ID CVE-2018-1027 Type cve Reporter cve@mitre.org Modified 2020-08-24T17:37:00
Description
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Excel, Microsoft Office. This CVE ID is unique from CVE-2018-0920, CVE-2018-1011, CVE-2018-1029.
{"symantec": [{"lastseen": "2018-04-11T07:17:18", "bulletinFamily": "software", "cvelist": ["CVE-2018-1027"], "description": "### Description\n\nMicrosoft Excel is prone to a remote code-execution vulnerability. An attacker can leverage this issue to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely result in denial of service conditions.\n\n### Technologies Affected\n\n * Microsoft Excel 2007 SP3 \n * Microsoft Excel 2010 Service Pack 2 (32-bit editions) \n * Microsoft Excel 2010 Service Pack 2 (64-bit editions) \n * Microsoft Excel 2013 RT Service Pack 1 \n * Microsoft Excel 2013 Service Pack 1 (32-bit editions) \n * Microsoft Excel 2013 Service Pack 1 (64-bit editions) \n * Microsoft Office Compatibility Pack Service Pack 3 \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of suspicious or anomalous activity. This may help detect malicious actions that an attacker may take after successfully exploiting vulnerabilities in applications. Review all applicable logs regularly.\n\n**Do not accept or execute files from untrusted or unknown sources.** \nTo reduce the likelihood of successful exploits, never handle files that originate from unfamiliar or untrusted sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.\n\n**Implement multiple redundant layers of security.** \nSince this issue may be leveraged to execute code, we recommend memory-protection schemes, such as nonexecutable stack/heap configurations and randomly mapped memory segments. This tactic may complicate exploits of memory-corruption vulnerabilities.\n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2018-04-10T00:00:00", "published": "2018-04-10T00:00:00", "id": "SMNTC-103616", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/103616", "type": "symantec", "title": "Microsoft Excel CVE-2018-1027 Remote Code Execution Vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}], "openvas": [{"lastseen": "2020-06-08T23:06:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1027", "CVE-2018-1029"], "description": "This host is missing an important security\n update according to Microsoft KB4011717", "modified": "2020-06-04T00:00:00", "published": "2018-04-11T00:00:00", "id": "OPENVAS:1361412562310813128", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813128", "type": "openvas", "title": "Microsoft Office Compatibility Pack Service Pack 3 Multiple RCE Vulnerabilities (KB4011717)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Office Compatibility Pack Service Pack 3 Multiple RCE Vulnerabilities (KB4011717)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813128\");\n script_version(\"2020-06-04T11:13:22+0000\");\n script_cve_id(\"CVE-2018-1027\", \"CVE-2018-1029\");\n script_bugtraq_id(103616, 103617);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 11:13:22 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-04-11 09:51:50 +0530 (Wed, 11 Apr 2018)\");\n script_name(\"Microsoft Office Compatibility Pack Service Pack 3 Multiple RCE Vulnerabilities (KB4011717)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4011717\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaw exists due to an error in\n Microsoft Excel software when the software fails to properly handle objects\n in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to run arbitrary code in the context of the current user.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Office Compatibility Pack Service Pack 3.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4011717\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_office_products_version_900032.nasl\");\n script_mandatory_keys(\"SMB/Office/ComptPack/Version\", \"SMB/Office/XLCnv/Version\");\n script_require_ports(139, 445);\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\ncmpPckVer = get_kb_item(\"SMB/Office/ComptPack/Version\");\nif(cmpPckVer && cmpPckVer =~ \"^12\\.\")\n{\n os_arch = get_kb_item(\"SMB/Windows/Arch\");\n if(\"x86\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n }\n else if(\"x64\" >< os_arch){\n key_list = make_list(\"SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\",\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\");\n }\n\n foreach key(key_list)\n {\n msPath = registry_get_sz(key:key, item:\"ProgramFilesDir\");\n if(msPath)\n {\n xlcnvVer = get_kb_item(\"SMB/Office/XLCnv/Version\");\n\n if(xlcnvVer && xlcnvVer =~ \"^12\\.\")\n {\n offpath = msPath + \"\\Microsoft Office\\Office12\";\n sysVer = fetch_file_version(sysPath:offpath, file_name:\"excelcnv.exe\");\n if(sysVer && sysVer =~ \"^12\\.\" && version_in_range(version:sysVer, test_version:\"12.0\", test_version2:\"12.0.6787.4999\"))\n {\n report = report_fixed_ver(file_checked:offpath + \"\\excelcnv.exe\",\n file_version:sysVer, vulnerable_range:\"12.0 - 12.0.6787.4999\");\n security_message(data:report);\n exit(0);\n }\n }\n }\n }\n}\nexit(0);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-08T23:06:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1027", "CVE-2018-1029"], "description": "This host is missing an important security\n update according to Microsoft KB4018353", "modified": "2020-06-04T00:00:00", "published": "2018-04-11T00:00:00", "id": "OPENVAS:1361412562310812860", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812860", "type": "openvas", "title": "Microsoft Excel 2007 Service Pack 3 Multiple RCE Vulnerabilities (KB4018353)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Excel 2007 Service Pack 3 Multiple RCE Vulnerabilities (KB4018353)\n#\n# Authors:\n# Rajat Mishra <rajatm@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812860\");\n script_version(\"2020-06-04T11:13:22+0000\");\n script_cve_id(\"CVE-2018-1027\", \"CVE-2018-1029\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 11:13:22 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-04-11 08:58:36 +0530 (Wed, 11 Apr 2018)\");\n script_name(\"Microsoft Excel 2007 Service Pack 3 Multiple RCE Vulnerabilities (KB4018353)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4018353\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaw exists due to errors in\n Microsoft Excel software when the software fails to properly handle objects\n in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n who successfully exploited the vulnerability to run arbitrary code in the\n context of the current user.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Excel 2007 Service Pack 3.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4018353\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_office_products_version_900032.nasl\");\n script_mandatory_keys(\"SMB/Office/Excel/Version\");\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\n\nexcelVer = get_kb_item(\"SMB/Office/Excel/Version\");\nif(!excelVer){\n exit(0);\n}\n\nexcelPath = get_kb_item(\"SMB/Office/Excel/Install/Path\");\nif(!excelPath){\n excelPath = \"Unable to fetch the install path\";\n}\n\nif(excelVer =~ \"^(12\\.)\" && version_is_less(version:excelVer, test_version:\"12.0.6787.5000\"))\n{\n report = report_fixed_ver(file_checked:excelPath + \"Excel.exe\",\n file_version:excelVer, vulnerable_range:\"12.0 - 12.0.6787.4999\");\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-08T23:06:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1011", "CVE-2018-1027", "CVE-2018-1029"], "description": "This host is missing an important security\n update according to Microsoft KB4018350", "modified": "2020-06-04T00:00:00", "published": "2018-04-11T00:00:00", "id": "OPENVAS:1361412562310812859", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812859", "type": "openvas", "title": "Microsoft Excel 2013 Service Pack 1 Multiple Vulnerabilities (KB4018350)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Excel 2013 Service Pack 1 Multiple Vulnerabilities (KB4018350)\n#\n# Authors:\n# Rajat Mishra <rajatm@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812859\");\n script_version(\"2020-06-04T11:13:22+0000\");\n script_cve_id(\"CVE-2018-1011\", \"CVE-2018-1027\", \"CVE-2018-1029\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 11:13:22 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-04-11 08:53:50 +0530 (Wed, 11 Apr 2018)\");\n script_name(\"Microsoft Excel 2013 Service Pack 1 Multiple Vulnerabilities (KB4018350)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4018350\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaw exists when microsoft excel\n software when the software fails to properly handle objects in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n who successfully exploited the vulnerability could run arbitrary code in the\n context of the current user.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Excel 2013 Service Pack 1.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4018350\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_office_products_version_900032.nasl\");\n script_mandatory_keys(\"SMB/Office/Excel/Version\");\n\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nexcelVer = get_kb_item(\"SMB/Office/Excel/Version\");\nif(!excelVer){\n exit(0);\n}\n\nexcelPath = get_kb_item(\"SMB/Office/Excel/Install/Path\");\nif(!excelPath){\n excelPath = \"Unable to fetch the install path\";\n}\n\nif(excelVer =~ \"^(15\\.)\" && version_is_less(version:excelVer, test_version:\"15.0.5023.1000\"))\n{\n report = 'File checked: ' + excelPath + \"Excel.exe\" + '\\n' +\n 'File version: ' + excelVer + '\\n' +\n 'Vulnerable range: ' + \"15.0 - 15.0.5023.0999\" + '\\n' ;\n security_message(data:report);\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-08T23:06:01", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0920", "CVE-2018-1011", "CVE-2018-1027", "CVE-2018-1029"], "description": "This host is missing an important security\n update according to Microsoft KB4018362", "modified": "2020-06-04T00:00:00", "published": "2018-04-11T00:00:00", "id": "OPENVAS:1361412562310812867", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812867", "type": "openvas", "title": "Microsoft Excel 2010 Service Pack 2 Multiple RCE Vulnerabilities (KB4018362)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Excel 2010 Service Pack 2 Multiple RCE Vulnerabilities (KB4018362)\n#\n# Authors:\n# Rajat Mishra <rajatm@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812867\");\n script_version(\"2020-06-04T11:13:22+0000\");\n script_cve_id(\"CVE-2018-0920\", \"CVE-2018-1011\", \"CVE-2018-1027\", \"CVE-2018-1029\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 11:13:22 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-04-11 11:52:21 +0530 (Wed, 11 Apr 2018)\");\n script_name(\"Microsoft Excel 2010 Service Pack 2 Multiple RCE Vulnerabilities (KB4018362)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4018362\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to Microsoft Excel\n failing to properly handle objects in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to run arbitrary code in the context of the current user.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Excel 2010 Service Pack 2.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4018362\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_office_products_version_900032.nasl\");\n script_mandatory_keys(\"SMB/Office/Excel/Version\");\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nexcelVer = get_kb_item(\"SMB/Office/Excel/Version\");\nif(!excelVer){\n exit(0);\n}\n\nexcelPath = get_kb_item(\"SMB/Office/Excel/Install/Path\");\nif(!excelPath){\n excelPath = \"Unable to fetch the install path\";\n}\n\nif(excelVer =~ \"^(14\\.)\" && version_is_less(version:excelVer, test_version:\"14.0.7197.5000\"))\n{\n report = report_fixed_ver(file_checked:excelPath + \"Excel.exe\",\n file_version:excelVer, vulnerable_range:\"14.0 - 14.0.7197.4999\");\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mskb": [{"lastseen": "2021-01-01T22:47:09", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-1027", "CVE-2018-1029"], "description": "<html><body><p>Description of the security update for Excel 2007: April 10, 2018</p><h2>Summary</h2><div><p>This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1027\" target=\"_blank\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1027</a>\u00a0and <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1029\" target=\"_blank\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1029</a>.<br/><br/><strong>Note</strong> To apply this security update, you must have the release version of <a data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com/kb/949585\" target=\"_blank\">Service Pack 3 for the 2007 Microsoft Office Suite</a> installed on the computer.</p></div><h2>How to get and install the update</h2><h3>Method 1: Microsoft Update</h3><p>This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update: FAQ</a>.</p><h3>Method 2: Microsoft Update Catalog</h3><p>To get the stand-alone package for this update, go to the <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://www.catalog.update.microsoft.com/Search.aspx?q=KB4018353\" managed-link=\"\" target=\"\">Microsoft Update Catalog</a> website.</p><h3>Method 3: Microsoft Download Center</h3><p>You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.</p><ul linespacing=\"1\" style=\"list-style-type:UnorderedBullets\" type=\"UnorderedBullets\"><li><span asset=\"4009805\" contenteditable=\"false\" props='{\"size\":\"full\"}' unselectable=\"on\">4009805</span><a bookmark-id=\"\" data-content-id=\"\" href=\"http://www.microsoft.com/download/details.aspx?familyid=736c1ece-333f-480f-9a55-3e757fb85765\" managed-link=\"\">Download\u00a0security update 4018353 for the 32-bit version of Excel 2007</a></li></ul><h2>More Information</h2><h3>Security update deployment information</h3><p>For deployment information about this update, see <a href=\"https://support.microsoft.com/en-us/help/20180410\">security update deployment information: April 10, 2018</a>.</p><h3>Security update replacement information</h3><p>This security update replaces previously released security update <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com/kb/4011714\" managed-link=\"\" target=\"\">KB4011714</a>.</p><h3>File hash information</h3><table class=\"table\"><tbody><tr><th>Package name</th><th>Package hash SHA 1</th><th>Package hash SHA 2</th></tr><tr><td>excel2007-kb4018353-fullfile-x86-glb.exe</td><td>1743A774B6058FE000162E447567FADE11D668AC</td><td>A23DBD14896A2C5D11CBF37BAC224FBF905CB786C347A4A9E62D2E879D11D2DF</td></tr></tbody></table><h3>File information</h3><p>The English version of this security update has the file attributes (or later file attributes) that are listed in the following table.</p><h4>For all supported x86-based versions of Excel 2007</h4><table class=\"table\"><tbody><tr><th>File identifier</th><th>File name</th><th>File version</th><th>File size</th><th>Date</th><th>Time</th></tr><tr><td>excel.exe</td><td>excel.exe</td><td>12.0.6787.5000</td><td>18,379,976</td><td>24-Mar-2018</td><td>01:57</td></tr></tbody></table><h2>How to get help and support for this security update</h2><p>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/ph/6527\" managed-link=\"\" target=\"\">Support for Microsoft Update</a></p><p>Security solutions for IT professionals: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"\">TechNet Security Troubleshooting and Support</a></p><p>Help for protecting your Windows-based computer from viruses and malware: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"\">Virus Solution and Security Center</a></p><p>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"\">International Support</a></p><p><span><span>Propose a feature or provide feedback on Office: <a href=\"https://office.uservoice.com/\" target=\"_blank\">Office User Voice portal</a></span></span></p></body></html>", "edition": 4, "modified": "2020-04-16T09:11:11", "id": "KB4018353", "href": "https://support.microsoft.com/en-us/help/4018353/", "published": "2018-04-10T00:00:00", "title": "Description of the security update for Excel 2007: April 10, 2018", "type": "mskb", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T22:49:52", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-1027", "CVE-2018-1029"], "description": "<html><body><p>Description of the security update for Microsoft Office Compatibility Pack Service Pack 3: April 10, 2018</p><h2>Summary</h2><div><p>This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1027\" target=\"_blank\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1027</a>\u00a0and <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1029\" target=\"_blank\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1029</a>.<br/><br/><strong>Note</strong> To apply this security update, you must have the release version of <a data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com/kb/949585\" target=\"_blank\">Service Pack 3 for the 2007 Microsoft Office Suite</a> installed on the computer.</p></div><h2>How to get and install the update</h2><h3>Method 1: Microsoft Update</h3><p>This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"\">Windows Update: FAQ</a>.</p><h3>Method 2: Microsoft Update Catalog</h3><p>To get the stand-alone package for this update, go to the <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://www.catalog.update.microsoft.com/Search.aspx?q=KB4011717\" managed-link=\"\" target=\"\">Microsoft Update Catalog</a> website.</p><h3>Method 3: Microsoft Download Center</h3><p>You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.</p><ul linespacing=\"1\" style=\"list-style-type:UnorderedBullets\" type=\"UnorderedBullets\"><li><span asset=\"4009805\" contenteditable=\"false\" props='{\"size\":\"full\"}' unselectable=\"on\">4009805</span><a bookmark-id=\"\" data-content-id=\"\" href=\"http://www.microsoft.com/download/details.aspx?familyid=c5de1a79-d90b-4960-982a-464ceb98869c\" managed-link=\"\">Download security update 4011717 for the 32-bit version of Microsoft Office Compatibility Pack Service Pack 3</a></li></ul><h2>More Information</h2><h3>Security update deployment information</h3><p>For deployment information about this update, see <a href=\"https://support.microsoft.com/en-us/help/20180410\">security update deployment information: April 10, 2018</a>.</p><h3>Security update replacement information</h3><p>This security update replaces previously released security update <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com/kb/4011605\" managed-link=\"\" target=\"\">4011605</a>.</p><h3>File hash information</h3><table class=\"table\"><tbody><tr><th>Package name</th><th>Package hash SHA 1</th><th>Package hash SHA 2</th></tr><tr><td>xlconv2007-kb4011717-fullfile-x86-glb.exe</td><td>3A0BC5AF9A2CFA6D702F90B8AA0BE54F55DB9B4C</td><td>CF2F750749F59445D3824807B46EB729FA48E704049BA185BF0D5662DEF206B6</td></tr></tbody></table><h3>File information</h3><p>The English version of this security update has the file attributes (or later file attributes) that are listed in the following table.</p><h4>For all supported x86-based versions of Microsoft Office Compatibility Pack Service Pack 3</h4><table class=\"table\"><tbody><tr><th>File identifier</th><th>File name</th><th>File version</th><th>File size</th><th>Date</th><th>Time</th></tr><tr><td>xl12cnv.exe</td><td>excelcnv.exe|excelconv.exe</td><td>12.0.6787.5000</td><td>15,165,640</td><td>22-Mar-2018</td><td>04:39</td></tr></tbody></table><h2>How to get help and support for this security update</h2><p>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/ph/6527\" managed-link=\"\" target=\"\">Support for Microsoft Update</a></p><p>Security solutions for IT professionals: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"\">TechNet Security Troubleshooting and Support</a></p><p>Help for protecting your Windows-based computer from viruses and malware: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"\">Virus Solution and Security Center</a></p><p>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"\">International Support</a></p><p><span><span>Propose a feature or provide feedback on Office: <a href=\"https://office.uservoice.com/\" target=\"_blank\">Office User Voice portal</a></span></span></p></body></html>", "edition": 3, "modified": "2020-04-16T09:11:13", "id": "KB4011717", "href": "https://support.microsoft.com/en-us/help/4011717/", "published": "2018-04-10T00:00:00", "title": "Description of the security update for Microsoft Office Compatibility Pack Service Pack 3: April 10, 2018", "type": "mskb", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T22:48:25", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-1011", "CVE-2018-1027", "CVE-2018-1029"], "description": "<html><body><p>Description of the security update for Excel 2013: April 10, 2018</p><h2>Summary</h2><p>This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following\u00a0Microsoft Common Vulnerabilities and Exposures CVEs:</p><ul><li><a href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1011\" managed-link=\"\" target=\"_blank\">CVE-2018-1011</a></li><li><a href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1027\" managed-link=\"\" target=\"_blank\">CVE-2018-1027</a></li><li><a href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1029\" managed-link=\"\" target=\"_blank\">CVE-2018-1029</a></li></ul><p><strong>Note</strong> To apply this security update, you must have the release version of <a data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com/kb/2817430\" target=\"_blank\">Service Pack 1 for Microsoft Office 2013</a> installed on the computer.</p><p>Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2013. It doesn't apply to the Office 2013 Click-to-Run editions, such as Microsoft Office 365 Home. (<a href=\"https://blogs.technet.microsoft.com/office_integration__sharepoint/2016/06/23/determining-your-office-version-msi-vs-c2r/\" tabindex=\"0\" target=\"_blank\">Determining your Office version</a>)</p><h2>Improvements and fixes</h2><p>This security update contains improvements and fixes for the following nonsecurity issues:</p><ul linespacing=\"1\" style=\"list-style-type:UnorderedBullets\" type=\"UnorderedBullets\"><li>After you create an Excel workbook from Windows Explorer or a template, and then you link the workbook to another workbook that's in a relative path to the original file, the link breaks when you move both workbooks to a different folder.</li><li>When you open a workbook\u00a0that contains an external reference that has\u00a0metadata, Excel crashes. For example, this issue occurs when you open a workbook that contains a rich data type value in Excel 2013.</li><li>Provides a better translation of \u201cRun on |\u201d for the German version of Excel 2013.</li><li>When you drag any files to a ListView control that\u2019s from the Microsoft Windows common controls pack (MSCOMCTL.OCX), the ListView control does not react in 32-bit version of Excel.</li></ul><h2>How to get and install the update</h2><h3>Method 1: Microsoft Update</h3><p>This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update: FAQ</a>.</p><h3>Method 2: Microsoft Update Catalog</h3><p>To get the stand-alone package for this update, go to the <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://www.catalog.update.microsoft.com/Search.aspx?q=KB4018350\" managed-link=\"\" target=\"\">Microsoft Update Catalog</a> website.</p><h3>Method 3: Microsoft Download Center</h3><p>You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.</p><ul linespacing=\"1\" style=\"list-style-type:UnorderedBullets\" type=\"UnorderedBullets\"><li><span asset=\"4009805\" contenteditable=\"false\" props='{\"size\":\"full\"}' unselectable=\"on\">4009805</span><a bookmark-id=\"\" data-content-id=\"\" href=\"http://www.microsoft.com/download/details.aspx?familyid=2bd46d0c-df24-4428-9c8b-d7665a312ba8\" managed-link=\"\">Download security update 4018350 for the 32-bit version of Excel 2013</a></li><li><span asset=\"4009805\" contenteditable=\"false\" props='{\"size\":\"full\"}' unselectable=\"on\">4009805</span><a bookmark-id=\"\" data-content-id=\"\" href=\"http://www.microsoft.com/download/details.aspx?familyid=71bcf94e-f6c7-4d17-a9dc-6bc2aa49fb2c\" managed-link=\"\">Download security update 4018350 for the 64-bit version of Excel 2013</a></li></ul><h2>More Information</h2><h3>Security update deployment information</h3><p>For deployment information about this update, see <a href=\"https://support.microsoft.com/en-us/help/20180410\">security update deployment information: April 10, 2018</a>.</p><h3>Security update replacement information</h3><p>This security update replaces previously released security update <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com/kb/4018291\" managed-link=\"\" target=\"_blank\">4018291</a>.</p><h3>File hash information</h3><table class=\"table\"><tbody><tr><th>Package name</th><th>Package hash SHA 1</th><th>Package hash SHA 2</th></tr><tr><td>excel2013-kb4018350-fullfile-x86-glb.exe</td><td>54AF1E77B93DC541C887F96C3996BD9D012A289A</td><td>706024EBA9CB6F093F210D1F1F4A009E2ED1E89E62B63C30CD6FA52FEC860158</td></tr><tr><td>excel2013-kb4018350-fullfile-x64-glb.exe</td><td>2C484C8AE715C81848C50559E34A91A0CECE613A</td><td>4337AAB490D571FE22D350F2F821B731C1611DCDBB3D509509F500F2DC67CD35</td></tr></tbody></table><h3><br/>File information</h3><p>The English version of this security update has the file attributes (or later file attributes) that are listed in the following table.</p><h4>For all supported x86-based versions of Excel 2013</h4><table class=\"table\"><tbody><tr><th>File identifier</th><th>File name</th><th>File version</th><th>File size</th><th>Date</th><th>Time</th></tr><tr><td>exptoows.dll.1025</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>13448</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1030</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14480</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1031</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>15000</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.3082</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14488</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1036</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14496</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1037</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>13424</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1081</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>13952</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1057</td><td>exptoows.dll</td><td>15.0.4463.1000</td><td>13920</td><td>14-Mar-18</td><td>10:18</td></tr><tr><td>exptoows.dll.1040</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14480</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1041</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>12936</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1042</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>12416</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1043</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14504</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1046</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14496</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.2070</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14496</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1049</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>13952</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1060</td><td>exptoows.dll</td><td>15.0.4454.1000</td><td>13928</td><td>14-Mar-18</td><td>10:18</td></tr><tr><td>exptoows.dll.1066</td><td>exptoows.dll</td><td>15.0.4481.1000</td><td>14400</td><td>14-Mar-18</td><td>10:18</td></tr><tr><td>exptoows.dll.2052</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>11912</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>exptoows.dll.1028</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>12416</td><td>14-Mar-18</td><td>10:53</td></tr><tr><td>xlintl32.dll_1025</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4669600</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1025</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>38592</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1026</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4890280</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1026</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40616</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1029</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4856000</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1029</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>66240</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1030</td><td>xlintl32.dll</td><td>15.0.5015.1000</td><td>4562664</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1030</td><td>xllex.dll</td><td>15.0.5015.1000</td><td>50408</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1031</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4723432</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1031</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>43712</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1032</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>5137056</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1032</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>57512</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_3082</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4657352</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_3082</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>43720</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1061</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4772032</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1061</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40128</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1035</td><td>xlintl32.dll</td><td>15.0.4937.1000</td><td>4678888</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1035</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>43192</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1036</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>5071040</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1036</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>57536</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1037</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4622496</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1037</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>55976</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1081</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4801696</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1081</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>39080</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1050</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4624088</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1050</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40664</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1038</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4908728</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1038</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>67776</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1057</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4543672</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1057</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>39616</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1040</td><td>xlintl32.dll</td><td>15.0.4763.1000</td><td>4666056</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1040</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>44744</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1041</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4246688</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1041</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>46760</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1087</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4881064</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1087</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>55464</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1042</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4244640</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1042</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>45736</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1063</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4891328</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1063</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>41672</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1062</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4721344</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1062</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40648</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1086</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4568256</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1086</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>39104</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1044</td><td>xlintl32.dll</td><td>15.0.4727.1000</td><td>4533952</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1044</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>41664</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1043</td><td>xlintl32.dll</td><td>15.0.4989.1000</td><td>4663528</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1043</td><td>xllex.dll</td><td>15.0.5015.1000</td><td>51944</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1045</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4964560</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1045</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>70352</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1046</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4635840</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1046</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>42184</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_2070</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4708544</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_2070</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>42696</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1048</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4943552</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1048</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>56008</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1049</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4834464</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1049</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>43688</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1051</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4880064</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1051</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>55496</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1060</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4847832</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1060</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>52440</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_2074</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4900056</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_2074</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>52440</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1053</td><td>xlintl32.dll</td><td>15.0.4945.1000</td><td>4545792</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1053</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40640</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1054</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4555936</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xllex.dll_1054</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>39592</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll_1055</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4835512</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xllex.dll_1055</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>65216</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlintl32.dll_1058</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4809888</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xllex.dll_1058</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40616</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlintl32.dll_1066</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4867232</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xllex.dll_1066</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>59048</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlintl32.dll_2052</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4041376</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xllex.dll_2052</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>49320</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlintl32.dll_1028</td><td>xlintl32.dll</td><td>15.0.4709.1000</td><td>4058280</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xllex.dll_1028</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>47272</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>solver.xlam_1029</td><td>solver.xlam</td><td>\u00a0</td><td>387270</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1030</td><td>solver.xlam</td><td>\u00a0</td><td>393279</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1031</td><td>solver.xlam</td><td>\u00a0</td><td>389442</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1032</td><td>solver.xlam</td><td>\u00a0</td><td>385823</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_3082</td><td>solver.xlam</td><td>\u00a0</td><td>390466</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1035</td><td>solver.xlam</td><td>\u00a0</td><td>393370</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1036</td><td>solver.xlam</td><td>\u00a0</td><td>392486</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1050</td><td>solver.xlam</td><td>\u00a0</td><td>390879</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1038</td><td>solver.xlam</td><td>\u00a0</td><td>386469</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1040</td><td>solver.xlam</td><td>\u00a0</td><td>391320</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1041</td><td>solver.xlam</td><td>\u00a0</td><td>384524</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1042</td><td>solver.xlam</td><td>\u00a0</td><td>386074</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1044</td><td>solver.xlam</td><td>\u00a0</td><td>389011</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1043</td><td>solver.xlam</td><td>\u00a0</td><td>391407</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1045</td><td>solver.xlam</td><td>\u00a0</td><td>384352</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1046</td><td>solver.xlam</td><td>\u00a0</td><td>385274</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_2070</td><td>solver.xlam</td><td>\u00a0</td><td>387094</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1048</td><td>solver.xlam</td><td>\u00a0</td><td>384273</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1049</td><td>solver.xlam</td><td>\u00a0</td><td>384729</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1051</td><td>solver.xlam</td><td>\u00a0</td><td>388324</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1060</td><td>solver.xlam</td><td>\u00a0</td><td>385407</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1053</td><td>solver.xlam</td><td>\u00a0</td><td>390380</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1055</td><td>solver.xlam</td><td>\u00a0</td><td>385525</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>solver.xlam_1058</td><td>solver.xlam</td><td>\u00a0</td><td>386145</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>solver.xlam_2052</td><td>solver.xlam</td><td>\u00a0</td><td>385563</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>solver.xlam_1028</td><td>solver.xlam</td><td>\u00a0</td><td>383814</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlicons.exe</td><td>xlicons.exe</td><td>15.0.4553.1000</td><td>3685544</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xlintl32.rest.idx_dll_1025</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>385184</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1026</td><td>xlintl32.dll.idx_dll</td><td>15.0.4460.1000</td><td>100416</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1026</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>407712</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1029</td><td>xlintl32.dll.idx_dll</td><td>15.0.4448.1000</td><td>99392</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1029</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>396448</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1030</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>97920</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1030</td><td>xlintl32.rest.idx_dll</td><td>15.0.5015.1000</td><td>407720</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1031</td><td>xlintl32.dll.idx_dll</td><td>15.0.4937.1000</td><td>108232</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1031</td><td>xlintl32.rest.idx_dll</td><td>15.0.4971.1000</td><td>409800</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1032</td><td>xlintl32.dll.idx_dll</td><td>15.0.4448.1000</td><td>99392</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1032</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>398496</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1033</td><td>xlintl32.rest.idx_dll</td><td>15.0.4703.1000</td><td>407232</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xlintl32.rest.idx_dll_3082</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>405152</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1061</td><td>xlintl32.dll.idx_dll</td><td>15.0.4460.1000</td><td>99904</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1061</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>404128</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1035</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>98944</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1035</td><td>xlintl32.rest.idx_dll</td><td>15.0.4937.1000</td><td>407752</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1036</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>405152</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1037</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>386728</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1081</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>97904</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1081</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>392352</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1050</td><td>xlintl32.dll.idx_dll</td><td>15.0.4481.1000</td><td>101456</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1050</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>408744</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1038</td><td>xlintl32.dll.idx_dll</td><td>15.0.4448.1000</td><td>101440</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1038</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>396960</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1057</td><td>xlintl32.dll.idx_dll</td><td>15.0.4469.1000</td><td>99408</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1057</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>403624</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1040</td><td>xlintl32.rest.idx_dll</td><td>15.0.4763.1000</td><td>401984</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1041</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>381088</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1087</td><td>xlintl32.dll.idx_dll</td><td>15.0.4460.1000</td><td>97856</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1087</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>400544</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1042</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>379040</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1063</td><td>xlintl32.dll.idx_dll</td><td>15.0.4466.1000</td><td>100928</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1063</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>406688</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1062</td><td>xlintl32.dll.idx_dll</td><td>15.0.4466.1000</td><td>100928</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1062</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>405152</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1086</td><td>xlintl32.dll.idx_dll</td><td>15.0.4481.1000</td><td>98880</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1086</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>403616</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1044</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>97392</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1044</td><td>xlintl32.rest.idx_dll</td><td>15.0.4727.1000</td><td>400040</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1043</td><td>xlintl32.rest.idx_dll</td><td>15.0.4989.1000</td><td>407720</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1045</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>100480</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1045</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>397472</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1046</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>408736</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_2070</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>99440</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_2070</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>402592</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1048</td><td>xlintl32.dll.idx_dll</td><td>15.0.4454.1000</td><td>99408</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1048</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>393888</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1049</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>406688</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1051</td><td>xlintl32.dll.idx_dll</td><td>15.0.4466.1000</td><td>98880</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1051</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>397984</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1060</td><td>xlintl32.dll.idx_dll</td><td>15.0.4463.1000</td><td>99920</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1060</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>399520</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_2074</td><td>xlintl32.dll.idx_dll</td><td>15.0.4460.1000</td><td>100928</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_2074</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>408224</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1053</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>96880</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1053</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>397984</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1054</td><td>xlintl32.dll.idx_dll</td><td>15.0.4454.1000</td><td>97872</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.rest.idx_dll_1054</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>392352</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>xlintl32.dll.idx_dll_1055</td><td>xlintl32.dll.idx_dll</td><td>15.0.4454.1000</td><td>101456</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlintl32.rest.idx_dll_1055</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>402592</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlintl32.dll.idx_dll_1058</td><td>xlintl32.dll.idx_dll</td><td>15.0.4448.1000</td><td>102464</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlintl32.rest.idx_dll_1058</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>407200</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlintl32.dll.idx_dll_1066</td><td>xlintl32.dll.idx_dll</td><td>15.0.4481.1000</td><td>100416</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlintl32.rest.idx_dll_1066</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>410272</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlintl32.rest.idx_dll_2052</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>380064</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>xlintl32.rest.idx_dll_1028</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>381088</td><td>14-Mar-18</td><td>10:15</td></tr><tr><td>exptoows.xla.1025</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1026</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1027</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1028</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1029</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1030</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1031</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1032</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1033</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1035</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1036</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1037</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1038</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1039</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1040</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1042</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1043</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1044</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1045</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1046</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1048</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1049</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1050</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1051</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1052</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1053</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1054</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1055</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1056</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1057</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1058</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1059</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1060</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1061</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1062</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1063</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1064</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1065</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1066</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1067</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1068</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1069</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1071</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1074</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1076</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1077</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1078</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1079</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1081</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1082</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1086</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1087</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.1088</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1089</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1090</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1091</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1092</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1093</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1094</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1095</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1096</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1097</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1098</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1099</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1100</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1101</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1102</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1104</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1106</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1107</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1110</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1111</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1115</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1116</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1118</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1121</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1124</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1128</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1130</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1132</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1134</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1136</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1139</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1152</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1153</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1158</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1159</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1160</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1164</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1169</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1170</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2051</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2052</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.2068</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2070</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.2074</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.2108</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2117</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2118</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2137</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2141</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.3082</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>exptoows.xla.3098</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.3179</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.5146</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.7194</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1041</td><td>exptoows.xla</td><td>\u00a0</td><td>100864</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>excel.veman.xml</td><td>excel.visualelementsmanifest.xml</td><td>\u00a0</td><td>338</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xlintl32.dll_1033</td><td>xlintl32.dll</td><td>15.0.4703.1000</td><td>4421312</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xllex.dll_1033</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>37568</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>excel.exe</td><td>excel.exe</td><td>15.0.5023.1000</td><td>25748144</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>excel.man</td><td>excel.exe.manifest</td><td>\u00a0</td><td>1227</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xl12cnv.exe</td><td>excelcnv.exe</td><td>15.0.5023.1000</td><td>21961904</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xl12cnvp.dll</td><td>excelcnvpxy.dll</td><td>15.0.4454.1000</td><td>46144</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xlcall32.dll</td><td>xlcall32.dll</td><td>15.0.4454.1000</td><td>10328</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver.xlam_1025</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1026</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1033</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1037</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1054</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1057</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1061</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1062</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1063</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1066</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1081</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1086</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_1087</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver.xlam_2074</td><td>solver.xlam</td><td>\u00a0</td><td>408981</td><td>14-Mar-18</td><td>10:14</td></tr><tr><td>solver32.dll_1025</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1026</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1028</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1029</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1030</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1031</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1032</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1033</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1035</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1036</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1037</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1038</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1040</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1041</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1042</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1043</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1044</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1045</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1046</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1048</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1049</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1050</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1051</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1053</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1054</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1055</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1057</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1058</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1060</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1061</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1062</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1063</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1066</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1081</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1086</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1087</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_2052</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_2070</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_2074</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_3082</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>173112</td><td>14-Mar-18</td><td>08:19</td></tr></tbody></table><h4>For all supported x64-based versions of Excel 2013</h4><table class=\"table\"><tbody><tr><th>File identifier</th><th>File name</th><th>File version</th><th>File size</th><th>Date</th><th>Time</th></tr><tr><td>exptoows.dll.1025</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>13448</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1030</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14480</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1031</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>15000</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.3082</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14488</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1036</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14512</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1037</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>13440</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1081</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>13936</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1057</td><td>exptoows.dll</td><td>15.0.4463.1000</td><td>13920</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1040</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14496</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1041</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>12936</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1042</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>12416</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1043</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14488</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1046</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14496</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.2070</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>14512</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1049</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>13936</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1060</td><td>exptoows.dll</td><td>15.0.4454.1000</td><td>13944</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1066</td><td>exptoows.dll</td><td>15.0.4481.1000</td><td>14400</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.2052</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>11912</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>exptoows.dll.1028</td><td>exptoows.dll</td><td>15.0.4442.1000</td><td>12416</td><td>14-Mar-18</td><td>10:38</td></tr><tr><td>xlintl32.dll_1025</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4774576</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1025</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>38592</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1026</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4961456</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1026</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40616</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1029</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4927200</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1029</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>66240</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1030</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4624616</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1030</td><td>xllex.dll</td><td>15.0.5015.1000</td><td>50408</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1031</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4785392</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1031</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>43712</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1032</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>5208240</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1032</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>57512</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_3082</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4728064</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_3082</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>43720</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1061</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4843248</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1061</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40128</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1035</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4740824</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1035</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>43192</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1036</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>5142248</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1036</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>57536</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1037</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4727984</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1037</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>55976</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1081</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4872880</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1081</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>39080</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1050</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4695312</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1050</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40664</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1038</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4979936</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1038</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>67776</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1057</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4614888</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1057</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>39616</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1040</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4737280</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1040</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>44744</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1041</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4317872</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1041</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>46760</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1087</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4952240</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1087</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>55464</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1042</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4315824</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1042</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>45736</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1063</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4962552</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1063</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>41672</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1062</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4792560</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1062</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40648</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1086</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4639464</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1086</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>39104</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1044</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4605160</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1044</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>41664</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1043</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4725480</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1043</td><td>xllex.dll</td><td>15.0.5015.1000</td><td>51944</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1045</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>5035784</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1045</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>70352</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1046</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4707072</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1046</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>42184</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_2070</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4779776</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_2070</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>42696</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1048</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>5014768</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1048</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>56008</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1049</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4905648</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1049</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>43688</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1051</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4951288</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1051</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>55496</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1060</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4919064</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1060</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>52440</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_2074</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4971288</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_2074</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>52440</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1053</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4607712</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1053</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40640</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1054</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4627120</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1054</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>39592</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1055</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4906728</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1055</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>65216</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1058</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4881072</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1058</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>40616</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1066</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4938416</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1066</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>59048</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_2052</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4112560</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_2052</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>49320</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll_1028</td><td>xlintl32.dll</td><td>15.0.5023.1000</td><td>4128944</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xllex.dll_1028</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>47272</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1029</td><td>solver.xlam</td><td>\u00a0</td><td>397214</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1030</td><td>solver.xlam</td><td>\u00a0</td><td>402502</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1031</td><td>solver.xlam</td><td>\u00a0</td><td>402241</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1032</td><td>solver.xlam</td><td>\u00a0</td><td>396750</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_3082</td><td>solver.xlam</td><td>\u00a0</td><td>402150</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1035</td><td>solver.xlam</td><td>\u00a0</td><td>404077</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1036</td><td>solver.xlam</td><td>\u00a0</td><td>404116</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1050</td><td>solver.xlam</td><td>\u00a0</td><td>396596</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1038</td><td>solver.xlam</td><td>\u00a0</td><td>396418</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1040</td><td>solver.xlam</td><td>\u00a0</td><td>403485</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1041</td><td>solver.xlam</td><td>\u00a0</td><td>395776</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1042</td><td>solver.xlam</td><td>\u00a0</td><td>395586</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1044</td><td>solver.xlam</td><td>\u00a0</td><td>403121</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1043</td><td>solver.xlam</td><td>\u00a0</td><td>402507</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1045</td><td>solver.xlam</td><td>\u00a0</td><td>395431</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1046</td><td>solver.xlam</td><td>\u00a0</td><td>395758</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_2070</td><td>solver.xlam</td><td>\u00a0</td><td>396687</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1048</td><td>solver.xlam</td><td>\u00a0</td><td>396270</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1049</td><td>solver.xlam</td><td>\u00a0</td><td>397693</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1051</td><td>solver.xlam</td><td>\u00a0</td><td>396458</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1060</td><td>solver.xlam</td><td>\u00a0</td><td>399998</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1053</td><td>solver.xlam</td><td>\u00a0</td><td>402794</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1055</td><td>solver.xlam</td><td>\u00a0</td><td>396389</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1058</td><td>solver.xlam</td><td>\u00a0</td><td>397706</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_2052</td><td>solver.xlam</td><td>\u00a0</td><td>395018</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1028</td><td>solver.xlam</td><td>\u00a0</td><td>394778</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlicons.exe</td><td>xlicons.exe</td><td>15.0.4553.1000</td><td>3685544</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xlintl32.rest.idx_dll_1025</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>385184</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1026</td><td>xlintl32.dll.idx_dll</td><td>15.0.4460.1000</td><td>100416</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1026</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>407720</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1029</td><td>xlintl32.dll.idx_dll</td><td>15.0.4448.1000</td><td>99392</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1029</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>396456</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1030</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>97920</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1030</td><td>xlintl32.rest.idx_dll</td><td>15.0.5015.1000</td><td>407736</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1031</td><td>xlintl32.dll.idx_dll</td><td>15.0.4937.1000</td><td>108224</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1031</td><td>xlintl32.rest.idx_dll</td><td>15.0.4971.1000</td><td>409800</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1032</td><td>xlintl32.dll.idx_dll</td><td>15.0.4448.1000</td><td>99408</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1032</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>398504</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1033</td><td>xlintl32.rest.idx_dll</td><td>15.0.4703.1000</td><td>407232</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xlintl32.rest.idx_dll_3082</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>405152</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1061</td><td>xlintl32.dll.idx_dll</td><td>15.0.4460.1000</td><td>99904</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1061</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>404136</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1035</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>98944</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1035</td><td>xlintl32.rest.idx_dll</td><td>15.0.4937.1000</td><td>407744</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1036</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>405152</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1037</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>386720</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1081</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>97920</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1081</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>392352</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1050</td><td>xlintl32.dll.idx_dll</td><td>15.0.4481.1000</td><td>101440</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1050</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>408744</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1038</td><td>xlintl32.dll.idx_dll</td><td>15.0.4448.1000</td><td>101440</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1038</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>396960</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1057</td><td>xlintl32.dll.idx_dll</td><td>15.0.4469.1000</td><td>99408</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1057</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>403616</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1040</td><td>xlintl32.rest.idx_dll</td><td>15.0.4763.1000</td><td>400552</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1041</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>381088</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1087</td><td>xlintl32.dll.idx_dll</td><td>15.0.4460.1000</td><td>97856</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1087</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>400552</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1042</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>379040</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1063</td><td>xlintl32.dll.idx_dll</td><td>15.0.4466.1000</td><td>100928</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1063</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>406688</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1062</td><td>xlintl32.dll.idx_dll</td><td>15.0.4466.1000</td><td>100928</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1062</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>405152</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1086</td><td>xlintl32.dll.idx_dll</td><td>15.0.4481.1000</td><td>98896</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1086</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>403616</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1044</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>97408</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1044</td><td>xlintl32.rest.idx_dll</td><td>15.0.4727.1000</td><td>400040</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1043</td><td>xlintl32.rest.idx_dll</td><td>15.0.4989.1000</td><td>407728</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1045</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>100464</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1045</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>397472</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1046</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>408744</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_2070</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>99440</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_2070</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>402592</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1048</td><td>xlintl32.dll.idx_dll</td><td>15.0.4454.1000</td><td>99392</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1048</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>393896</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1049</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>406688</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1051</td><td>xlintl32.dll.idx_dll</td><td>15.0.4466.1000</td><td>98880</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1051</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>397984</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1060</td><td>xlintl32.dll.idx_dll</td><td>15.0.4463.1000</td><td>99904</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1060</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>399520</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_2074</td><td>xlintl32.dll.idx_dll</td><td>15.0.4460.1000</td><td>100944</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_2074</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>408224</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1053</td><td>xlintl32.dll.idx_dll</td><td>15.0.4442.1000</td><td>96880</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1053</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>397984</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1054</td><td>xlintl32.dll.idx_dll</td><td>15.0.4454.1000</td><td>97856</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1054</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>392360</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1055</td><td>xlintl32.dll.idx_dll</td><td>15.0.4454.1000</td><td>101440</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1055</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>402592</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1058</td><td>xlintl32.dll.idx_dll</td><td>15.0.4448.1000</td><td>102464</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1058</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>407208</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.dll.idx_dll_1066</td><td>xlintl32.dll.idx_dll</td><td>15.0.4481.1000</td><td>100416</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1066</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>410272</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_2052</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>380064</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>xlintl32.rest.idx_dll_1028</td><td>xlintl32.rest.idx_dll</td><td>15.0.4709.1000</td><td>381088</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>exptoows.xla.1025</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1026</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1027</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1028</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1029</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1030</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1031</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1032</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1033</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1035</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1036</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1037</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1038</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1039</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1040</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1041</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1042</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1043</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1044</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1045</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1046</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1048</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1049</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1050</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1051</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1052</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1053</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1054</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1055</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1056</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1057</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1058</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1059</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1060</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1061</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1062</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1063</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1064</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1065</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1066</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1067</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1068</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1069</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1071</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1074</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1076</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1077</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1078</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1079</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1081</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1082</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1086</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1087</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.1088</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1089</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1090</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1091</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1092</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1093</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1094</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1095</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1096</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1097</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1098</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1099</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1100</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1101</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1102</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1104</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1106</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1107</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1110</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1111</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1115</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1116</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1118</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1121</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1124</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1128</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1130</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1132</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1134</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1136</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1139</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1152</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1153</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1158</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1159</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1160</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1164</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1169</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.1170</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2051</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2052</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.2068</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2070</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.2074</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.2108</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2117</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2118</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2137</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.2141</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.3082</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>14-Mar-18</td><td>08:20</td></tr><tr><td>exptoows.xla.3098</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.3179</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.5146</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>exptoows.xla.7194</td><td>exptoows.xla</td><td>\u00a0</td><td>114688</td><td>\u00a0</td><td>\u00a0</td></tr><tr><td>excel.veman.xml</td><td>excel.visualelementsmanifest.xml</td><td>\u00a0</td><td>338</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xlintl32.dll_1033</td><td>xlintl32.dll</td><td>15.0.4703.1000</td><td>4483768</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xlintl32.fallback.dll.1033</td><td>xlintl32.dll</td><td>15.0.4703.1000</td><td>4483768</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xllex.dll_1033</td><td>xllex.dll</td><td>15.0.4569.1000</td><td>37568</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>excel.exe</td><td>excel.exe</td><td>15.0.5023.1000</td><td>33050792</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>excel.man</td><td>excel.exe.manifest</td><td>\u00a0</td><td>1227</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xl12cnv.exe</td><td>excelcnv.exe</td><td>15.0.5023.1000</td><td>29514920</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xlsrv.ecs.excelcnv.exe</td><td>excelcnv.exe</td><td>15.0.5023.1000</td><td>29514920</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xl12cnvp.dll</td><td>excelcnvpxy.dll</td><td>15.0.4454.1000</td><td>48704</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>xlcall32.dll</td><td>xlcall32.dll</td><td>15.0.4454.1000</td><td>10856</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver.xlam_1025</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1026</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1033</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1037</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1054</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1057</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1061</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1062</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1063</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1066</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1081</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1086</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_1087</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver.xlam_2074</td><td>solver.xlam</td><td>\u00a0</td><td>426707</td><td>14-Mar-18</td><td>10:34</td></tr><tr><td>solver32.dll_1025</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1026</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1028</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1029</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1030</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1031</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1032</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1033</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1035</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1036</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1037</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1038</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1040</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1041</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1042</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1043</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1044</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1045</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1046</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1048</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1049</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1050</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1051</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1053</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1054</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1055</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1057</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1058</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1060</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1061</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1062</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1063</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1066</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1081</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1086</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_1087</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_2052</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_2070</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_2074</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr><tr><td>solver32.dll_3082</td><td>solver32.dll</td><td>15.0.4454.1000</td><td>216136</td><td>14-Mar-18</td><td>08:19</td></tr></tbody></table><h2>How to get help and support for this security update</h2><p>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/ph/6527\" managed-link=\"\" target=\"\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"\">TechNet Security Troubleshooting and Support</a><br/><br/>Help for protecting your Windows-based computer from viruses and malware: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"\">International Support</a></p><p>Propose a feature or provide feedback on Office Core:\u00a0<a aria-live=\"rude\" bookmark-id=\"\" data-bi-name=\"content-anchor-link\" data-content-id=\"\" data-content-type=\"\" href=\"https://office.uservoice.com/\" managed-link=\"\" tabindex=\"0\" target=\"_self\">Office User Voice portal</a></p></body></html>", "edition": 15, "modified": "2020-04-16T09:11:10", "id": "KB4018350", "href": "https://support.microsoft.com/en-us/help/4018350/", "published": "2018-04-10T00:00:00", "title": "Description of the security update for Excel 2013: April 10, 2018", "type": "mskb", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T22:50:00", "bulletinFamily": "microsoft", "cvelist": ["CVE-2018-0920", "CVE-2018-1011", "CVE-2018-1027", "CVE-2018-1029"], "description": "<html><body><p>Description of the security update for Excel 2010: April 10, 2018</p><h2>Summary</h2><p>This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following TechNet articles:</p><ul><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0920\" target=\"_blank\">Microsoft Common Vulnerabilities and Exposures CVE-2018-0920</a></li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1011\" target=\"_blank\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1011</a></li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1027\" target=\"_blank\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1027</a></li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1029\" target=\"_blank\">Microsoft Common Vulnerabilities and Exposures CVE-2018-1029</a></li></ul><p><strong>Note</strong> To apply this security update, you must have the release version of <a data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com/kb/2687455\" target=\"_blank\">Service Pack 2 for Office 2010</a> installed on the computer.</p><main role=\"main\"><article itemscope=\"\" itemtype=\"http://schema.org/TechArticle\" role=\"article\"><section applies-to-saps=\"\" data-grid=\"col-12\" ng-attr-id=\"{{contentSection.meta.id}}\" ng-class=\"{'internal-content': isInternalSection() }\" ng-if=\"typeof(contentSection) !== 'string'\"><p>Be aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2010. It doesn't apply to the Office 2010 Click-to-Run editions, such as Microsoft Office 365 Home. (<a href=\"https://blogs.technet.microsoft.com/office_integration__sharepoint/2016/06/23/determining-your-office-version-msi-vs-c2r/\" tabindex=\"0\" target=\"_blank\">Determining your Office version</a>)</p></section></article></main><h2>How to get and install the update</h2><h3>Method 1: Microsoft Update</h3><p>This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update: FAQ</a>.</p><h3>Method 2: Microsoft Update Catalog</h3><p>To get the stand-alone package for this update, go to the <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://www.catalog.update.microsoft.com/Search.aspx?q=KB4018362\" managed-link=\"\" target=\"\">Microsoft Update Catalog</a> website.</p><h3>Method 3: Microsoft Download Center</h3><p>You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.</p><ul linespacing=\"1\" style=\"list-style-type:UnorderedBullets\" type=\"UnorderedBullets\"><li><span asset=\"4009805\" contenteditable=\"false\" props='{\"size\":\"full\"}' unselectable=\"on\">4009805</span><a bookmark-id=\"\" data-content-id=\"\" href=\"http://www.microsoft.com/download/details.aspx?familyid=70ec98c7-1510-4064-b4a3-6fb6a6ffe203\" managed-link=\"\">Download security update 4018362 for the 32-bit version of Excel 2010</a></li><li><span asset=\"4009805\" contenteditable=\"false\" props='{\"size\":\"full\"}' unselectable=\"on\">4009805</span><a bookmark-id=\"\" data-content-id=\"\" href=\"http://www.microsoft.com/download/details.aspx?familyid=0a81ef86-07cf-40dc-9eb4-fd9ac7a269eb\" managed-link=\"\">Download security update 4018362 for the 64-bit version of Excel 2010</a></li></ul><h2>More Information</h2><h3>Security update deployment information</h3><p>For deployment information about this update, see <a href=\"https://support.microsoft.com/en-us/help/20180410\">security update deployment information: April 10, 2018</a>.</p><h3>Security update replacement information</h3><p>This security update replaces previously released security update <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com/kb/4011675\" managed-link=\"\" target=\"\">4011675</a>.</p><h3>File hash information</h3><table class=\"table\"><tbody><tr><th>Package name</th><th>Package hash SHA 1</th><th>Package hash SHA 2</th></tr><tr><td>excel2010-kb4018362-fullfile-x86-glb.exe</td><td>C856B89CB5B32C4E7703F0B57F26208C0C122DB5</td><td>61900ADD202E6C7B3FE6BD6D296A2FBCD461006F83AECB133F422DA86A3082BE</td></tr><tr><td>excel2010-kb4018362-fullfile-x64-glb.exe</td><td>5A211FBDB2E368BA969CA56E546C49CF0DCA6483</td><td>B6A09DCD7C95FA047EA338CC0EB9C0E1AE106E42A9EAB2E5FFB35CD1CD905B5A</td></tr></tbody></table><h3><br/>File information</h3><p>The English version of this security update has the file attributes (or later file attributes) that are listed in the following table.</p><h4>For all supported x86-based versions of Excel 2010</h4><table class=\"table\"><tbody><tr><th>File identifier</th><th>File name</th><th>File version</th><th>File size</th><th>Date</th><th>Time</th></tr><tr><td>excel.exe</td><td>excel.exe</td><td>14.0.7197.5000</td><td>20,414,632</td><td>25-Mar-2018</td><td>11:07</td></tr><tr><td>excel.man</td><td>excel.exe.manifest</td><td>\u00a0</td><td>1,194</td><td>05-Nov-2009</td><td>11:00</td></tr><tr><td>xl12cnv.exe</td><td>excelcnv.exe</td><td>14.0.7197.5000</td><td>17,852,592</td><td>17-Mar-2018</td><td>09:33</td></tr><tr><td>xlcall32.dll</td><td>xlcall32.dll</td><td>14.0.7162.5000</td><td>10,432</td><td>13-Oct-2015</td><td>06:52</td></tr><tr><td>xlicons.exe</td><td>xlicons.exe</td><td>14.0.7120.5000</td><td>1,480,360</td><td>05-Mar-2014</td><td>06:06</td></tr></tbody></table><h4>For all supported x64-based versions of Excel 2010</h4><table class=\"table\"><tbody><tr><th>File identifier</th><th>File name</th><th>File version</th><th>File size</th><th>Date</th><th>Time</th></tr><tr><td>excel.exe</td><td>excel.exe</td><td>14.0.7197.5000</td><td>27,671,208</td><td>25-Mar-2018</td><td>11:09</td></tr><tr><td>excel.man</td><td>excel.exe.manifest</td><td>\u00a0</td><td>1,196</td><td>05-Nov-2009</td><td>11:23</td></tr><tr><td>xl12cnv.exe</td><td>excelcnv.exe</td><td>14.0.7197.5000</td><td>25,064,624</td><td>17-Mar-2018</td><td>09:39</td></tr><tr><td>xlcall32.dll</td><td>xlcall32.dll</td><td>14.0.7162.5000</td><td>10,944</td><td>13-Oct-2015</td><td>07:00</td></tr><tr><td>xlicons.exe</td><td>xlicons.exe</td><td>14.0.7120.5000</td><td>1,480,360</td><td>05-Mar-2014</td><td>06:06</td></tr></tbody></table><h2>How to get help and support for this security update</h2><p>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/ph/6527\" managed-link=\"\" target=\"\">Support for Microsoft Update</a></p><p>Security solutions for IT professionals: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"\">TechNet Security Troubleshooting and Support</a></p><p>Help for protecting your Windows-based computer from viruses and malware: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"\">Virus Solution and Security Center</a></p><p>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"\">International Support</a></p><p><span><span>Propose a feature or provide feedback on Office: <a href=\"https://office.uservoice.com/\" target=\"_blank\">Office User Voice portal</a></span></span></p></body></html>", "edition": 14, "modified": "2020-04-16T09:11:09", "id": "KB4018362", "href": "https://support.microsoft.com/en-us/help/4018362/", "published": "2018-04-10T00:00:00", "title": "Description of the security update for Excel 2010: April 10, 2018", "type": "mskb", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-01T05:44:30", "description": "The Microsoft Office Compatibility Products are missing\nsecurity updates. It is, therefore, affected by multiple\nvulnerabilities :\n\n - An information disclosure vulnerability exists when\n Office renders Rich Text Format (RTF) email messages\n containing OLE objects when a message is opened or\n previewed. This vulnerability could potentially result\n in the disclosure of sensitive information to a\n malicious site. (CVE-2018-0950)\n\n - A remote code execution vulnerability exists in\n Microsoft Excel software when the software fails to\n properly handle objects in memory. An attacker who\n successfully exploited the vulnerability could run\n arbitrary code in the context of the current user. If\n the current user is logged on with administrative user\n rights, an attacker could take control of the affected\n system. An attacker could then install programs; view,\n change, or delete data; or create new accounts with full\n user rights. (CVE-2018-1027, CVE-2018-1029)", "edition": 25, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-04-10T00:00:00", "title": "Security Updates for Microsoft Office Compatibility Products (April 2018)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0950", "CVE-2018-1027", "CVE-2018-1029"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:microsoft:office_compatibility_pack"], "id": "SMB_NT_MS18_APR_OFFICE_COMPATIBILITY.NASL", "href": "https://www.tenable.com/plugins/nessus/108973", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(108973);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\"CVE-2018-0950\", \"CVE-2018-1027\", \"CVE-2018-1029\");\n script_xref(name:\"MSKB\", value:\"4011717\");\n script_xref(name:\"MSKB\", value:\"4018354\");\n script_xref(name:\"MSFT\", value:\"MS18-4011717\");\n script_xref(name:\"MSFT\", value:\"MS18-4018354\");\n\n script_name(english:\"Security Updates for Microsoft Office Compatibility Products (April 2018)\");\n script_summary(english:\"Checks for Microsoft security updates.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Compatibility Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Compatibility Products are missing\nsecurity updates. It is, therefore, affected by multiple\nvulnerabilities :\n\n - An information disclosure vulnerability exists when\n Office renders Rich Text Format (RTF) email messages\n containing OLE objects when a message is opened or\n previewed. This vulnerability could potentially result\n in the disclosure of sensitive information to a\n malicious site. (CVE-2018-0950)\n\n - A remote code execution vulnerability exists in\n Microsoft Excel software when the software fails to\n properly handle objects in memory. An attacker who\n successfully exploited the vulnerability could run\n arbitrary code in the context of the current user. If\n the current user is logged on with administrative user\n rights, an attacker could take control of the affected\n system. An attacker could then install programs; view,\n change, or delete data; or create new accounts with full\n user rights. (CVE-2018-1027, CVE-2018-1029)\");\n # https://support.microsoft.com/en-us/help/4011717/description-of-the-security-update-for-microsoft-office-compatibility\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?263974b3\");\n # https://support.microsoft.com/en-us/help/4018354/description-of-the-security-update-for-microsoft-office-compatibility\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?53533848\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4011717\n -KB4018354\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-1029\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/04/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/04/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/04/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office_compatibility_pack\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"misc_func.inc\");\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS18-04\";\nkbs = make_list('4011717', '4018354');\n\nvuln = FALSE;\n\nif (get_kb_item(\"Host/patch_management_checks\"))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\n####################################################################\n# Office Compatibility Pack\n####################################################################\ninstalls = get_kb_list(\"SMB/Office/WordCnv/*/ProductPath\");\n\nforeach install (keys(installs))\n{\n path = installs[install];\n path = ereg_replace(pattern:'^(.+)\\\\\\\\[^\\\\\\\\]+\\\\.exe$', replace:\"\\1\\\", string:path, icase:TRUE);\n\n kb = \"4011717\";\n file = \"excelcnv.exe\";\n version = \"12.0.6787.5000\";\n min_version = \"12.0.0.0\";\n product = \"Microsoft Office Compatibility Pack\";\n if (hotfix_check_fversion(path:path, file:file, version:version, kb:kb, bulletin:bulletin, min_version:min_version, product:product) == HCF_OLDER)\n vuln = TRUE;\n\n kb = \"4018354\";\n file = \"wordcnv.dll\";\n version = \"12.0.6787.5000\";\n min_version = \"12.0.0.0\";\n product = \"Microsoft Office Compatibility Pack\";\n if (hotfix_check_fversion(path:path, file:file, version:version, kb:kb, bulletin:bulletin, min_version:min_version, product:product) == HCF_OLDER)\n vuln = TRUE;\n}\n\nif(vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T05:44:29", "description": "The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in\n Microsoft Excel software when the software fails to\n properly handle objects in memory. An attacker who\n successfully exploited the vulnerability could run\n arbitrary code in the context of the current user. If\n the current user is logged on with administrative user\n rights, an attacker could take control of the affected\n system. An attacker could then install programs; view,\n change, or delete data; or create new accounts with full\n user rights. (CVE-2018-0920, CVE-2018-1011,\n CVE-2018-1027, CVE-2018-1029)", "edition": 26, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2018-04-10T00:00:00", "title": "Security Updates for Microsoft Excel Products (April 2018)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-0920", "CVE-2018-1011", "CVE-2018-1027", "CVE-2018-1029"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:microsoft:excel"], "id": "SMB_NT_MS18_APR_EXCEL.NASL", "href": "https://www.tenable.com/plugins/nessus/108969", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(108969);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/11/08\");\n\n script_cve_id(\n \"CVE-2018-0920\",\n \"CVE-2018-1011\",\n \"CVE-2018-1027\",\n \"CVE-2018-1029\"\n );\n script_xref(name:\"MSKB\", value:\"4018353\");\n script_xref(name:\"MSKB\", value:\"4018350\");\n script_xref(name:\"MSKB\", value:\"4018337\");\n script_xref(name:\"MSKB\", value:\"4018362\");\n script_xref(name:\"MSFT\", value:\"MS18-4018353\");\n script_xref(name:\"MSFT\", value:\"MS18-4018350\");\n script_xref(name:\"MSFT\", value:\"MS18-4018337\");\n script_xref(name:\"MSFT\", value:\"MS18-4018362\");\n\n script_name(english:\"Security Updates for Microsoft Excel Products (April 2018)\");\n script_summary(english:\"Checks for Microsoft security updates.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Excel Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in\n Microsoft Excel software when the software fails to\n properly handle objects in memory. An attacker who\n successfully exploited the vulnerability could run\n arbitrary code in the context of the current user. If\n the current user is logged on with administrative user\n rights, an attacker could take control of the affected\n system. An attacker could then install programs; view,\n change, or delete data; or create new accounts with full\n user rights. (CVE-2018-0920, CVE-2018-1011,\n CVE-2018-1027, CVE-2018-1029)\");\n # https://support.microsoft.com/en-us/help/4018353/description-of-the-security-update-for-excel-2007-april-10-2018\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?52e564f2\");\n # https://support.microsoft.com/en-us/help/4018350/description-of-the-security-update-for-excel-2013-april-10-2018\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?cb3f7bea\");\n # https://support.microsoft.com/en-us/help/4018337/description-of-the-security-update-for-excel-2016-april-10-2018\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?839dd676\");\n # https://support.microsoft.com/en-us/help/4018362/description-of-the-security-update-for-excel-2010-april-10-2018\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4de9b158\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4018353\n -KB4018350\n -KB4018337\n -KB4018362\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-1029\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/04/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/04/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/04/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:excel\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_reg_query.inc\");\ninclude(\"install_func.inc\");\n\nglobal_var vuln;\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = \"MS18-04\";\nkbs = make_list(\n '4018353', # 2007 SP3\n '4018362', # 2010 SP2\n '4018350', # 2013 SP1\n '4018337' # 2016\n);\n\nif (get_kb_item(\"Host/patch_management_checks\"))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\", exit_code:1);\n\nvuln = FALSE;\nport = kb_smb_transport();\n\n######################################################################\n# Excel 2007, 2010, 2013, 2016\n######################################################################\nkb16 = \"4018337\";\nexcel_checks = make_array(\n \"12.0\", make_array(\"sp\", 3, \"version\", \"12.0.6787.5000\", \"kb\", \"4018353\"),\n \"14.0\", make_array(\"sp\", 2, \"version\", \"14.0.7197.5000\", \"kb\", \"4018362\"),\n \"15.0\", make_array(\"sp\", 1, \"version\", \"15.0.5023.1000\", \"kb\", \"4018350\"),\n \"16.0\", make_nested_list(\n make_array(\"sp\", 0, \"version\", \"16.0.4678.1000\", \"channel\", \"MSI\", \"kb\", kb16), # KB Version\n make_array(\"sp\", 0, \"version\", \"16.0.8201.2272\", \"channel\", \"Deferred\", \"kb\", kb16),\n make_array(\"sp\", 0, \"version\", \"16.0.8431.2242\", \"channel\", \"Deferred\", \"channel_version\", \"1708\", \"kb\", kb16), # Semi-Annual Channel\n make_array(\"sp\", 0, \"version\", \"16.0.9126.2152\", \"channel\", \"First Release for Deferred\", \"kb\", kb16), # Semi-Annual Channel (Targeted)\n make_array(\"sp\", 0, \"version\", \"16.0.9126.2152\", \"channel\", \"Current\", \"kb\", kb16) # Monthly Channel\n )\n);\nif (hotfix_check_office_product(product:\"Excel\", checks:excel_checks, bulletin:bulletin))\n vuln = TRUE;\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2020-09-02T12:00:42", "bulletinFamily": "info", "cvelist": ["CVE-2018-0920", "CVE-2018-1014", "CVE-2018-1030", "CVE-2018-1011", "CVE-2018-1007", "CVE-2018-1028", "CVE-2018-1026", "CVE-2018-1034", "CVE-2018-0950", "CVE-2018-1005", "CVE-2018-1032", "CVE-2018-1027", "CVE-2018-1029"], "description": "### *Detect date*:\n04/10/2018\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information and execute arbitrary code.\n\n### *Affected products*:\nMicrosoft Excel 2010 Service Pack 2 \nMicrosoft Office 2016 \nMicrosoft Excel 2013 Service Pack 1 \nMicrosoft SharePoint Enterprise Server 2013 Service Pack 1 \nMicrosoft SharePoint Enterprise Server 2016 \nMicrosoft Office 2013 Service Pack 1 \nMicrosoft Office 2016 Click-to-Run \nMicrosoft SharePoint Server 2010 Service Pack 2 \nMicrosoft Excel 2016 Click-to-Run \nMicrosoft Excel 2007 Service Pack 3 \nMicrosoft Excel 2010 Service Pack 2 \nMicrosoft Excel 2016 \nMicrosoft Excel Viewer 2007 Service Pack 3 \nMicrosoft Office Compatibility Pack Service Pack 3 \nMicrosoft Office 2016 for Mac \nMicrosoft Office 2010 Service Pack 2 \nMicrosoft Word 2007 Service Pack 3 \nMicrosoft Word 2010 Service Pack 2 \nMicrosoft Word 2013 Service Pack 1 \nMicrosoft Word 2016 \nWord Automation Services\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2018-1028](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1028>) \n[CVE-2018-0950](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0950>) \n[CVE-2018-1014](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1014>) \n[CVE-2018-1034](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1034>) \n[CVE-2018-1027](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1027>) \n[CVE-2018-1029](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1029>) \n[CVE-2018-1032](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1032>) \n[CVE-2018-1030](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1030>) \n[CVE-2018-1026](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1026>) \n[CVE-2018-1005](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1005>) \n[CVE-2018-1011](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1011>) \n[CVE-2018-1007](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1007>) \n[CVE-2018-0920](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0920>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats](<https://threats.kaspersky.com/en/product/Microsoft-Office-Compatibility-Pack-for-Word,-Excel,-and-PowerPoint-2007-File-Formats/>)\n\n### *CVE-IDS*:\n[CVE-2018-1028](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1028>)9.3Critical \n[CVE-2018-0950](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0950>)4.3Warning \n[CVE-2018-1014](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1014>)4.9Warning \n[CVE-2018-1034](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1034>)3.5Warning \n[CVE-2018-1027](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1027>)9.3Critical \n[CVE-2018-1029](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1029>)9.3Critical \n[CVE-2018-1032](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1032>)3.5Warning \n[CVE-2018-1030](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1030>)9.3Critical \n[CVE-2018-1026](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1026>)9.3Critical \n[CVE-2018-1005](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1005>)3.5Warning \n[CVE-2018-1011](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1011>)9.3Critical \n[CVE-2018-1007](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1007>)2.6Warning \n[CVE-2018-0920](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0920>)9.3Critical\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[4018355](<http://support.microsoft.com/kb/4018355>) \n[4018311](<http://support.microsoft.com/kb/4018311>) \n[4018357](<http://support.microsoft.com/kb/4018357>) \n[4018344](<http://support.microsoft.com/kb/4018344>) \n[4018341](<http://support.microsoft.com/kb/4018341>) \n[4018350](<http://support.microsoft.com/kb/4018350>) \n[4018354](<http://support.microsoft.com/kb/4018354>) \n[4018360](<http://support.microsoft.com/kb/4018360>) \n[4018362](<http://support.microsoft.com/kb/4018362>) \n[4018319](<http://support.microsoft.com/kb/4018319>) \n[4011628](<http://support.microsoft.com/kb/4011628>) \n[4018342](<http://support.microsoft.com/kb/4018342>) \n[4011586](<http://support.microsoft.com/kb/4011586>) \n[4011717](<http://support.microsoft.com/kb/4011717>) \n[4018337](<http://support.microsoft.com/kb/4018337>) \n[4011719](<http://support.microsoft.com/kb/4011719>) \n[4018339](<http://support.microsoft.com/kb/4018339>) \n[4018328](<http://support.microsoft.com/kb/4018328>) \n[4018356](<http://support.microsoft.com/kb/4018356>) \n[4011712](<http://support.microsoft.com/kb/4011712>) \n[4018359](<http://support.microsoft.com/kb/4018359>) \n[4018347](<http://support.microsoft.com/kb/4018347>) \n[4018353](<http://support.microsoft.com/kb/4018353>) \n[4018343](<http://support.microsoft.com/kb/4018343>) \n[4018336](<http://support.microsoft.com/kb/4018336>) \n[4018288](<http://support.microsoft.com/kb/4018288>) \n[4018330](<http://support.microsoft.com/kb/4018330>)", "edition": 35, "modified": "2020-05-22T00:00:00", "published": "2018-04-10T00:00:00", "id": "KLA11225", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11225", "title": "\r KLA11225Multiple vulnerabilities in Microsoft Office ", "type": "kaspersky", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "talosblog": [{"lastseen": "2018-05-15T09:08:43", "bulletinFamily": "blog", "cvelist": ["CVE-2018-0870", "CVE-2018-0887", "CVE-2018-0890", "CVE-2018-0892", "CVE-2018-0920", "CVE-2018-0950", "CVE-2018-0956", "CVE-2018-0957", "CVE-2018-0959", "CVE-2018-0960", "CVE-2018-0963", "CVE-2018-0964", "CVE-2018-0966", "CVE-2018-0967", "CVE-2018-0968", "CVE-2018-0969", "CVE-2018-0970", "CVE-2018-0971", "CVE-2018-0972", "CVE-2018-0973", "CVE-2018-0974", "CVE-2018-0975", "CVE-2018-0976", "CVE-2018-0979", "CVE-2018-0980", "CVE-2018-0981", "CVE-2018-0986", "CVE-2018-0987", "CVE-2018-0988", "CVE-2018-0989", "CVE-2018-0990", "CVE-2018-0991", "CVE-2018-0993", "CVE-2018-0994", "CVE-2018-0995", "CVE-2018-0996", "CVE-2018-0997", "CVE-2018-0998", "CVE-2018-1000", "CVE-2018-1001", "CVE-2018-1003", "CVE-2018-1004", "CVE-2018-1005", "CVE-2018-1008", "CVE-2018-1009", "CVE-2018-1010", "CVE-2018-1011", "CVE-2018-1012", "CVE-2018-1013", "CVE-2018-1014", "CVE-2018-1015", "CVE-2018-1016", "CVE-2018-1018", "CVE-2018-1019", "CVE-2018-1020", "CVE-2018-1023", "CVE-2018-1026", "CVE-2018-1027", "CVE-2018-1028", "CVE-2018-1029", "CVE-2018-1030", "CVE-2018-1032", "CVE-2018-1034"], "description": "## Microsoft Patch Tuesday - April 2018\n\n \nToday, Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month's advisory release addresses 65 new vulnerabilities and one advisory, with 25 of them rated critical, 39 of them rated important and one of them rated moderate. These vulnerabilities impact Microsoft Windows, Internet Explorer, Microsoft Edge, Microsoft Office, Windows kernel, Windows Hyper-V, Microsoft Scripting Engine and more. \n \nIn addition, an update for Adobe Flash Player was released. \n \n \n \n\n\n### Critical Vulnerabilities\n\n \nThis month, Microsoft is addressing 25 vulnerabilities that are rated \"critical\". \n \nThe vulnerabilities rated as \"critical\" are listed below: \n \n[CVE-2018-0870 - Internet Explorer Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0870>) \n[CVE-2018-0959 - Hyper-V Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0959>) \n[CVE-2018-0979 - Chakra Scripting Engine Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0979>) \n[CVE-2018-0980 - Chakra Scripting Engine Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0980>) \n[CVE-2018-0981 - Scripting Engine Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0981>) \n[CVE-2018-0986 - Microsoft Malware Protection Engine Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986>) \n[CVE-2018-0988 - Scripting Engine Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0988>) \n[CVE-2018-0990 - Chakra Scripting Engine Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0990>) \n[CVE-2018-0991 - Internet Explorer Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0991>) \n[CVE-2018-0993 - Chakra Scripting Engine Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0993>) \n[CVE-2018-0994 - Chakra Scripting Engine Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0994>) \n[CVE-2018-0995 - Chakra Scripting Engine Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0995>) \n[CVE-2018-0996 - Scripting Engine Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0996>) \n[CVE-2018-1000 - Scripting Engine Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1000>) \n[CVE-2018-1004 - Windows VBScript Engine Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1004>) \n[CVE-2018-1010 - Microsoft Graphics Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1010>) \n[CVE-2018-1012 - Microsoft Graphics Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1012>) \n[CVE-2018-1013 - Microsoft Graphics Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1013>) \n[CVE-2018-1015 - Microsoft Graphics Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1015>) \n[CVE-2018-1016 - Microsoft Graphics Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1016>) \n[CVE-2018-1018 - Internet Explorer Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1018>) \n[CVE-2018-1019 - Chakra Scripting Engine Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1019>) \n[CVE-2018-1020 - Internet Explorer Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1020>) \n[CVE-2018-1023 - Microsoft Browser Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1023>) \n[ADV180007 - Adobe Flash Player April 2018 Adobe Flash Security Update](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180007>) \n \n\n\n### Important Vulnerabilities\n\n \nThis month, Microsoft is addressing 38 vulnerabilities that are rated \"important\". Talos believes six of these are notable and require prompt attention. \n \n[CVE-2018-1011 - Microsoft Excel Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1011>) \n \nA remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs, view, change, or delete data, or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative rights. \n \n \n[CVE-2018-1026 - Microsoft Office Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1026>) \n \nA remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploits the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs, view, change, or delete data, or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. \n \n \n[CVE-2018-1027 - Microsoft Excel Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1027>) \n \nA remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. \n \n \n[CVE-2018-1028 - Microsoft Office Graphics Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1028>) \n \nA remote code execution vulnerability exists when Office graphics improperly handles specially crafted embedded fonts. An attacker who successfully exploits this vulnerability could take control of the affected system. An attacker could then install programs, view, change, or delete data, or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. \n \n \n[CVE-2018-1029 - Microsoft Excel Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1029>) \n \nA remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploits the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs, view, change, or delete data, or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. \n \n \n[CVE-2018-1030 - Microsoft Office Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1030>) \n \nA remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs, view, change, or delete data, or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. \n \n \nOther vulnerabilities deemed \"important\" are listed below: \n \n[CVE-2018-0887 - Windows Kernel Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0887>) \n[CVE-2018-0890 - Active Directory Security Feature Bypass Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0890>) \n[CVE-2018-0892 - Microsoft Edge Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0892>) \n[CVE-2018-0920 - Microsoft Excel Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0920>) \n[CVE-2018-0950 - Microsoft Office Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0950>) \n[CVE-2018-0956 - HTTP.sys Denial of Service Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0956>) \n[CVE-2018-0957 - Hyper-V Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0957>) \n[CVE-2018-0960 - Windows Kernel Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0960>) \n[CVE-2018-0963 - Windows Kernel Elevation of Privilege Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0963>) \n[CVE-2018-0964 - Hyper-V Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0964>) \n[CVE-2018-0966 - Device Guard Security Feature Bypass Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0966>) \n[CVE-2018-0967 - Windows SNMP Service Denial of Service Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0967>) \n[CVE-2018-0968 - Windows Kernel Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0968>) \n[CVE-2018-0969 - Windows Kernel Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0969>) \n[CVE-2018-0970 - Windows Kernel Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0970>) \n[CVE-2018-0971 - Windows Kernel Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0971>) \n[CVE-2018-0972 - Windows Kernel Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0972>) \n[CVE-2018-0973 - Windows Kernel Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0973>) \n[CVE-2018-0974 - Windows Kernel Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0974>) \n[CVE-2018-0975 - Windows Kernel Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0975>) \n[CVE-2018-0976 - Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0976>) \n[CVE-2018-0987 - Scripting Engine Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0987>) \n[CVE-2018-0989 - Scripting Engine Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0989>) \n[CVE-2018-0997 - Internet Explorer Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0997>) \n[CVE-2018-0998 - Microsoft Edge Information Disclosure Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0998>) \n[CVE-2018-1001 - Scripting Engine Memory Corruption Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1001>) \n[CVE-2018-1003 - Microsoft JET Database Engine Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1003>) \n[CVE-2018-1005 - Microsoft SharePoint Elevation of Privilege Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1005>) \n[CVE-2018-1008 - OpenType Font Driver Elevation of Privilege Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1008>) \n[CVE-2018-1009 - Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1009>) \n[CVE-2018-1014 - Microsoft SharePoint Elevation of Privilege Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1014>) \n[CVE-2018-1032 - Microsoft SharePoint Elevation of Privilege Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1032>) \n[CVE-2018-1034 - Microsoft SharePoint Elevation of Privilege Vulnerability](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1034>) \n \n\n\n### Coverage\n\nIn response to these vulnerability disclosures, Talos is releasing the following Snort rules that detect attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org. \n \nSnort Rules: \n \n45628-45629 \n46163-46164 \n46176-46189 \n46192-46201 \n46204-46209 \n46212-46215 \n46218-36221 \n46226-46231 \n46233-46234 \n46243-46246 \n \n \n\n\n[](<http://feeds.feedburner.com/~ff/feedburner/Talos?a=9g_k4lM7D5g:n7sgYiCfxlI:yIl2AUoC8zA>)\n\n", "modified": "2018-04-10T22:53:51", "published": "2018-04-10T13:13:00", "id": "TALOSBLOG:76829FABFE02C32CB6E07FE9D9A8F09B", "href": "http://feedproxy.google.com/~r/feedburner/Talos/~3/9g_k4lM7D5g/ms-tuesday.html", "type": "talosblog", "title": "Microsoft Patch Tuesday - April 2018", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "trendmicroblog": [{"lastseen": "2018-04-17T16:24:56", "bulletinFamily": "blog", "cvelist": ["CVE-2018-0870", "CVE-2018-0871", "CVE-2018-0887", "CVE-2018-0890", "CVE-2018-0892", "CVE-2018-0920", "CVE-2018-0950", "CVE-2018-0956", "CVE-2018-0957", "CVE-2018-0960", "CVE-2018-0963", "CVE-2018-0964", "CVE-2018-0966", "CVE-2018-0967", "CVE-2018-0968", "CVE-2018-0969", "CVE-2018-0970", "CVE-2018-0971", "CVE-2018-0972", "CVE-2018-0973", "CVE-2018-0974", "CVE-2018-0975", "CVE-2018-0976", "CVE-2018-0979", "CVE-2018-0980", "CVE-2018-0981", "CVE-2018-0986", "CVE-2018-0987", "CVE-2018-0988", "CVE-2018-0989", "CVE-2018-0990", "CVE-2018-0991", "CVE-2018-0993", "CVE-2018-0994", "CVE-2018-0995", "CVE-2018-0996", "CVE-2018-0997", "CVE-2018-0998", "CVE-2018-1000", "CVE-2018-1001", "CVE-2018-1002", "CVE-2018-1003", "CVE-2018-1004", "CVE-2018-1005", "CVE-2018-1007", "CVE-2018-1008", "CVE-2018-1009", "CVE-2018-1010", "CVE-2018-1011", "CVE-2018-1012", "CVE-2018-1013", "CVE-2018-1014", "CVE-2018-1015", "CVE-2018-1016", "CVE-2018-1018", "CVE-2018-1019", "CVE-2018-1020", "CVE-2018-1022", "CVE-2018-1023", "CVE-2018-1026", "CVE-2018-1027", "CVE-2018-1028", "CVE-2018-1029", "CVE-2018-1030", "CVE-2018-1032", "CVE-2018-1034", "CVE-2018-1037", "CVE-2018-8116", "CVE-2018-8117"], "description": "\n\nThe interviewing process can be mentally draining. You have to look your best, say the right things, and prove that you\u2019re the best person for the job. When I interview candidates, I love to come up with the one crazy question that isn\u2019t on the usual list of questions that might be asked. I probably won\u2019t be able to use it now since I\u2019m going to disclose it here, but here goes: \u201cIf you were a tree, what type of tree would you be and why?\u201d I don\u2019t expect candidates to be experts in forestry or dendrology because there is no right or wrong answer, but I do like to hear what people can come up with off the top of their head. If you think that question is weird, how about this one? \u201cIs it ever possible that (a== 1 && a ==2 && a==3) could evaluate to true in JavaScript?\u201d Jasiel Spelman from our Zero Day Initiative came across this question on a post he read that is being asked during interviews at major tech firms. He takes a stab at answering the question in his latest blog: Inverting Your Assumptions: A Guide to JIT Comparisons. You can read it here: <https://www.zerodayinitiative.com/blog/2018/4/12/inverting-your-assumptions-a-guide-to-jit-comparisons>. **Microsoft Security Updates** There are seven new zero-day filters covering four vendors in this week\u2019s Digital Vaccine (DV) package. Microsoft released 67 security patches covering Internet Explorer (IE), Edge, ChakraCore, Windows, Visual Studio, Microsoft Office and Office Services and Web Apps, and the Malware Protection Engine. Of these 67 CVEs, 24 are listed as Critical, 42 are rated Important, and one is listed as Moderate in severity. Seven of these CVEs came through the ZDI program. The following table maps Digital Vaccine filters to the Microsoft updates. You can get more detailed information on this month\u2019s security updates from Dustin Childs\u2019 [April 2018 Security Update Review](<https://www.zerodayinitiative.com/blog/2018/4/10/the-april-2018-security-update-review>) from the Zero Day Initiative: \n\n**CVE #** | **Digital Vaccine Filter #** | **Status** \n---|---|--- \nCVE-2018-0870 | 31038 | \nCVE-2018-0871 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0887 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0890 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0892 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0920 | 31039 | \nCVE-2018-0950 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0956 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0957 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0960 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0963 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0964 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0966 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0967 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0968 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0969 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0970 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0971 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0972 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0973 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0974 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0975 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0976 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0979 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0980 | 31040 | \nCVE-2018-0981 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0986 | 31136 | \nCVE-2018-0987 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0988 | 31041 | \nCVE-2018-0989 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-0990 | 31061 | \nCVE-2018-0991 | 31061 | \nCVE-2018-0993 | 31043 | \nCVE-2018-0994 | 31044 | \nCVE-2018-0995 | 31060 | \nCVE-2018-0996 | 31069 | \nCVE-2018-0997 | 31076 | \nCVE-2018-0998 | 31077 | \nCVE-2018-1000 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1001 | 31075 | \nCVE-2018-1002 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1003 | 31079 | \nCVE-2018-1004 | 31080 | \nCVE-2018-1005 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1007 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1008 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1009 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1010 | 31081 | \nCVE-2018-1011 | 31074 | \nCVE-2018-1012 | 31072 | \nCVE-2018-1013 | 31070 | \nCVE-2018-1014 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1015 | 31067 | \nCVE-2018-1016 | 31064 | \nCVE-2018-1018 | 31060 | \nCVE-2018-1019 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1020 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1022 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1023 | 31062 | \nCVE-2018-1026 | 31063 | \nCVE-2018-1027 | 31066 | \nCVE-2018-1028 | 31073 | \nCVE-2018-1029 | 31068 | \nCVE-2018-1030 | 31071 | \nCVE-2018-1032 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1034 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-1037 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8116 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2018-8117 | | Vendor Deemed Reproducibility or Exploitation Unlikely \n \n**Zero-Day Filters** There are nine new zero-day filters covering five vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of [published advisories](<http://www.zerodayinitiative.com/advisories/published/>) and [upcoming advisories](<http://www.zerodayinitiative.com/advisories/upcoming/>) on the [Zero Day Initiative](<http://www.zerodayinitiative.com/>) website. You can also follow the Zero Day Initiative on Twitter [@thezdi](<https://twitter.com/thezdi>) and on their [blog](<https://www.zerodayinitiative.com/blog>).\n\n**_Apple (2)_**\n\n \n\n | \n\n * 31139: ZDI-CAN-5525: Zero Day Initiative Vulnerability (Apple Safari)\n * 31141: ZDI-CAN-5526: Zero Day Initiative Vulnerability (Apple Safari) \n---|--- \n| \n \n**_Foxit (3)_**\n\n| \n\n * 31143: ZDI-CAN-5527: Zero Day Initiative Vulnerability (Foxit Reader)\n * 31145: ZDI-CAN-5528,5331: Zero Day Initiative Vulnerability (Foxit Reader)\n * 31146: ZDI-CAN-5529: Zero Day Initiative Vulnerability (Foxit Reader) \n---|--- \n| \n \n**_Hewlett Packard (2)_**\n\n| \n\n * 30919: HTTP: HP Application Lifecycle Management ActiveX Insecure Method Exposure Vulnerability(ZDI-12-170)\n * 31036: HTTPS: HP iNode Management Center iNodeMngChecker.exe Buffer Overflow Vulnerability (ZDI-11-232) \n---|--- \n| \n \n**_Microsoft (1)_**\n\n| \n\n * 31048: HTTP: Microsoft Office Excel XLSX File Memory Corruption Vulnerability (ZDI-10-025) \n---|--- \n| \n \n**_Trend Micro (1)_**\n\n| \n\n * 31147: ZDI-CAN-5533,5534: Zero Day Initiative Vulnerability (Trend Micro Encryption for Email Gateway) \n---|--- \n| \n \n**Missed Last Week\u2019s News?** Catch up on last week\u2019s news in my [weekly recap](<https://blog.trendmicro.com/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-april-2-2018/>).\n\nThe post [TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of April 9, 2018](<https://blog.trendmicro.com/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-april-9-2018/>) appeared first on [](<https://blog.trendmicro.com>).", "modified": "2018-04-13T15:37:14", "published": "2018-04-13T15:37:14", "id": "TRENDMICROBLOG:CA6E4ACCDF2EEC642B7D6E90848F2DB0", "href": "https://blog.trendmicro.com/tippingpoint-threat-intelligence-and-zero-day-coverage-week-of-april-9-2018/", "type": "trendmicroblog", "title": "TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of April 9, 2018", "cvss": {"score": 0.0, "vector": "NONE"}}]}