20H2 (Server Core Installation) \nWindows RT 8.1 \nWindows 10 Version 21H1 for ARM64-based Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows Server 2016 (Server Core installation) \nWindows 10 Version 21H1 for x64-based Systems \nWindows 10 Version 20H2 for ARM64-based Systems \nWindows 11 for x64-based Systems \nWindows 10 Version 1809 for ARM64-based Systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2022-35759](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35759>) \n[CVE-2022-34705](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34705>) \n[CVE-2022-35765](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35765>) \n[CVE-2022-34303](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34303>) \n[CVE-2022-35763](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35763>) \n[CVE-2022-34703](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34703>) \n[CVE-2022-35751](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35751>) \n[CVE-2022-34707](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34707>) \n[CVE-2022-30194](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30194>) \n[CVE-2022-35771](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35771>) \n[CVE-2022-35744](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35744>) \n[CVE-2022-34714](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34714>) \n[CVE-2022-34301](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34301>) \n[CVE-2022-35794](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35794>) \n[CVE-2022-35766](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35766>) \n[CVE-2022-34709](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34709>) \n[CVE-2022-34704](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34704>) \n[CVE-2022-35767](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35767>) \n[CVE-2022-35769](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35769>) \n[CVE-2022-35804](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35804>) \n[CVE-2022-30197](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30197>) \n[CVE-2022-35795](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35795>) \n[CVE-2022-35760](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35760>) \n[CVE-2022-35793](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35793>) \n[CVE-2022-35747](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35747>) \n[CVE-2022-35743](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35743>) \n[CVE-2022-35764](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35764>) \n[CVE-2022-30144](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30144>) \n[CVE-2022-35761](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35761>) \n[CVE-2022-35762](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35762>) \n[CVE-2022-34702](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34702>) \n[CVE-2022-35757](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35757>) \n[CVE-2022-34690](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34690>) \n[CVE-2022-35745](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35745>) \n[CVE-2022-35750](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35750>) \n[CVE-2022-34708](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34708>) \n[CVE-2022-35792](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35792>) \n[CVE-2022-35753](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35753>) \n[CVE-2022-34712](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34712>) \n[CVE-2022-34701](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34701>) \n[CVE-2022-34691](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34691>) \n[CVE-2022-34302](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34302>) \n[CVE-2022-35746](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35746>) \n[CVE-2022-34713](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713>) \n[CVE-2022-35820](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35820>) \n[CVE-2022-34696](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34696>) \n[CVE-2022-33670](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33670>) \n[CVE-2022-34706](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34706>) \n[CVE-2022-34699](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34699>) \n[CVE-2022-35754](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35754>) \n[CVE-2022-35748](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35748>) \n[CVE-2022-30133](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30133>) \n[CVE-2022-35758](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35758>) \n[CVE-2022-35755](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35755>) \n[CVE-2022-35797](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35797>) \n[CVE-2022-35749](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35749>) \n[CVE-2022-35768](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35768>) \n[CVE-2022-35752](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35752>) \n[CVE-2022-34715](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34715>) \n[CVE-2022-34710](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34710>) \n[CVE-2022-35756](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35756>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *CVE-IDS*:\n[CVE-2022-35759](<https://vulners.com/cve/CVE-2022-35759>)5.0Warning \n[CVE-2022-34705](<https://vulners.com/cve/CVE-2022-34705>)5.0Warning \n[CVE-2022-35765](<https://vulners.com/cve/CVE-2022-35765>)5.0Warning \n[CVE-2022-34303](<https://vulners.com/cve/CVE-2022-34303>)5.0Warning \n[CVE-2022-35763](<https://vulners.com/cve/CVE-2022-35763>)5.0Warning \n[CVE-2022-34703](<https://vulners.com/cve/CVE-2022-34703>)5.0Warning \n[CVE-2022-35751](<https://vulners.com/cve/CVE-2022-35751>)5.0Warning \n[CVE-2022-34707](<https://vulners.com/cve/CVE-2022-34707>)5.0Warning \n[CVE-2022-30194](<https://vulners.com/cve/CVE-2022-30194>)5.0Warning \n[CVE-2022-35771](<https://vulners.com/cve/CVE-2022-35771>)5.0Warning \n[CVE-2022-35744](<https://vulners.com/cve/CVE-2022-35744>)5.0Warning \n[CVE-2022-34714](<https://vulners.com/cve/CVE-2022-34714>)5.0Warning \n[CVE-2022-34301](<https://vulners.com/cve/CVE-2022-34301>)5.0Warning \n[CVE-2022-35794](<https://vulners.com/cve/CVE-2022-35794>)5.0Warning \n[CVE-2022-35766](<https://vulners.com/cve/CVE-2022-35766>)5.0Warning \n[CVE-2022-34709](<https://vulners.com/cve/CVE-2022-34709>)5.0Warning \n[CVE-2022-34704](<https://vulners.com/cve/CVE-2022-34704>)5.0Warning \n[CVE-2022-35767](<https://vulners.com/cve/CVE-2022-35767>)5.0Warning \n[CVE-2022-35769](<https://vulners.com/cve/CVE-2022-35769>)5.0Warning \n[CVE-2022-35804](<https://vulners.com/cve/CVE-2022-35804>)5.0Warning \n[CVE-2022-30197](<https://vulners.com/cve/CVE-2022-30197>)5.0Warning \n[CVE-2022-35795](<https://vulners.com/cve/CVE-2022-35795>)5.0Warning \n[CVE-2022-35760](<https://vulners.com/cve/CVE-2022-35760>)5.0Warning \n[CVE-2022-35793](<https://vulners.com/cve/CVE-2022-35793>)5.0Warning \n[CVE-2022-35747](<https://vulners.com/cve/CVE-2022-35747>)5.0Warning \n[CVE-2022-35743](<https://vulners.com/cve/CVE-2022-35743>)5.0Warning \n[CVE-2022-35764](<https://vulners.com/cve/CVE-2022-35764>)5.0Warning \n[CVE-2022-30144](<https://vulners.com/cve/CVE-2022-30144>)5.0Warning \n[CVE-2022-35761](<https://vulners.com/cve/CVE-2022-35761>)5.0Warning \n[CVE-2022-35762](<https://vulners.com/cve/CVE-2022-35762>)5.0Warning \n[CVE-2022-34702](<https://vulners.com/cve/CVE-2022-34702>)5.0Warning \n[CVE-2022-35757](<https://vulners.com/cve/CVE-2022-35757>)5.0Warning \n[CVE-2022-34690](<https://vulners.com/cve/CVE-2022-34690>)5.0Warning \n[CVE-2022-35745](<https://vulners.com/cve/CVE-2022-35745>)5.0Warning \n[CVE-2022-35750](<https://vulners.com/cve/CVE-2022-35750>)5.0Warning \n[CVE-2022-34708](<https://vulners.com/cve/CVE-2022-34708>)5.0Warning \n[CVE-2022-35792](<https://vulners.com/cve/CVE-2022-35792>)5.0Warning \n[CVE-2022-35753](<https://vulners.com/cve/CVE-2022-35753>)5.0Warning \n[CVE-2022-34712](<https://vulners.com/cve/CVE-2022-34712>)5.0Warning \n[CVE-2022-34701](<https://vulners.com/cve/CVE-2022-34701>)5.0Warning \n[CVE-2022-34691](<https://vulners.com/cve/CVE-2022-34691>)5.0Warning \n[CVE-2022-34302](<https://vulners.com/cve/CVE-2022-34302>)5.0Warning \n[CVE-2022-35746](<https://vulners.com/cve/CVE-2022-35746>)5.0Warning \n[CVE-2022-34713](<https://vulners.com/cve/CVE-2022-34713>)5.0Warning \n[CVE-2022-35820](<https://vulners.com/cve/CVE-2022-35820>)5.0Warning \n[CVE-2022-34696](<https://vulners.com/cve/CVE-2022-34696>)5.0Warning \n[CVE-2022-33670](<https://vulners.com/cve/CVE-2022-33670>)5.0Warning \n[CVE-2022-34706](<https://vulners.com/cve/CVE-2022-34706>)5.0Warning \n[CVE-2022-34699](<https://vulners.com/cve/CVE-2022-34699>)5.0Warning \n[CVE-2022-35754](<https://vulners.com/cve/CVE-2022-35754>)5.0Warning \n[CVE-2022-35748](<https://vulners.com/cve/CVE-2022-35748>)5.0Warning \n[CVE-2022-30133](<https://vulners.com/cve/CVE-2022-30133>)5.0Warning \n[CVE-2022-35758](<https://vulners.com/cve/CVE-2022-35758>)5.0Warning \n[CVE-2022-35755](<https://vulners.com/cve/CVE-2022-35755>)5.0Warning \n[CVE-2022-35797](<https://vulners.com/cve/CVE-2022-35797>)5.0Warning \n[CVE-2022-35749](<https://vulners.com/cve/CVE-2022-35749>)5.0Warning \n[CVE-2022-35768](<https://vulners.com/cve/CVE-2022-35768>)5.0Warning \n[CVE-2022-35752](<https://vulners.com/cve/CVE-2022-35752>)5.0Warning \n[CVE-2022-34715](<https://vulners.com/cve/CVE-2022-34715>)5.0Warning \n[CVE-2022-34710](<https://vulners.com/cve/CVE-2022-34710>)5.0Warning \n[CVE-2022-35756](<https://vulners.com/cve/CVE-2022-35756>)5.0Warning\n\n### *KB list*:\n[5016627](<http://support.microsoft.com/kb/5016627>) \n[5016672](<http://support.microsoft.com/kb/5016672>) \n[5016622](<http://support.microsoft.com/kb/5016622>) \n[5016683](<http://support.microsoft.com/kb/5016683>) \n[5016639](<http://support.microsoft.com/kb/5016639>) \n[5016616](<http://support.microsoft.com/kb/5016616>) \n[5016623](<http://support.microsoft.com/kb/5016623>) \n[5016684](<http://support.microsoft.com/kb/5016684>) \n[5016681](<http://support.microsoft.com/kb/5016681>) \n[5012170](<http://support.microsoft.com/kb/5012170>) \n[5016629](<http://support.microsoft.com/kb/5016629>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T00:00:00", "type": "kaspersky", "title": "KLA12602 Multiple vulnerabilities in Microsoft Windows", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-30133", "CVE-2022-30144", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-34715", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35797", "CVE-2022-35804", "CVE-2022-35820"], "modified": "2023-09-29T00:00:00", "id": "KLA12602", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12602/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "rapid7blog": [{"lastseen": "2022-08-10T00:04:15", "description": "\n\nIt's the week of [Hacker Summer Camp](<https://www.rapid7.com/blog/post/2022/08/04/what-were-looking-forward-to-at-black-hat-def-con-and-bsideslv-2022/>) in Las Vegas, and Microsoft has [published](<https://msrc.microsoft.com/update-guide/releaseNote/2022-Aug>) fixes for 141 separate vulnerabilities in their swath of August updates. This is a new monthly record by raw CVE count, but from a patching perspective, the numbers are slightly less dire. 20 CVEs affect their Chromium-based Edge browser, and 34 affect Azure Site Recovery (up from 32 CVEs affecting that product last month). As usual, OS-level updates will address a lot of these, but note that some extra configuration is required to fully protect Exchange Server this month.\n\nThere is one 0-day being patched this month. [CVE-2022-34713](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34713>) is a remote code execution (RCE) vulnerability affecting the Microsoft Windows Support Diagnostic Tool (MSDT) \u2013 it carries a CVSSv3 base score of 7.8, as it requires convincing a potential victim to open a malicious file. The advisory indicates that this CVE is a variant of the \u201cDogwalk\u201d vulnerability, which made news alongside [Follina](<https://www.rapid7.com/blog/post/2022/05/31/cve-2022-30190-follina-microsoft-support-diagnostic-tool-vulnerability/>) (CVE-2022-30190) back in May.\n\nPublicly disclosed, but not (yet) exploited is [CVE-2022-30134](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30134>), an Information Disclosure vulnerability affecting Exchange Server. In this case, simply patching is not sufficient to protect against attackers being able to read targeted email messages. Administrators should [enable Extended Protection](<https://microsoft.github.io/CSS-Exchange/Security/Extended-Protection/>) in order to fully remediate this vulnerability, as well as [the](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21979>) [five](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21980>) [other](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24516>) [vulnerabilities](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24477>) [affecting](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34692>) Exchange this month. Details about how to accomplish this are available via the [Exchange Blog](<https://techcommunity.microsoft.com/t5/exchange-team-blog/released-august-2022-exchange-server-security-updates/ba-p/3593862>).\n\nMicrosoft also patched several flaws affecting Remote Access Server (RAS). The most severe of these ([CVE-2022-30133](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30133>) and [CVE-2022-35744](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35744>)) are related to Windows Point-to-Point Tunneling Protocol and could allow RCE simply by sending a malicious connection request to a server. Seven CVEs affecting the Windows Secure Socket Tunneling Protocol (SSTP) on RAS were also fixed this month: six RCEs and one Denial of Service. If you have RAS in your environment but are unable to patch immediately, consider blocking traffic on port 1723 from your network.\n\nVulnerabilities affecting Windows Network File System (NFS) have been trending in recent months, and today sees Microsoft patching [CVE-2022-34715](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-34715>) (RCE, CVSS 9.8) affecting NFSv4.1 on Windows Server 2022.\n\nThis is the worst of it. One last vulnerability to highlight: [CVE-2022-35797](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-35797>) is a Security Feature Bypass in [Windows Hello](<https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/windows-hello-face-authentication#external-camera-security>) \u2013 Microsoft\u2019s biometric authentication mechanism for Windows 10. Successful exploitation requires physical access to a system, but would allow an attacker to bypass a facial recognition check.\n\n## Summary charts\n\n\n\n## Summary tables\n\n### Azure vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-35802](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35802>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-30175](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30175>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-30176](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30176>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34687](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34687>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35773](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35773>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35779](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35779>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35806](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35806>) | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35772](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35772>) | Azure Site Recovery Remote Code Execution Vulnerability | No | No | 7.2 | Yes \n[CVE-2022-35824](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35824>) | Azure Site Recovery Remote Code Execution Vulnerability | No | No | 7.2 | Yes \n[CVE-2022-33646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33646>) | Azure Batch Node Agent Elevation of Privilege Vulnerability | No | No | 7 | Yes \n[CVE-2022-35780](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35780>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35781](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35781>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35799](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35799>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35775](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35775>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35801](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35801>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35807](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35807>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35808](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35808>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35782](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35782>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35809](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35809>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35784](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35784>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35810](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35810>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35811](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35811>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35785](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35785>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35786](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35786>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35813](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35813>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35788](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35788>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35814](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35814>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35789](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35789>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35815](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35815>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35790](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35790>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35816](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35816>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35817](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35817>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35791](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35791>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35818](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35818>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35819](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35819>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 6.5 | Yes \n[CVE-2022-35776](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35776>) | Azure Site Recovery Denial of Service Vulnerability | No | No | 6.2 | Yes \n[CVE-2022-34685](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34685>) | Azure RTOS GUIX Studio Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34686](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34686>) | Azure RTOS GUIX Studio Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-35774](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35774>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 4.9 | Yes \n[CVE-2022-35800](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35800>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 4.9 | Yes \n[CVE-2022-35787](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35787>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 4.9 | Yes \n[CVE-2022-35821](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35821>) | Azure Sphere Information Disclosure Vulnerability | No | No | 4.4 | Yes \n[CVE-2022-35783](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35783>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 4.4 | Yes \n[CVE-2022-35812](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35812>) | Azure Site Recovery Elevation of Privilege Vulnerability | No | No | 4.4 | Yes \n \n### Browser vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-33649](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33649>) | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | No | No | 9.6 | Yes \n[CVE-2022-33636](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33636>) | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | No | No | 8.3 | Yes \n[CVE-2022-35796](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35796>) | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | No | No | 7.5 | Yes \n[CVE-2022-2624](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2624>) | Chromium: CVE-2022-2624 Heap buffer overflow in PDF | No | No | N/A | Yes \n[CVE-2022-2623](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2623>) | Chromium: CVE-2022-2623 Use after free in Offline | No | No | N/A | Yes \n[CVE-2022-2622](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2622>) | Chromium: CVE-2022-2622 Insufficient validation of untrusted input in Safe Browsing | No | No | N/A | Yes \n[CVE-2022-2621](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2621>) | Chromium: CVE-2022-2621 Use after free in Extensions | No | No | N/A | Yes \n[CVE-2022-2619](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2619>) | Chromium: CVE-2022-2619 Insufficient validation of untrusted input in Settings | No | No | N/A | Yes \n[CVE-2022-2618](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2618>) | Chromium: CVE-2022-2618 Insufficient validation of untrusted input in Internals | No | No | N/A | Yes \n[CVE-2022-2617](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2617>) | Chromium: CVE-2022-2617 Use after free in Extensions API | No | No | N/A | Yes \n[CVE-2022-2616](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2616>) | Chromium: CVE-2022-2616 Inappropriate implementation in Extensions API | No | No | N/A | Yes \n[CVE-2022-2615](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2615>) | Chromium: CVE-2022-2615 Insufficient policy enforcement in Cookies | No | No | N/A | Yes \n[CVE-2022-2614](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2614>) | Chromium: CVE-2022-2614 Use after free in Sign-In Flow | No | No | N/A | Yes \n[CVE-2022-2612](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2612>) | Chromium: CVE-2022-2612 Side-channel information leakage in Keyboard input | No | No | N/A | Yes \n[CVE-2022-2611](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2611>) | Chromium: CVE-2022-2611 Inappropriate implementation in Fullscreen API | No | No | N/A | Yes \n[CVE-2022-2610](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2610>) | Chromium: CVE-2022-2610 Insufficient policy enforcement in Background Fetch | No | No | N/A | Yes \n[CVE-2022-2606](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2606>) | Chromium: CVE-2022-2606 Use after free in Managed devices API | No | No | N/A | Yes \n[CVE-2022-2605](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2605>) | Chromium: CVE-2022-2605 Out of bounds read in Dawn | No | No | N/A | Yes \n[CVE-2022-2604](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2604>) | Chromium: CVE-2022-2604 Use after free in Safe Browsing | No | No | N/A | Yes \n[CVE-2022-2603](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-2603>) | Chromium: CVE-2022-2603 Use after free in Omnibox | No | No | N/A | Yes \n \n### Developer Tools vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-35777](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35777>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-35825](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35825>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-35826](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35826>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-35827](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35827>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-34716](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34716>) | .NET Spoofing Vulnerability | No | No | 5.9 | Yes \n \n### ESU Windows vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-30133](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30133>) | Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability | No | No | 9.8 | Yes \n[CVE-2022-35744](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35744>) | Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability | No | No | 9.8 | Yes \n[CVE-2022-34691](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34691>) | Active Directory Domain Services Elevation of Privilege Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-34714](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34714>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-35745](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35745>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-35752](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35752>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-35753](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35753>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-34702](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34702>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-35767](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35767>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-34706](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34706>) | Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34707](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34707>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35768](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35768>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35756](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35756>) | Windows Kerberos Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35751](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35751>) | Windows Hyper-V Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35795](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35795>) | Windows Error Reporting Service Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35820](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35820>) | Windows Bluetooth Driver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35750](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35750>) | Win32k Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34713](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34713>) | Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability | Yes | Yes | 7.8 | Yes \n[CVE-2022-35743](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35743>) | Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35760](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35760>) | Microsoft ATA Port Driver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-30194](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30194>) | Windows WebBrowser Control Remote Code Execution Vulnerability | No | No | 7.5 | Yes \n[CVE-2022-35769](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35769>) | Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability | No | No | 7.5 | No \n[CVE-2022-35793](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35793>) | Windows Print Spooler Elevation of Privilege Vulnerability | No | No | 7.3 | Yes \n[CVE-2022-34690](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34690>) | Windows Fax Service Elevation of Privilege Vulnerability | No | No | 7.1 | Yes \n[CVE-2022-35759](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35759>) | Windows Local Security Authority (LSA) Denial of Service Vulnerability | No | No | 6.5 | No \n[CVE-2022-35747](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35747>) | Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability | No | No | 5.9 | Yes \n[CVE-2022-35758](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35758>) | Windows Kernel Memory Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34708](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34708>) | Windows Kernel Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34701](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34701>) | Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability | No | No | 5.3 | No \n \n### Exchange Server vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-21980](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21980>) | Microsoft Exchange Server Elevation of Privilege Vulnerability | No | No | 8 | Yes \n[CVE-2022-24516](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24516>) | Microsoft Exchange Server Elevation of Privilege Vulnerability | No | No | 8 | Yes \n[CVE-2022-24477](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24477>) | Microsoft Exchange Server Elevation of Privilege Vulnerability | No | No | 8 | Yes \n[CVE-2022-30134](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30134>) | Microsoft Exchange Information Disclosure Vulnerability | No | Yes | 7.6 | Yes \n[CVE-2022-34692](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34692>) | Microsoft Exchange Information Disclosure Vulnerability | No | No | 5.3 | Yes \n[CVE-2022-21979](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21979>) | Microsoft Exchange Information Disclosure Vulnerability | No | No | 4.8 | Yes \n \n### Microsoft Office vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-34717](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34717>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-33648](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33648>) | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35742](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35742>) | Microsoft Outlook Denial of Service Vulnerability | No | No | 7.5 | Yes \n[CVE-2022-33631](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33631>) | Microsoft Excel Security Feature Bypass Vulnerability | No | No | 7.3 | Yes \n \n### System Center Azure vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-33640](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33640>) | System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n \n### Windows vulnerabilities\n\nCVE | Title | Exploited? | Publicly disclosed? | CVSSv3 base score | Has FAQ? \n---|---|---|---|---|--- \n[CVE-2022-34715](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34715>) | Windows Network File System Remote Code Execution Vulnerability | No | No | 9.8 | Yes \n[CVE-2022-35804](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35804>) | SMB Client and Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2022-35761](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35761>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 8.4 | Yes \n[CVE-2022-35766](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35766>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-35794](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35794>) | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | No | No | 8.1 | Yes \n[CVE-2022-34699](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34699>) | Windows Win32k Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-33670](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33670>) | Windows Partition Management Driver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34703](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34703>) | Windows Partition Management Driver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34696](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34696>) | Windows Hyper-V Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35746](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35746>) | Windows Digital Media Receiver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35749](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35749>) | Windows Digital Media Receiver Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-34705](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34705>) | Windows Defender Credential Guard Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35771](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35771>) | Windows Defender Credential Guard Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35762](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35762>) | Storage Spaces Direct Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35763](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35763>) | Storage Spaces Direct Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35764](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35764>) | Storage Spaces Direct Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35765](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35765>) | Storage Spaces Direct Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-35792](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35792>) | Storage Spaces Direct Elevation of Privilege Vulnerability | No | No | 7.8 | Yes \n[CVE-2022-30144](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30144>) | Windows Bluetooth Service Remote Code Execution Vulnerability | No | No | 7.5 | Yes \n[CVE-2022-35748](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35748>) | HTTP.sys Denial of Service Vulnerability | No | No | 7.5 | Yes \n[CVE-2022-35755](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35755>) | Windows Print Spooler Elevation of Privilege Vulnerability | No | No | 7.3 | Yes \n[CVE-2022-35757](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35757>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | No | No | 7.3 | Yes \n[CVE-2022-35754](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35754>) | Unified Write Filter Elevation of Privilege Vulnerability | No | No | 6.7 | Yes \n[CVE-2022-35797](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35797>) | Windows Hello Security Feature Bypass Vulnerability | No | No | 6.1 | Yes \n[CVE-2022-34709](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34709>) | Windows Defender Credential Guard Security Feature Bypass Vulnerability | No | No | 6 | Yes \n[CVE-2022-30197](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30197>) | Windows Kernel Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34710](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34710>) | Windows Defender Credential Guard Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34712](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34712>) | Windows Defender Credential Guard Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34704](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34704>) | Windows Defender Credential Guard Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2022-34303](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34303>) | CERT/CC: CVE-20220-34303 Crypto Pro Boot Loader Bypass | No | No | N/A | Yes \n[CVE-2022-34302](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34302>) | CERT/CC: CVE-2022-34302 New Horizon Data Systems Inc Boot Loader Bypass | No | No | N/A | Yes \n[CVE-2022-34301](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34301>) | CERT/CC: CVE-2022-34301 Eurosoft Boot Loader Bypass | No | No | N/A | Yes \n \n#### NEVER MISS A BLOG\n\nGet the latest stories, expertise, and news about security today.\n\nSubscribe", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-08-09T19:34:51", "type": "rapid7blog", "title": "Patch Tuesday - August 2022", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-21979", "CVE-2022-21980", "CVE-2022-24477", "CVE-2022-24516", "CVE-2022-2603", "CVE-2022-2604", "CVE-2022-2605", "CVE-2022-2606", "CVE-2022-2610", "CVE-2022-2611", "CVE-2022-2612", "CVE-2022-2614", "CVE-2022-2615", "CVE-2022-2616", "CVE-2022-2617", "CVE-2022-2618", "CVE-2022-2619", "CVE-2022-2621", "CVE-2022-2622", "CVE-2022-2623", "CVE-2022-2624", "CVE-2022-30133", "CVE-2022-30134", "CVE-2022-30144", "CVE-2022-30175", "CVE-2022-30176", "CVE-2022-30190", "CVE-2022-30194", "CVE-2022-30197", "CVE-2022-33631", "CVE-2022-33636", "CVE-2022-33640", "CVE-2022-33646", "CVE-2022-33648", "CVE-2022-33649", "CVE-2022-33670", "CVE-2022-34301", "CVE-2022-34302", "CVE-2022-34303", "CVE-2022-34685", "CVE-2022-34686", "CVE-2022-34687", "CVE-2022-34690", "CVE-2022-34691", "CVE-2022-34692", "CVE-2022-34696", "CVE-2022-34699", "CVE-2022-34701", "CVE-2022-34702", "CVE-2022-34703", "CVE-2022-34704", "CVE-2022-34705", "CVE-2022-34706", "CVE-2022-34707", "CVE-2022-34708", "CVE-2022-34709", "CVE-2022-34710", "CVE-2022-34712", "CVE-2022-34713", "CVE-2022-34714", "CVE-2022-34715", "CVE-2022-34716", "CVE-2022-34717", "CVE-2022-35742", "CVE-2022-35743", "CVE-2022-35744", "CVE-2022-35745", "CVE-2022-35746", "CVE-2022-35747", "CVE-2022-35748", "CVE-2022-35749", "CVE-2022-35750", "CVE-2022-35751", "CVE-2022-35752", "CVE-2022-35753", "CVE-2022-35754", "CVE-2022-35755", "CVE-2022-35756", "CVE-2022-35757", "CVE-2022-35758", "CVE-2022-35759", "CVE-2022-35760", "CVE-2022-35761", "CVE-2022-35762", "CVE-2022-35763", "CVE-2022-35764", "CVE-2022-35765", "CVE-2022-35766", "CVE-2022-35767", "CVE-2022-35768", "CVE-2022-35769", "CVE-2022-35771", "CVE-2022-35772", "CVE-2022-35773", "CVE-2022-35774", "CVE-2022-35775", "CVE-2022-35776", "CVE-2022-35777", "CVE-2022-35779", "CVE-2022-35780", "CVE-2022-35781", "CVE-2022-35782", "CVE-2022-35783", "CVE-2022-35784", "CVE-2022-35785", "CVE-2022-35786", "CVE-2022-35787", "CVE-2022-35788", "CVE-2022-35789", "CVE-2022-35790", "CVE-2022-35791", "CVE-2022-35792", "CVE-2022-35793", "CVE-2022-35794", "CVE-2022-35795", "CVE-2022-35796", "CVE-2022-35797", "CVE-2022-35799", "CVE-2022-35800", "CVE-2022-35801", "CVE-2022-35802", "CVE-2022-35804", "CVE-2022-35806", "CVE-2022-35807", "CVE-2022-35808", "CVE-2022-35809", "CVE-2022-35810", "CVE-2022-35811", "CVE-2022-35812", "CVE-2022-35813", "CVE-2022-35814", "CVE-2022-35815", "CVE-2022-35816", "CVE-2022-35817", "CVE-2022-35818", "CVE-2022-35819", "CVE-2022-35820", "CVE-2022-35821", "CVE-2022-35824", "CVE-2022-35825", "CVE-2022-35826", "CVE-2022-35827"], "modified": "2022-08-09T19:34:51", "id": "RAPID7BLOG:882168BD332366CE296FB09DC00E018E", "href": "https://blog.rapid7.com/2022/08/09/patch-tuesday-august-2022/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}