{"prion": [{"lastseen": "2023-08-16T04:51:57", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31206, CVE-2021-34473.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-14T18:15:00", "type": "prion", "title": "CVE-2021-31196", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-34473"], "modified": "2021-07-17T03:31:00", "id": "PRION:CVE-2021-31196", "href": "https://kb.prio-n.com/vulnerability/CVE-2021-31196", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-08-16T04:52:14", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-34473.", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.0, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-07-14T18:15:00", "type": "prion", "title": "CVE-2021-31206", "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 5.5, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.9, "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-34473"], "modified": "2021-09-20T12:20:00", "id": "PRION:CVE-2021-31206", "href": "https://kb.prio-n.com/vulnerability/CVE-2021-31206", "cvss": {"score": 7.9, "vector": "AV:A/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-08-16T05:58:10", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-14T18:15:00", "type": "prion", "title": "CVE-2021-34473", "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-34473"], "modified": "2022-07-12T17:42:00", "id": "PRION:CVE-2021-34473", "href": "https://kb.prio-n.com/vulnerability/CVE-2021-34473", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "mscve": [{"lastseen": "2023-06-14T15:25:29", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T07:00:00", "type": "mscve", "title": "Microsoft Exchange Server Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-34473"], "modified": "2021-07-13T07:00:00", "id": "MS:CVE-2021-34473", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-14T15:25:37", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31206, CVE-2021-34473.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T07:00:00", "type": "mscve", "title": "Microsoft Exchange Server Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-34473"], "modified": "2021-07-13T07:00:00", "id": "MS:CVE-2021-31196", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31196", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-14T15:25:37", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-34473.", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.0, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-07-13T07:00:00", "type": "mscve", "title": "Microsoft Exchange Server Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 5.5, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.9, "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-34473"], "modified": "2021-07-13T07:00:00", "id": "MS:CVE-2021-31206", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31206", "cvss": {"score": 7.9, "vector": "AV:A/AC:M/Au:N/C:C/I:C/A:C"}}], "attackerkb": [{"lastseen": "2023-07-21T23:18:13", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-34473.\n\n \n**Recent assessments:** \n \n**NinjaOperator** at July 14, 2021 7:15pm UTC reported:\n\nThis remote code execution (RCE) vulnerability affects Microsoft Exchange Server 2013/ CU23/2016 CU20/2016 CU21/2019 CU10. \nAnd according to FireEye exploit code is available. \nI will share more information once MSFT releases more details\n\nAssessed Attacker Value: 0 \nAssessed Attacker Value: 0Assessed Attacker Value: 0\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-14T00:00:00", "type": "attackerkb", "title": "CVE-2021-31206", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-34473"], "modified": "2021-09-21T00:00:00", "id": "AKB:C4CD066B-E590-48F0-96A7-FFFAFC3D23CC", "href": "https://attackerkb.com/topics/oAhIZujU2O/cve-2021-31206", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-05-27T17:21:09", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206.\n\n \n**Recent assessments:** \n \n**gwillcox-r7** at July 14, 2021 5:15pm UTC reported:\n\nFrom <https://blog.talosintelligence.com/2021/07/microsoft-patch-tuesday-for-july-2021.html> there was a note that this vulnerability seems to have been used in some Exchange Server APT attacks detailed at <https://blog.talosintelligence.com/2021/03/hafnium-update.html> however it wasn\u2019t disclosed that this vulnerability was patched despite being patched back in April 2021. Since this was under active exploitation it is recommended to patch this vulnerability if you haven\u2019t applied April 2021\u2019s patch updates already.\n\nSuccessful exploitation will result in RCE on affected Exchange Servers, and requires no prior user privileges, so patch this soon!\n\nAssessed Attacker Value: 5 \nAssessed Attacker Value: 5Assessed Attacker Value: 3\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-14T00:00:00", "type": "attackerkb", "title": "CVE-2021-34473", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-34473"], "modified": "2021-07-20T00:00:00", "id": "AKB:BDCF4DDE-714E-40C0-B4D9-2B4ECBAD31FF", "href": "https://attackerkb.com/topics/pUK1MXLZkW/cve-2021-34473", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-08-07T00:04:03", "description": "ProxyShell is an exploit chain targeting on-premise installations of Microsoft Exchange Server. It was demonstrated by Orange Tsai at Pwn2Own in April 2021 and is comprised of three CVEs that, when chained, allow a remote unauthenticated attacker to execute arbitrary code on vulnerable targets. The three CVEs are CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207.\n\nDetails are available in Orange Tsai\u2019s [Black Hat USA 2020 talk](<https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-ProxyLogon-Is-Just-The-Tip-Of-The-Iceberg-A-New-Attack-Surface-On-Microsoft-Exchange-Server.pdf>) and follow-on [blog series](<https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html>). ProxyShell is being broadly exploited in the wild as of August 12, 2021.\n\n \n**Recent assessments:** \n \n**ccondon-r7** at August 12, 2021 9:19pm UTC reported:\n\nCheck out the [Rapid7 analysis](<https://attackerkb.com/topics/xbr3tcCFT3/proxyshell-exploit-chain/rapid7-analysis>) for details on the exploit chain. Seems like a lot of the PoC implementations so far are using admin mailboxes, but I\u2019d imagine folks are going to start finding ways around that soon.\n\nAssessed Attacker Value: 5 \nAssessed Attacker Value: 5Assessed Attacker Value: 4\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-08-20T00:00:00", "type": "attackerkb", "title": "ProxyShell Exploit Chain", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523"], "modified": "2021-08-20T00:00:00", "id": "AKB:116FDAE6-8C6E-473E-8D39-247560D01C09", "href": "https://attackerkb.com/topics/xbr3tcCFT3/proxyshell-exploit-chain", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2023-05-27T14:42:09", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31206, CVE-2021-34473.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-14T18:15:00", "type": "cve", "title": "CVE-2021-31196", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-34473"], "modified": "2021-07-17T03:31:00", "cpe": ["cpe:/a:microsoft:exchange_server:2016", "cpe:/a:microsoft:exchange_server:2013", "cpe:/a:microsoft:exchange_server:2019"], "id": "CVE-2021-31196", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31196", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_21:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_10:*:*:*:*:*:*"]}, {"lastseen": "2023-05-27T14:42:10", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-34473.", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.0, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-07-14T18:15:00", "type": "cve", "title": "CVE-2021-31206", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 5.5, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.9, "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-34473"], "modified": "2021-09-20T12:20:00", "cpe": ["cpe:/a:microsoft:exchange_server:2016", "cpe:/a:microsoft:exchange_server:2013", "cpe:/a:microsoft:exchange_server:2019"], "id": "CVE-2021-31206", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31206", "cvss": {"score": 7.9, "vector": "AV:A/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_21:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_10:*:*:*:*:*:*"]}], "zdi": [{"lastseen": "2023-05-23T15:49:57", "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Autodiscover service. The issue results from the lack of proper validation of URI prior to accessing resources. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-19T00:00:00", "type": "zdi", "title": "(Pwn2Own) Microsoft Exchange Server Autodiscover Server Side Request Forgery Authentication Bypass Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-34473"], "modified": "2021-07-19T00:00:00", "id": "ZDI-21-821", "href": "https://www.zerodayinitiative.com/advisories/ZDI-21-821/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-05-27T15:47:57", "description": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Microsoft Exchange Server. User interaction is required to exploit this vulnerability. The specific flaw exists within the parsing of CAB files. When handling filenames specified within a CAB file, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM.", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.0, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-07-19T00:00:00", "type": "zdi", "title": "(Pwn2Own) Microsoft Exchange Server CabUtility ExtractCab Directory Traversal Remote Code Execution Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 5.5, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.9, "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31206"], "modified": "2021-07-19T00:00:00", "id": "ZDI-21-826", "href": "https://www.zerodayinitiative.com/advisories/ZDI-21-826/", "cvss": {"score": 7.9, "vector": "AV:A/AC:M/Au:N/C:C/I:C/A:C"}}], "githubexploit": [{"lastseen": "2022-08-17T22:52:28", "description": "# CVE-2021-34473-scanner\nScanner for CVE-2021-34473, ProxyShell,...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-08-11T12:20:07", "type": "githubexploit", "title": "Exploit for Server-Side Request Forgery in Microsoft", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-34473"], "modified": "2021-12-22T09:48:36", "id": "F00E8BE4-12D2-5F5B-A9AA-D627780259FB", "href": "", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "privateArea": 1}, {"lastseen": "2022-08-10T07:09:52", "description": "# CVE-2021-34473\nCVE-2021-34473 Microsoft Exchange Server Remote...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-08-16T11:27:13", "type": "githubexploit", "title": "Exploit for Server-Side Request Forgery in Microsoft", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-34473"], "modified": "2022-08-10T06:53:56", "id": "4AC49DB9-A784-561B-BF92-94209310B51B", "href": "", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "privateArea": 1}, {"lastseen": "2023-05-23T17:18:33", "description": "# CVE-2021-34473-NMAP-SCANNER\nA massive scanner for CVE-2021-344...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-11-16T08:22:29", "type": "githubexploit", "title": "Exploit for Server-Side Request Forgery in Microsoft", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-34473"], "modified": "2023-05-06T05:33:04", "id": "2BEFA353-947D-5B41-AE38-EDB0C71B5B44", "href": "", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "privateArea": 1}, {"lastseen": "2023-09-17T02:33:27", "description": "- python send_webshell_mail.py https://mail16.echod.com aaa@echo...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-11-22T07:47:09", "type": "githubexploit", "title": "Exploit for Server-Side Request Forgery in Microsoft", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-34473"], "modified": "2023-09-16T21:49:11", "id": "0A015784-48D7-5DC1-9FB9-416A9BBEA6D5", "href": "", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "privateArea": 1}, {"lastseen": "2022-03-12T14:43:07", "description": "# ProxyShell_POC\nPOC for ...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-10-02T07:29:24", "type": "githubexploit", "title": "Exploit for Vulnerability in Microsoft", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-34523", "CVE-2021-31207", "CVE-2021-34473"], "modified": "2022-03-12T13:42:54", "id": "E458F533-4B97-51A1-897B-1AF58218F2BF", "href": "", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "privateArea": 1}, {"lastseen": "2022-03-03T01:31:20", "description": "# Proxyshell-Scanner\nnuclei scanner for Proxyshell RCE (CVE-2021...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-08-10T15:01:02", "type": "githubexploit", "title": "Exploit for Vulnerability in Microsoft", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34423"], "modified": "2022-03-02T12:56:33", "id": "B3DDE0DD-F0B0-542D-8154-F61DCD2E49D9", "href": "", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "privateArea": 1}, {"lastseen": "2022-03-23T19:01:02", "description": "# ProxyShell\nProof of Concept Exploit for Microsoft Exchange CVE...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-09-04T15:34:03", "type": "githubexploit", "title": "Exploit for Vulnerability in Microsoft", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523"], "modified": "2022-03-23T18:03:46", "id": "2D0AC1C7-F656-5D6B-9FC2-79525014BE1E", "href": "", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "privateArea": 1}, {"lastseen": "2022-04-05T16:21:50", "description": "# Log4j Threat Hunting and Incident Response Resources\n\n## Lates...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 10.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2022-01-09T08:22:24", "type": "githubexploit", "title": "Exploit for Deserialization of Untrusted Data in Apache Log4J", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-26084", "CVE-2021-34473", "CVE-2021-44228"], "modified": "2022-01-10T19:21:49", "id": "3DF3AA17-94C8-5E17-BCB8-F806D1746CDF", "href": "", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "privateArea": 1}, {"lastseen": "2022-03-23T18:18:47", "description": "# Contains Custom NSE scripts \n\n\n# CVE-2020-0796\nNSE script to d...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 10.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2020-03-11T17:51:29", "type": "githubexploit", "title": "Exploit for Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-0796", "CVE-2020-1350", "CVE-2021-21972", "CVE-2021-21973", "CVE-2021-34473"], "modified": "2022-03-23T17:15:09", "id": "F14BCE6F-3415-59C7-AC9D-A5D7ABE1BB8E", "href": "", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "privateArea": 1}], "cisa_kev": [{"lastseen": "2023-07-21T17:22:44", "description": "Microsoft Exchange Server contains an unspecified vulnerability that allows for remote code execution.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-11-03T00:00:00", "type": "cisa_kev", "title": "Microsoft Exchange Server Remote Code Execution Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-34473"], "modified": "2021-11-03T00:00:00", "id": "CISA-KEV-CVE-2021-34473", "href": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "hivepro": [{"lastseen": "2021-11-18T13:20:19", "description": "#### THREAT LEVEL: Red.\n\nFor a detailed advisory, [download the pdf file here.](<https://www.hivepro.com/wp-content/uploads/2021/11/MuddyWater-is-taking-advantage-of-old-vulnerabilities_TA202149.pdf>)[](<https://docs.google.com/viewer?url=https%3A%2F%2Fwww.hivepro.com%2Fwp-content%2Fuploads%2F2021%2F11%2FA-zero-day-vulnerability-has-been-discovered-in-PANs-GlobalProtect-firewall_TA202148-1.pdf&embedded=true&chrome=false&dov=1> \"View this pdf file\" )\n\nThe Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), and the United Kingdom's National Cyber Security Centre (NCSC) have issued a joint advisory to warn organizations about an APT State sponsored Actor exploiting old Fortinet and proxyshell vulnerabilities. \nSince late March 2021, this APT Iranian State sponsored Actor (MuddyWater) has been breaching vulnerable networks by exploiting Fortinet vulnerabilities. The Hive Pro threat Research team has issued a detailed and in [depth](<https://www.hivepro.com/old-fortinet-vulnerabilities-exploited-by-state-sponsored-actors/>) advisory for the same. \nNow, in October 2021, MuddyWater is getting initial access to the susceptible system by exploiting the well known ProxyShell Vulnerability (CVE 2021 34473). \nIt is recommended that organizations patch these vulnerabilities as soon as available. \nThe Tactics and Techniques used by MuddyWater are: \nTA0042 - Resource Development \nT1588.001 - Obtain Capabilities: Malware \nT1588.002 - Obtain Capabilities: Tool \nTA0001 - Initial Access \nT1190 - Exploit Public Facing Application \nTA0002 - Execution \nT1053.005 - Scheduled Task/Job: Scheduled Task \nTA0003 - Persistence \nT1136.001 - Create Account: Local Account \nT1136.002 - Create Account: Domain Account \nTA0004 - Privilege Escalation \nTA0006 - Credential Access \nTA0009 - Collection \nT1560.001 - Archive Collected Data: Archive via Utility \nTA0010 - Exfiltration \nTA0040 - Impact \nT1486 - Data Encrypted for Impact\n\n#### Actor Details\n\n\n\n#### Vulnerability Details\n\n\n\n#### Indicators of Compromise (IoCs)\n\n\n\n#### Patch Link\n\n<https://kb.fortinet.com/kb/documentLink.do?externalID=FD37033>\n\n<http://www.securityfocus.com/bid/108693>\n\n<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473>\n\n#### References\n\n<https://us-cert.cisa.gov/ncas/alerts/aa21-321a>", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-11-18T11:45:32", "type": "hivepro", "title": "MuddyWater is taking advantage of old vulnerabilities", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-34473"], "modified": "2021-11-18T11:45:32", "id": "HIVEPRO:186D6EE394314F861D57F4243E31E975", "href": "https://www.hivepro.com/muddywater-is-taking-advantage-of-old-vulnerabilities/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-03-24T14:24:49", "description": "THREAT LEVEL: Red. For a detailed advisory, download the pdf file here Federal Bureau of Investigation and Cybersecurity and Infrastructure Security Agency released threat advisories on AvosLocker Ransomware. It is a Ransomware as a Service (RaaS) affiliate-based group that has targeted 50+ organizations in critical infrastructure sectors such as financial services, manufacturing plants, and government facilities in countries such as the United States, Saudi Arabia, the United Kingdom, Germany, Spain, and the United Arab Emirates, among others. After it's affiliates infect targets, AvosLocker claims to handle ransom negotiations, as well as the publishing and hosting of exfiltrated victim data. The AvosLocker ransomware is a multi-threaded C++ Windows executable that operates as a console application and displays a log of actions performed on victim computers. For the delivery of the ransomware payload, the attackers use spam email campaigns as the initial infection vector. The threat actors exploits Proxy Shell vulnerabilities CVE-2021-31206, CVE-2021-31207, CVE-2021-34523, and CVE-2021-34473, as well as CVE-2021-26855 to gain access to victim\u2019s machine and then they deploy Mimikatz to steal passwords. Furthermore, threat actors can use the detected credentials to get RDP access to the domain controller and then exfiltrate data from the compromised machine. Finally, the attacker installs AvosLocker ransomware on the victim's computer and then encrypts the victim's documents and files with the ".avos" extension. The actor then leaves a ransom letter in each directory named "GET YOUR FILES BACK.txt" with a link to an AvosLocker .onion payment site. The Organizations can mitigate the risk by following the recommendations: \u2022Keep all operating systems and software up to date. \u2022Remove unnecessary access to administrative shares. \u2022Maintain offline backups of data and Ensure all backup data is encrypted and immutable. The MITRE TTPs commonly used by Avoslocker are: TA0001: Initial AccessTA0002: ExecutionTA0007: DiscoveryTA0040: ImpactT1566: PhishingT1204: User ExecutionT1082: System Information DiscoveryT1490: Inhibit System RecoveryT1489: Service StopT1486: Data Encrypted for Impact Actor Detail Vulnerability Details Indicators of Compromise (IoCs) Patches https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31206 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31207 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34523 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26855 Recent Breaches https://www.unical.com/ https://www.paccity.net/ https://www.gigabyte.com/ Reference https://www.cisa.gov/uscert/ncas/current-activity/2022/03/22/fbi-and-fincen-release-advisory-avoslocker-ransomware", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-03-24T06:30:44", "type": "hivepro", "title": "AvosLocker Ransomware group has targeted 50+ Organizations Worldwide", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-26855", "CVE-2021-31206", "CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523"], "modified": "2022-03-24T06:30:44", "id": "HIVEPRO:92FF0246065B21E79C7D8C800F2DED76", "href": "https://www.hivepro.com/avoslocker-ransomware-group-has-targeted-50-organizations-worldwide/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-03-25T05:32:31", "description": "THREAT LEVEL: Red. For a detailed advisory, download the pdf file here APT35 aka Magic Hound, an Iranian-backed threat group, has begun using Microsoft Exchange ProxyShell vulnerabilities as an initial attack vector and to execute code through multiple web shells. The group has primarily targeted organizations in the energy, government, and technology sectors based in the United States, the United Kingdom, Saudi Arabia, and the United Arab Emirates, among other countries. The threat actor exploits the Microsoft Exchange ProxyShell vulnerabilities (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207) to gain initial access to create web shells and disable antivirus services on the victim\u2019s system. To gain persistence in the environment, the threat actor employs both account creation and scheduled tasks. For future re-entry, the account is added to the "remote desktop users" and "local administrator's users" groups. The threat actors use PowerShell to issue multiple commands to disable Windows Defender. Then they create a process memory dump from LSASS.exe that is zipped before exfiltration via web shell. The threat actor uses native Windows programs like "net" and "ipconfig" to enumerate the compromised server. A file masquerading as dllhost.exe is used to access certain domains for command and control. Therefore, data can be exfiltrated by the threat actor which could potentially resulting in information theft and espionage. The Microsoft Exchange ProxyShell vulnerabilities have been fixed in the latest updates from Microsoft. Organizations can patch these vulnerabilities using the patch links given below. The MITRE TTPs commonly used by APT35 are: TA0001: Initial AccessTA0002: ExecutionTA0003: PersistenceTA0004: Privilege EscalationTA0005: Defense EvasionTA0006: Credential AccessTA0007: DiscoveryTA0011: Command and ControlT1190: Exploit Public-Facing ApplicationT1003: OS Credential DumpingT1098: Account ManipulationT1078: Valid AccountsT1105: Ingress Tool TransferT1036: MasqueradingT1036.005: Masquerading: Match Legitimate Name or LocationT1543: Create or Modify System ProcessT1543.003: Create or Modify System Process: Windows ServiceT1505: Server Software ComponentT1505.003: Server Software Component: Web ShellT1082: System Information DiscoveryT1016: System Network Configuration DiscoveryT1033: System Owner/User DiscoveryT1059: Command and Scripting InterpreterT1059.003: Command and Scripting Interpreter: Windows Command Shell Actor Details Vulnerability Details Indicators of Compromise (IoCs) Patches https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31207 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34523 References https://thedfirreport.com/2022/03/21/apt35-automates-initial-access-using-proxyshell/", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-03-25T04:05:09", "type": "hivepro", "title": "Magic Hound Exploiting Old Microsoft Exchange ProxyShell Vulnerabilities", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523"], "modified": "2022-03-25T04:05:09", "id": "HIVEPRO:DB06BB609FE1B4E7C95CDC5CB2A38B28", "href": "https://www.hivepro.com/magic-hound-exploiting-old-microsoft-exchange-proxyshell-vulnerabilities/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-07T15:20:43", "description": "#### THREAT LEVEL: Red.\n\n \n\nFor a detailed advisory, [download the pdf file here.](<https://www.hivepro.com/wp-content/uploads/2021/12/BlackByte-ransomware-exploits-Microsoft-Servers-ProxyShell-vulnerabilities_TA202155.pdf>)\n\nBlackByte ransomware is targeting organizations with unpatched ProxyShell vulnerabilities. Proxy Shell was addressed by hive pro threat researcher in the previous [advisory](<https://www.hivepro.com/proxyshell-and-petitpotam-exploits-weaponized-by-lockfile-ransomware-group/>) released on August 24.\n\nProxyShell is a combination of three flaws in Microsoft Exchange:\n\nCVE-2021-34473 Pre-auth path confusion vulnerability to bypass access control. \nCVE-2021-34523 Privilege escalation vulnerability in the Exchange PowerShell backend. \nCVE-2021-31207 Post-auth remote code execution via arbitrary file write.\n\nThese security flaws are used together by threat actors to perform unauthenticated, remote code execution on vulnerable servers. After exploiting these vulnerabilities, the threat actors then install web shells, coin miners, ransomwares or backdoors on the servers. Attackers then use this web shell to deploy cobalt strike beacon into Windows Update Agent and get the credentials for a service account on compromised servers. The actor then installs Anydesk to gain control of the system and do lateral movement in the organization network. Post exploitation, attackers carry on with using Cobalt Strike to execute the Blackbyte ransomware and encrypt the data.\n\nAffected organizations can decrypt their files using a free decryption tool written by [Trustwave](<https://github.com/SpiderLabs/BlackByteDecryptor>). Users can patch their server for ProxyShell vulnerabilities using the link down below.\n\n**Techniques used by Blackbyte ransomware are :**\n\nT1505.003 Server Software Component: Web Shell \nT1055 Process Injection \nT1059.001 Command and Scripting Interpreter: PowerShell \nT1595.002 Active Scanning: Vulnerability Scanning \nT1027 Obfuscated Files of Information \nT1490 Inhibit System Recovery \nT1112 Modify Registry \nT1562.001 Impair Defenses: Disable or Modify Tools \nT1562.004 Impair Defenses: Disable or Modify System Firewall \nT1018 Remote System Discovery \nT1016 System Network Configuration Discovery \nT1070.004 Indicator Removal on Host: File Deletion \nT1560.001 Archive Collected Data: Archive via Utility\n\n[](<https://docs.google.com/viewer?url=https%3A%2F%2Fwww.hivepro.com%2Fwp-content%2Fuploads%2F2021%2F12%2FMicrosoft-could-not-patch-this-vulnerability-yet-again_TA202153.pdf&embedded=true&chrome=false&dov=1> \"View this pdf file\" )\n\n \n\n#### Vulnerability Details\n\n \n\n\n\n \n\n#### Actor Detail\n\n \n\n\n\n \n\n#### Indicators of Compromise(IoCs)\n\n \n\n\n\n \n\n#### Patch Link\n\n<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473>\n\n<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523>\n\n<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207>\n\n \n\n#### References\n\n<https://redcanary.com/blog/blackbyte-ransomware/>\n\n<https://www.techtarget.com/searchsecurity/news/252510334/BlackByte-ransomware-attacks-exploiting-ProxyShell-flaws>\n\n<https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackbyte-ransomware/>\n\n<https://www.stellarinfo.com/blog/blackbyte-ransomware-attacks-exchange-servers-with-proxyshell-flaws/>", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-12-07T13:24:49", "type": "hivepro", "title": "BlackByte ransomware exploits Microsoft Servers ProxyShell Vulnerabilities", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523"], "modified": "2021-12-07T13:24:49", "id": "HIVEPRO:10B372979ED5F121D7A84FB66487023E", "href": "https://www.hivepro.com/blackbyte-ransomware-exploits-microsoft-servers-proxyshell-vulnerabilities/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-04-22T15:39:16", "description": "THREAT LEVEL: Red. For a detailed advisory, download the pdf file here Hive Ransomware has been active since its discovery in June 2021, and it is constantly deploying different backdoors, including the Cobalt Strike beacon, on Microsoft Exchange servers that are vulnerable to ProxyShell (CVE-2021-31207, CVE-2021-34473 and CVE-2021-34523) security flaws. The threat actors then conduct network reconnaissance, obtain admin account credentials, and exfiltrate valuable data before deploying the file-encrypting payload. Hive and their affiliates access their victims' networks by a variety of methods, including phishing emails with malicious attachments, compromised VPN passwords, and exploiting weaknesses on external-facing assets. Furthermore, Hive leaves a plain-text ransom letter threatening to disclose the victim's data on the TOR website 'HiveLeaks' if the victim does not meet the attacker's terms. The Organizations can mitigate the risk by following the recommendations: \u2022Use multi-factor authentication. \u2022Keep all operating systems and software up to date. \u2022Remove unnecessary access to administrative shares. \u2022Maintain offline backups of data and Ensure all backup data is encrypted and immutable. \u2022Enable protected files in the Windows Operating System for critical files. The MITRE ATT&CK TTPs used by Hive Ransomware are: TA0001: Initial Access TA0002: Execution TA0003: Persistence TA0004: Privilege Escalation TA0005: Defense Evasion TA0006: Credential Access TA0007: Discovery TA0008: Lateral Movement TA0009: Collection TA0011: Command and ControlTA0010: Exfiltration TA0040: ImpactT1190: Exploit Public-Facing ApplicationT1566: PhishingT1566.001: Spear-phishing attachmentT1106: Native APIT1204: User ExecutionT1204.002: Malicious FileT1059: Command and Scripting InterpreterT1059.001: PowerShellT1059.003: Windows Command ShellT1053: Scheduled Task/JobT1053.005: Scheduled TaskT1047: Windows Management InstrumentT1136: Create AccountT1136.002: Domain AccountT1078: Valid AccountsT1078.002: Domain AccountsT1053: Boot or logon autostart executionT1068: Exploitation for Privilege EscalationT1140: Deobfuscate/Decode Files or InformationT1070: Indicator Removal on Host T1070.001: Clear Windows Event LogsT1562: Impair DefensesT1562.001: Disable or Modify ToolsT1003: OS Credential DumpingT1003.005: Cached Domain Credentials|T1018: Remote System DiscoveryT1021: Remote ServicesT1021.001: Remote Desktop ProtocolT1021.002: SMB/Windows admin sharesT1021.006: Windows Remote ManagementT1083: File and directory discoveryT1057: Process discoveryT1063: Security software discoveryT1049: System Network Connections DiscoveryT1135: Network Share DiscoveryT1071: Application Layer ProtocolT1071.001: Web ProtocolsT1570: Lateral tool transfer1486: Data Encrypted for ImpactT1005: Data from local systemT1560: Archive Collected DataT1560.001: Archive via UtilityT1105: Ingress Tool TransferT1567: Exfiltration over web service Actor Details Vulnerability Details Indicators of Compromise (IoCs) Recent Breaches https://millsgrouponline.com/ https://www.fcch.com/ https://www.konradin.de/de/ https://www.pollmann.at/en https://www.emilfrey.ch/de https://rte.com.br/ https://www.friedrich.com/ https://powerhouse1.com/ https://www.hshi.co.kr/eng/ https://www.eurocoininteractive.nl/ https://www.itsinfocom.com/ https://www.pan-energy.com/ https://nsminc.com/ https://www.ucsiuniversity.edu.my/ https://kemlu.go.id/portal/id Patch Links https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207 References https://www.varonis.com/blog/hive-ransomware-analysis https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-hive", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-04-22T14:34:47", "type": "hivepro", "title": "Hive Ransomware targets organizations with ProxyShell exploit", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523"], "modified": "2022-04-22T14:34:47", "id": "HIVEPRO:F2305684A25C735549865536AA4254BF", "href": "https://www.hivepro.com/hive-ransomware-targets-organizations-with-proxyshell-exploit/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-24T12:00:56", "description": "#### THREAT LEVEL: Red.\n\nFor a detailed advisory, [download the pdf file here](<https://www.hivepro.com/wp-content/uploads/2021/08/TA202131.pdf>)[.](<https://www.hivepro.com/wp-content/uploads/2021/08/TA202130.pdf>)\n\nLockFile, a new ransomware gang, has been active since last week. LockFile began by using a publicly disclosed PetitPotam exploit (CVE-2021-36942) to compromise Windows Domain Controllers earlier this week. Using ProxyShell vulnerabilities (CVE-2021-34473, CVE-2021-34523 and CVE-2021-31207), they've now infiltrated many Microsoft Exchange Servers . The origins of this gang are most likely China. This gang used a similar ransomware note as of LokiBot and is been linked to Conti ransomware due to the email id provided (contact@contipauper[.]com). HivePro Threat Research team advises everyone to patch the vulnerabilities to prevent an attack.\n\n#### Vulnerability Details\n\n\n\n#### Actor Details\n\n**Name** | **Target Locations** | **Target Sectors** | \n---|---|---|--- \nLockFile Ransomware | United States of America and Asia | Manufacturing, financial services, engineering, legal, business services, and travel and tourism sectors | \n \n#### Indicators of Compromise (IoCs)\n\n**Type** | **Value** \n---|--- \nIP Address | 209.14.0.234 \nSHA-2 Hash | ed834722111782b2931e36cfa51b38852c813e3d7a4d16717f59c1d037b62291 \ncafe54e85c539671c94abdeb4b8adbef3bde8655006003088760d04a86b5f915 \n36e8bb8719a619b78862907fd49445750371f40945fefd55a9862465dc2930f9 \n5a08ecb2fad5d5c701b4ec42bd0fab7b7b4616673b2d8fbd76557203c5340a0f \n1091643890918175dc751538043ea0743618ec7a5a9801878554970036524b75 \n2a23fac4cfa697cc738d633ec00f3fbe93ba22d2498f14dea08983026fdf128a \n7bcb25854ea2e5f0b8cfca7066a13bc8af8e7bac6693dea1cdad5ef193b052fd \nc020d16902bd5405d57ee4973eb25797087086e4f8079fac0fd8420c716ad153 \na926fe9fc32e645bdde9656470c7cd005b21590cda222f72daf854de9ffc4fe0 \n368756bbcaba9563e1eef2ed2ce59046fb8e69fb305d50a6232b62690d33f690 \nd030d11482380ebf95aea030f308ac0e1cd091c673c7846c61c625bdf11e5c3a \na0066b855dc93cf88f29158c9ffbbdca886a5d6642cbcb9e71e5c759ffe147f8 \n \n#### Patch Links\n\n<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473>\n\n<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523>\n\n<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36942>\n\n<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207>\n\n#### References\n\n<https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lockfile-ransomware-new-petitpotam-windows>\n\n<https://www.bleepingcomputer.com/news/security/lockfile-ransomware-uses-petitpotam-attack-to-hijack-windows-domains/>", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-08-24T10:35:48", "type": "hivepro", "title": "ProxyShell and PetitPotam exploits weaponized by LockFile Ransomware Group", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523", "CVE-2021-36942"], "modified": "2021-08-24T10:35:48", "id": "HIVEPRO:C0B03D521C5882F1BE07ECF1550A5F74", "href": "https://www.hivepro.com/proxyshell-and-petitpotam-exploits-weaponized-by-lockfile-ransomware-group/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-04-27T15:34:57", "description": "For a detailed threat digest, download the pdf file here Published Vulnerabilities Interesting Vulnerabilities Active Threat Groups Targeted Countries Targeted Industries ATT&CK TTPs 430 5 2 Worldwide 17 46 The fourth week of April 2022 witnessed the discovery of 430 vulnerabilities out of which 5 gained the attention of Threat Actors and security researchers worldwide. Among these 5, there was 1 zero-day, and 1 vulnerability that was awaiting analysis on the National Vulnerability Database (NVD). Hive Pro Threat Research Team has curated a list of 5 CVEs that require immediate action. Further, we also observed Two Threat Actor groups being highly active in the last week. Lazarus, a North Korea threat actor group popular for financial crime and gain, was observed targeting blockchain technology and the cryptocurrency industry using a new malware TraderTraitor and Hive ransomware group was seen using the ProxyShell vulnerabilities to target organizations all around the world. Common TTPs which could potentially be exploited by these threat actors or CVEs can be found in the detailed section. Detailed Report: Interesting Vulnerabilities: Vendor CVEs Patch Link CVE-2021-34473 CVE-2021-34523 CVE-2021-31207 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207 CVE-2022-0540 https://www.atlassian.com/software/jira/core/download https://www.atlassian.com/software/jira/update CVE-2022-29072* Not Available Active Actors: Icon Name Origin Motive Lazarus Group (APT38, BlueNoroff, and Stardust Chollima) North Korea Financial crime and gain Hive Ransomware Group Unknown Financial crime and gain Targeted Location: Targeted Sectors: Common TTPs: TA0042: Resource Development TA0001: Initial Access TA0002: Execution TA0003: Persistence TA0004: Privilege Escalation TA0005: Defense Evasion TA0006: Credential Access TA0007: Discovery TA0008: Lateral Movement TA0009: Collection TA0011: Command and Control TA0010: Exfiltration TA0040: Impact T1588: Obtain Capabilities T1190: Exploit Public-Facing Application T1059: Command and Scripting Interpreter T1136: Create Account T1134: Access Token Manipulation T1134: Access Token Manipulation T1110: Brute Force T1083: File and Directory Discovery T1570: Lateral Tool Transfer T1560: Archive Collected Data T1071: Application Layer Protocol T1567: Exfiltration Over Web Service T1486: Data Encrypted for Impact T1588.005: Exploits T1566: Phishing T1059.007: JavaScript T1136.002: Domain Account T1543: Create or Modify System Process T1140: Deobfuscate/Decode Files or Information T1003: OS Credential Dumping T1135: Network Share Discovery T1021: Remote Services T1560.001: Archive via Utility T1071.001: Web Protocols T1496: Resource Hijacking T1588.006: Vulnerabilities T1566.001: Spearphishing Attachment T1059.001: PowerShell T1053: Scheduled Task/Job T1068: Exploitation for Privilege Escalation T1562: Impair Defenses T1003.005: Cached Domain Credentials T1057: Process Discovery T1021.001: Remote Desktop Protocol T1005: Data from Local System T1105: Ingress Tool Transfer T1566.002: Spearphishing Link T1059.003: Windows Command Shell T1053.005: Scheduled Task T1053: Scheduled Task/Job T1562.001: Disable or Modify Tools T1018: Remote System Discovery T1021.002: SMB/Windows Admin Shares T1113: Screen Capture T1078: Valid Accounts T1106: Native API T1078: Valid Accounts T1053.005: Scheduled Task T1070: Indicator Removal on Host T1518: Software Discovery T1021.006: Windows Remote Management T1078.002: Domain Accounts T1053: Scheduled Task/Job T1078.002: Domain Accounts T1078: Valid Accounts T1553: Subvert Trust Controls T1518.001: Security Software Discovery T1053.005: Scheduled Task T1078.002: Domain Accounts T1078: Valid Accounts T1049: System Network Connections Discovery T1204: User Execution T1078.002: Domain Accounts T1204.002: Malicious File T1047: Windows Management Instrumentation Threat Advisories: Bypass Authentication vulnerability in Atlassian Jira Seraph Hive Ransomware targets organizations with ProxyShell exploit Lazarus is back, targeting organizations with cryptocurrency thefts via TraderTraitor malware What will be the consequence of this disputed vulnerability in 7-ZIP?", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-04-27T12:44:38", "type": "hivepro", "title": "Weekly Threat Digest: 18 \u2013 24 April 2022", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523", "CVE-2022-0540", "CVE-2022-29072"], "modified": "2022-04-27T12:44:38", "id": "HIVEPRO:09525E3475AC1C5F429611A90182E82F", "href": "https://www.hivepro.com/weekly-threat-digest-18-24-april-2022/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-03-30T07:42:21", "description": "For a detailed threat digest, download the pdf file here Published Vulnerabilities Interesting Vulnerabilities Active Threat Groups Targeted Countries Targeted Industries ATT&CK TTPs 340 10 5 53 24 84 The fourth week of March 2022 witnessed the discovery of 340 vulnerabilities out of which 10 gained the attention of Threat Actors and security researchers worldwide. Among these 10, there was 1 which is undergoing reanalysis, and 2 were not present in the NVD at all. Hive Pro Threat Research Team has curated a list of 10 CVEs that require immediate action. Furthermore, we also observed five threat actor groups being highly active in the last week. The Lapsus$, a new extortion threat actor group had attacked popular organizations such as Brazilian Ministry of Health, NVIDIA, Samsung, Vodafone, Ubisoft, Octa, and Microsoft for data theft and destruction, was observed using the Redline info-stealer. Additionally, North Korean state hackers known as Lazarus group, was exploiting the zero-day vulnerability in Google Chrome's web browser (CVE-2022-0609). AvosLocker is a Ransomware as a Service (RaaS) affiliate-based group that has targeted 50+ organizations is currently exploiting Proxy Shell vulnerabilities (CVE-2021-31206, CVE-2021-31207, CVE-2021-34523, CVE-2021-34473, CVE-2021-26855). The threat actor APT35 aka Magic Hound, an Iranian-backed threat group is exploiting the Proxy Shell vulnerabilities to attack organizations across the globe. Another South Korean APT group DarkHotel was targeting the hospitality industry in China. Common TTPs which could potentially be exploited by these threat actors or CVEs can be found in the detailed section below. Detailed Report: Interesting Vulnerabilities: Vendor CVEs Patch Link CVE-2021-34484 CVE-2022-21919 https://central.0patch.com/auth/login CVE-2022-0609* CVE-2022-1096* https://www.google.com/intl/en/chrome/?standalone=1 CVE-2021-31206 CVE-2021-31207 CVE-2021-34523 CVE-2021-34473 CVE-2021-26855 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31206 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31207 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34523 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26855 CVE-2022-0543 https://security-tracker.debian.org/tracker/CVE-2022-0543 Active Actors: Icon Name Origin Motive APT 35 (Magic Hound, Cobalt Illusion, Charming Kitten, TEMP.Beanie, Timberworm, Tarh Andishan, TA453, ITG18, Phosphorus, Newscaster) Iran Information theft and espionage AvosLocker Unknown Ecrime, Information theft, and Financial gain Lazarus Group (Labyrinth Chollima, Group 77, Hastati Group, Whois Hacking Team, NewRomanic Cyber Army Team, Zinc, Hidden Cobra, Appleworm, APT-C-26, ATK 3, SectorA01, ITG03) North Korea Information theft and espionage, Sabotage and destruction, Financial crime Lapsus$ (DEV-0537) Unknown Data theft and Destruction DarkHotel (APT-C-06, SIG25, Dubnium, Fallout Team, Shadow Crane, CTG-1948, Tungsten Bridge, ATK 52, Higaisa, TAPT-02, Luder) South Korea Information theft and espionage Targeted Location: Targeted Sectors: Common TTPs: TA0042: Resource Development TA0001: Initial Access TA0002: Execution TA0003: Persistence TA0004: Privilege Escalation TA0005: Defense Evasion TA0006: Credential Access TA0007: Discovery TA0008: Lateral Movement TA0009: Collection TA0011: Command and Control TA0010: Exfiltration TA0040: Impact T1583: Acquire Infrastructure T1189: Drive-by Compromise T1059: Command and Scripting Interpreter T1098: Account Manipulation T1548: Abuse Elevation Control Mechanism T1548: Abuse Elevation Control Mechanism T1110: Brute Force T1010: Application Window Discovery T1021: Remote Services T1560: Archive Collected Data T1071: Application Layer Protocol T1048: Exfiltration Over Alternative Protocol T1485: Data Destruction T1583.001: Domains T1190: Exploit Public-Facing Application T1059.001: PowerShell T1547: Boot or Logon Autostart Execution T1134: Access Token Manipulation T1134: Access Token Manipulation T1110.003: Password Spraying T1083: File and Directory Discovery T1021.001: Remote Desktop Protocol T1560.003: Archive via Custom Method T1071.001: Web Protocols T1048.003: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol T1486: Data Encrypted for Impact T1583.006: Web Services T1133: External Remote Services T1059.005: Visual Basic T1547.006: Kernel Modules and Extensions T1134.002: Create Process with Token T1134.002: Create Process with Token T1056: Input Capture T1120: Peripheral Device Discovery T1021.002: SMB/Windows Admin Shares T1560.002: Archive via Library T1132: Data Encoding T1041: Exfiltration Over C2 Channel T1491: Defacement T1587: Develop Capabilities T1566: Phishing T1059.004: Unix Shell T1547.001: Registry Run Keys / Startup Folder T1547: Boot or Logon Autostart Execution T1564: Hide Artifacts T1056.004: Credential API Hooking T1057: Process Discovery T1021.004: SSH T1213: Data from Information Repositories T1132.001: Standard Encoding T1537: Transfer Data to Cloud Account T1491.001: Internal Defacement T1587.001: Malware T1566.001: Spearphishing Attachment T1059.003: Windows Command Shell T1547.009: Shortcut Modification T1547.006: Kernel Modules and Extensions T1564.001: Hidden Files and Directories T1056.001: Keylogging T1012: Query Registry T1005: Data from Local System T1001: Data Obfuscation T1561: Disk Wipe T1588: Obtain Capabilities T1199: Trusted Relationship T1203: Exploitation for Client Execution T1543: Create or Modify System Process T1547.001: Registry Run Keys / Startup Folder T1562: Impair Defenses T1003: OS Credential Dumping T1082: System Information Discovery T1074: Data Staged T1001.003: Protocol Impersonation T1561.001: Disk Content Wipe T1588.004: Digital Certificates T1078: Valid Accounts T1106: Native API T1543.003: Windows Service T1547.009: Shortcut Modification T1562.004: Disable or Modify System Firewall T1111: Two-Factor Authentication Interception T1016: System Network Configuration Discovery T1074.001: Local Data Staging T1573: Encrypted Channel T1561.002: Disk Structure Wipe T1588.006: Vulnerabilities T1053: Scheduled Task/Job T1133: External Remote Services T1543: Create or Modify System Process T1562.001: Disable or Modify Tools T1552: Unsecured Credentials T1033: System Owner/User Discovery T1056: Input Capture T1573.001: Symmetric Cryptography T1490: Inhibit System Recovery T1204: User Execution T1137: Office Application Startup T1543.003: Windows Service T1070: Indicator Removal on Host T1124: System Time Discovery T1056.004: Credential API Hooking T1008: Fallback Channels T1489: Service Stop T1204.002: Malicious File T1542: Pre-OS Boot T1068: Exploitation for Privilege Escalation T1070.004: File Deletion T1056.001: Keylogging T1105: Ingress Tool Transfer T1529: System Shutdown/Reboot T1047: Windows Management Instrumentation T1542.003: Bootkit T1055: Process Injection T1070.006: Timestomp T1571: Non-Standard Port T1053: Scheduled Task/Job T1055.001: Dynamic-link Library Injection T1036: Masquerading T1090: Proxy T1505: Server Software Component T1053: Scheduled Task/Job T1036.005: Match Legitimate Name or Location T1090.002: External Proxy T1505.003: Web Shell T1078: Valid Accounts T1027: Obfuscated Files or Information T1078: Valid Accounts T1027.006: HTML Smuggling T1027.002: Software Packing T1542: Pre-OS Boot T1542.003: Bootkit T1055: Process Injection T1055.001: Dynamic-link Library Injection T1218: Signed Binary Proxy Execution T1218.001: Compiled HTML File T1078: Valid Accounts T1497: Virtualization/Sandbox Evasion Threat Advisories: Microsoft\u2019s privilege escalation vulnerability that refuses to go away Google Chrome\u2019s second zero-day in 2022 Magic Hound Exploiting Old Microsoft Exchange ProxyShell Vulnerabilities AvosLocker Ransomware group has targeted 50+ Organizations Worldwide North Korean state-sponsored threat actor Lazarus Group exploiting Chrome Zero-day vulnerability LAPSUS$ \u2013 New extortion group involved in the breach against Nvidia, Microsoft, Okta and Samsung DarkHotel APT group targeting the Hospitality Industry in China New Threat Actor using Serpent Backdoor attacking French Entities Muhstik botnet adds another vulnerability exploit to its arsenal", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 10.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2022-03-29T13:56:10", "type": "hivepro", "title": "Weekly Threat Digest: 21 \u2013 27 March 2022", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-26855", "CVE-2021-31206", "CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34484", "CVE-2021-34523", "CVE-2022-0543", "CVE-2022-0609", "CVE-2022-1096", "CVE-2022-21919"], "modified": "2022-03-29T13:56:10", "id": "HIVEPRO:E7F36EC1E4DCF018F94ECD22747B7093", "href": "https://www.hivepro.com/weekly-threat-digest-21-27-march-2022/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "qualysblog": [{"lastseen": "2022-03-07T05:27:25", "description": "_AvosLocker is a ransomware group that was identified in 2021, specifically targeting Windows machines. Now a new variant of AvosLocker malware is also targeting Linux environments. In this blog, we examine the behavior of these two AvosLocker Ransomware in detail._\n\nAvosLocker is a relatively new ransomware-as-a-service that was first spotted in late June 2021. The attackers use spam email campaigns as initial infection vectors for the delivery of the ransomware payload. During the encryption, process files are appended with the ".avos" extension. An updated variant appends with the extension ".avos2". Similarly, the Linux version appends with the extension ".avoslinux".\n\nAfter every successful attack, the AvosLocker gang releases the names of their victims on the Dark Leak website hosted on the TOR network and provides exfiltrated data for sale. URL structure: `hxxp://avosxxx\u2026xxx[.]onion`\n\nThe AvosLocker gang also advertises their latest ransomware variants on the Dark Leak website. URL structure: `hxxp://avosjonxxx\u2026xxx[.]onion`\n\nThe gang has claimed, \u201cThe AvosLocker's latest Windows variant is one of the fastest in the market with highly scalable threading and selective ciphers.\u201d They offer an affiliate program that provides ransomware-as-a-service (RaaS) for potential partners in crime.\n\nRecently they have added support for encrypting Linux systems, specifically targeting VMware ESXi virtual machines. This allows the gang to target a wider range of organizations. It also possesses the ability to kill ESXi VMs, making it particularly nasty.\n\nAccording to [deepweb research](<https://blog.cyble.com/2022/01/17/avoslocker-ransomware-linux-version-targets-vmware-esxi-servers/>) by Cyble Research Labs, the Threats Actors of AvosLocker ransomware groups are exploiting Microsoft Exchange Server vulnerabilities using Proxyshell, compromising the victim\u2019s network.\n\nCVEs involved in these exploits are CVE-2021-34473, CVE-2021-31206, CVE-2021-34523, and CVE-2021-31207.\n\n### Technical Analysis of AvosLocker Windows Variant\n\n#### Command-Line Options\n\nThe following figure shows a sample of Command-Line Options.\n\nFig. 1: Command Line Option\n\nThe available options allow for control over items like enabling/disabling SMB brute force, mutex creation, or control over the concurrent number of threads. \nIf no options are given, the malware runs with default options as shown in figure 2, where it ignores encryption of network drives and SMB share. It runs 200 threads concurrently of its file encryption routine.\n\nFig. 2: Execution with Default Parameter\n\nWhile execution, the malware console displays detailed information about its progress on the screen (fig. 3).\n\nFig. 3: Progress Details\n\nMost of the strings in the malware are kept in the XOR encrypted format. The decryption routines are similar, only registers and keys are different (fig. 4). Strings are decrypted just before their use.\n\nFig. 4: Commonly Used Decryption Routine\n\nInitially, the malware collects the command line options provided while launching the application (fig. 5).\n\nFig. 5: Get command-line Options\n\nThen it decrypts the mutex name \u201cCheic0WaZie6zeiy\u201d and checks whether it is already running or not to avoid multiple instances (fig. 6).\n\nFig. 6: Mutex Creation\n\nAs shown in figure 7, AvosLocker uses multi-threaded tactics. It calls the below APIs to create multiple instances of worker threads into memory and share file paths among multiple threads. Smartly utilizing the computing power of multi-core CPUs.\n\nAPIs called:\n\n * CreateIoCompletionPort()\n * PostQueuedCompletionStatus()\n * GetQueuedCompletionPort()\n\nFig. 7: Use of CreateIoCompletionPort\n\nThe code creates multiple threads in a loop (fig. 8). The threads are set to the highest priority for encrypting data quickly.\n\nFig. 8: Create Thread In-Loop and Set Priority\n\nAvosLocker ransomware performs a recursive sweep through the file system (fig. 9), searches for attached drives, and enumerates network resources using API WNetOpenEnum() and WnetEnumResource().\n\nFig. 9: Search Network Share\n\nBefore selecting the file for encryption, it checks for file attributes and skips it if \u201c**FILE_ATTRIBUTE_HIDDEN**\u201d or \u201c**FILE_ATTRIBUTE_SYSTEM**\u201d as shown in figure 10.\n\nFig. 10: Check File Attribute\n\nOnce the file attribute check is passed, it performs the file extension check. It skips files from encryption if its extension gets matched with one of the extensions shown in figure 11.\n\nFig. 11: Skip Extension List\n\nIt also contains the list of files and folders that need to be skipped from the encryption (fig. 12).\n\nFig. 12: Skip File Folder List\n\nAvosLocker uses RSA encryption, and it comes with a fixed hardcoded ID and RSA Public Key of the attacker (fig. 13).\n\nFig. 13: Hardcoded Public Key\n\nAfter file encryption using RSA, it uses the ChaCha20 algorithm to encrypt encryption-related information (fig. 14).\n\nFig. 14: Use of ChaCha20\n\nIt appends this encryption-related information (fig. 15) at the end of the file with Base64 encoded format.\n\nFig.15: Encryption Related Information\n\nThen it appends the "avo2" extension to the file using MoveFileWithprogressW (fig. 16).\n\nFig. 16: Add Extension Using Move File\n\nAs seen in figure 17, it has appended "avos2" extensions.\n\nFig. 17: File with Updated Extension\n\nIt writes a ransom note (fig. 18) named \u201cGET_YOUR_FILES_BACK.txt\u201d to each encrypted directory before encryption of the file.\n\nFig. 18: Ransom Note\n\nThe ransom note instructs the user to not to shut down the system in case encryption is in progress to avoid file corruption. It asks the victim to visit the onion address with the TOR browser to pay the ransom and to obtain the decryption key to decrypt the application or files.\n\n#### AvosLocker Payment System\n\nAfter submitting the "ID" mentioned on the ransom note to AvosLocker's website (fig. 19), the victim will be redirected to the "payment" page.\n\nFig. 19: AvosLocker's Website\n\nIf the victim fails to pay the ransom, the attacker then puts the victim\u2019s data up for sale. Figure 20 shows the list of victims (redacted for obvious reasons) mentioned on the site.\n\nFig. 20: List of Victims\n\nAvosLocker also offers an affiliate program that provides ransomware-as-a-service (RaaS). They provide \u201chelpful\u201d services to clients such as:\n\n * Supports Windows, Linux & ESXi.\n * Affiliate panel\n * Negotiation panel with push & sound notifications\n * Assistance in negotiations\n * Consultations on operations\n * Automatic builds\n * Automatic decryption tests\n * Encryption of network resources\n * Killing of processes and services with open handles to files\n * Highly configurable builds\n * Removal of shadow copies\n * Data storage\n * DDoS attacks\n * Calling services\n * Diverse network of penetration testers, access brokers and other contacts\n\nFig. 21: Partnership Program\n\n### Technical Analysis of AvosLocker Linux Variant\n\nIn this case, the AvosLocker malware arrives as an elf file. As shown in figure 22, the analyzed file is x64 based Linux executable file.\n\nFig. 22: File Details\n\nIt\u2019s a command-line application having some command-line options (fig. 23).\n\nFig. 23: Command-Line Options\n\nThe `<Thread count>` parameter as shown above represents the number of threads that can be created to encrypt files simultaneously. It possesses the capability to kill ESXi VMs based on the parameter provided while executing.\n\nUpon execution, the malware first collects information about the number of threads that need to be created. Then it checks for string \u201cvmfs\u201d in the file path provided as a command-line argument (fig. 24).\n\nFig. 24: Checks for \u201cvmfs\u201d\n\nAfter that, it also checks for string \u201cESXi\u201d in the file path provided as a command-line argument (fig. 25).\n\nFig. 25: Checks for \u201cESXi\u201d\n\nIf this parameter is found, then it calls a routine to kill the running ESXi virtual machine (fig. 26).\n\nFig. 26: Code to Kill ESXi Virtual Machine\n\nThe command used for killing the ESXi virtual machine is as shown in figure 27.\n\nFig. 27: Command to Kill Running ESXi Virtual Machine\n\nFurther, AvosLocker drops a ransom note file (fig. 28) at the targeted directory.\n\nFig. 28: Create ransom note\n\nAfter that, it starts creating a list of files that must be encrypted. Before adding a file path to the list, it checks whether it is a regular file or not (fig. 29). Only regular files are added to the encryption list.\n\nFig. 29: Checks File Info\n\nAvosLocker skips the ransom note file and any files with the extension \u201cavoslinux\u201d from adding into the encryption list (fig. 30).\n\nFig. 30: Skip \u201cavoslinux\u201d Extension File\n\nThen it calls the mutex lock/unlock API for thread synchronization as shown in figure 31.\n\nFig. 31: Lock-Unlock Mutex for Thread Synchronization\n\nBased on the number of threads specified, it creates concurrent CPU threads (fig. 32). This helps in encrypting different files simultaneously at a very fast speed.\n\nFig. 32: Create Threads in Loop\n\nAvosLocker\u2019s Linux variant makes use of Advanced Encryption Standard (AES) and elliptic-curve cryptography (ECC) algorithms for data encryption.\n\nFile-related information along with the encryption key used might be encrypted and then encoded with base 64 formats. This encoded information is added at the end of each encrypted file (fig. 33).\n\nFig. 33: File-related Info added at the end\n\nFigure 34 shows the malware appending the extension \u201c.avoslinux\u201d to the encrypted file names.\n\nFig. 34: Append file extension \u201c.avoslinux\u201d after encryption\n\nBefore starting file encryption, it creates a ransom note named \u201cREADME_FOR_RESTORE \u201c. The content of this ransom note is shown in figure 35.\n\nFig. 35: Ransom Note\n\nThe ransom note instructs the victim not to shut down the system in case encryption is in progress to avoid file corruption. It asks the victim to visit the onion address with a TOR browser to pay the ransom and to obtain the decryption key and decryption application.\n\n### Indicators of Compromise (IOCs):\n \n \n Windows: C0A42741EEF72991D9D0EE8B6C0531FC19151457A8B59BDCF7B6373D1FE56E02\n \n \n Linux: 7C935DCD672C4854495F41008120288E8E1C144089F1F06A23BD0A0F52A544B1\n \n \n URL:\n hxxp://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad[.]onion.\n hxxp://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad[.]onion\n\n### TTP Map:\n\nInitial Access| Execution| Defense Evasion| Discovery| Impact \n---|---|---|---|--- \nPhishing (T1566)| User Execution \n(T1204)| Obfuscated Files or Information (T1027)| System Information Discovery (T1082)| Data Encrypted for Impact \n(T1486) \n| | | File and Directory Discovery (T1083)| Inhibit System Recovery \n(T1490)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2022-03-07T05:18:46", "type": "qualysblog", "title": "AvosLocker Ransomware Behavior Examined on Windows & Linux", "bulletinFamily": "blog", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31206", "CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523"], "modified": "2022-03-07T05:18:46", "id": "QUALYSBLOG:DC0F3E59C4DA6EB885E6BCAB292BCA7D", "href": "https://blog.qualys.com/category/vulnerabilities-threat-research", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-08-24T19:24:47", "description": "A unified front against malicious cyber actors is climactic in the ever-evolving cybersecurity landscape. The joint Cybersecurity Advisory (CSA), a collaboration between leading cybersecurity agencies from the United States, Canada, United Kingdom, Australia, and New Zealand, is a critical guide to strengthen global cyber resilience. The agencies involved include the U.S.'s CISA, NSA, and FBI; Canada's CCCS; U.K.'s NCSC-UK; Australia's ACSC; and New Zealand's NCSC-NZ and CERT NZ. \n\nThis collaboration among key cybersecurity agencies highlights the global nature of cybersecurity threats. Such cooperative efforts signify a unified perspective and highlight the need for shared intelligence and coordinated strategies. The realization that cybersecurity is not limited to national borders but is a shared responsibility is growing more evident. \n\nThe CSA sheds light on the Common Vulnerabilities and Exposures (CVEs) routinely and frequently exploited in 2022 and the associated Common Weakness Enumeration(s) (CWE). It outlines crucial technical details and key findings, providing actionable guidance and mitigation strategies. Vendors, designers, developers, and end-user organizations are strongly urged to implement these guidelines to strengthen their defenses against possible threats. \n\n### **The Cybersecurity Advisory (CSA) has identified the following key findings that outline essential insights into the behaviors and tendencies of malicious cyber actors for 2022:** \n\n * **Older Vulnerabilities Targeted**: Malicious cyber actors exploited older software vulnerabilities more frequently, targeting unpatched, internet-facing systems. \n * **Proof of Concept (PoC) Code**: Public availability of PoC code likely facilitated broader exploitation by malicious actors. \n * **Success in First Two Years**: Known vulnerabilities are most successfully exploited within the first two years of disclosure. Timely patching reduces this effectiveness. \n * **Prioritization of Severe CVEs**: Cyber actors prioritize severe and globally prevalent vulnerabilities, seeking low-cost, high-impact tools and paying attention to vulnerabilities principal in specific targets' networks. \n * **Detection through Deep Packet Inspection**: Deep packet inspection can often detect exploits involving multiple CVE or CVE chains. \n\nIn 2022, malicious cyber actors routinely exploited 12 severe vulnerabilities, affecting various products and services. These issues included the long-exploited Fortinet SSL VPNs' CVE-2018-13379 and widespread vulnerabilities such as Apache's Log4Shell (CVE-2021-44228). They impacted multiple systems, from Microsoft Exchange email servers to Atlassian Confluence and software like Zoho ManageEngine and VMware. The exploitation often resulted from organizations' failure to patch software or due to publicly available proofs of concept (PoC), enabling remote execution, privilege escalation, and authentication bypass. The table below shows detailed information on these 12 vulnerabilities, along with Qualys-provided QIDs. A crucial commonality between these vulnerabilities is their potential to compromise system integrity, confidentiality, and availability severely. The Qualys Threat Research Unit (TRU) team has addressed all aforementioned critical vulnerabilities by providing QIDs within 24 hours. These critical vulnerabilities are categorized based on their potential impact if exploited as follows: \n\nCVE/Vuln Name| Vendor/Product| Type| QID| QDS \n---|---|---|---|--- \nCVE-2018-13379| Fortinet - FortiOS and FortiProxy | SSL VPN Credential Exposure | 43702| 100 \nCVE-2021-34473 (Proxy Shell) | Microsoft - Exchange Server | RCE | 50114, 50107| 100 \nCVE-2021-31207 (Proxy Shell) | Microsoft - Exchange Server | Security Feature Bypass | 50114, 50111| 95 \nCVE-2021-34523 (Proxy Shell) | Microsoft - Exchange Server | Elevation of Privilege | 50114, 50112| 100 \nCVE-2021-40539| Zoho ManageEngine - ADSelfService Plus | RCE/Authentication Bypass | 375840| 100 \nCVE-2021-26084| Atlassian - Confluence Server and Data Center | Arbitrary code execution | 375839, 730172| 100 \nCVE-2021-44228 (Log4Shell) | Apache - Log4j2 | RCE | 730447, 376521| 100 \nCVE-2022-22954| VMware - Workspace ONE Access and Identity Manager | RCE | 730447, 376521| 100 \nCVE-2022-22960| VMware - Workspace ONE Access, Identity Manager, and vRealize Automation | Improper Privilege Management | 376521| 95 \nCVE-2022-1388| F5 Networks - BIG-IP | Missing Authentication Vulnerability | 730489, 376577| 96 \nCVE-2022-30190 (Follina)| Microsoft - Multiple Products | RCE | 91909| 100 \nCVE-2022-26134| Atlassian - Confluence Server and Data Center | RCE | 376657, 730514| 100 \n \n**Vulnerabilities Paving the Way for Data Theft and More:** \n\nThe following vulnerabilities that could potentially lead to data theft or lay the groundwork for further attacks: \n\n * **CVE-2018-13379**, a flaw in the Fortinet FortiOS SSL VPN web portal, could be leveraged by attackers to gain unauthorized access to sensitive SSL VPN session data. \n * **CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207**, collectively known as ProxyShell vulnerabilities affecting Microsoft Exchange Servers, could enable bad actors to deploy web shells and execute arbitrary code on compromised devices. \n * **CVE-2022-1388**, an F5 BIG-IP iControl REST API vulnerability, could offer initial network access to cyber criminals, enabling infamous activities like data theft or ransomware deployment. \n\n**Vulnerabilities Leading to System Takeover:** \n\nNext, the following vulnerabilities that could potentially compromise an entire system: \n\n * **CVE-2021-44228**, or Log4Shell, exploits Apache's log4j Java library, possibly leading to a total system compromise. \n * **CVE-2021-26084 and CVE-2022-26134**, vulnerabilities found in Atlassian's Confluence Server and Data Center, can allow an attacker to execute arbitrary code, leading to a potential system takeover. \n * **CVE-2021-40539**, an issue with Zoho ManageEngine ADSelfService Plus, can allow for arbitrary code execution and potential system compromise. \n * **CVE-2022-30190**, found in the Microsoft Support Diagnostic Tool, can be exploited for remote code execution, potentially leading to full system compromise. \n * **CVE-2022-22954 and CVE-2022-22960**, affecting VMware Workspace ONE Access, Identity Manager, and vRealize Automation, can allow for remote code execution and privilege escalation, respectively, potentially leading to full system compromise. \n\n### **Analyzing Vulnerability Remediation Patterns and the Urgency of Swift Patching**\n\nOur data, which sheds light on the patching behavior for 12 significant vulnerabilities, is pulled from the Qualys TruRisk Platform. This data is anonymized to ensure that any data analysis cannot revert to identifying specific organization or asset information. \n\nThe data highlights a prominent challenge where some vulnerabilities witness rapid mitigation, highlighting proactive security measures. In contrast, others face prolonged remediation times, raising concerns about potential exposure risks. Such disparities underline the importance of detecting and swiftly addressing vulnerabilities. As cyber threats grow in sophistication, the urgency to patch quickly and efficiently becomes paramount. The following plot contrasting the patch rates and remediation times for 12 frequently exploited vulnerabilities in 2022 further illustrates this point. It shows that while some vulnerabilities are quickly patched, others remain unaddressed for extended periods. This analysis reinforces the importance of timely vulnerability management and the pressing need to do so with speed and diligence, especially for high-risk vulnerabilities. \n\n\n\nFig 1. Patch Rate vs. Average Remediation Days for Top 12 Routinely Exploited Vulnerabilities in 2022 \n\nThe damaging potential of these vulnerabilities highlights the vital importance of cybersecurity alertness. By understanding the risks and possible impacts of these threats, organizations can adopt proactive defense strategies, patching vulnerabilities and updating systems regularly to ensure the integrity of their environments. The advisory also emphasizes the criticality of accurately incorporating the CWE field in published CVEs to highlight vulnerability root causes and support industry-wide software security insights. \n\n### **Aligning Qualys Platform with Joint Cybersecurity Advisory Mitigating Guidelines** \n\nThe recent joint Cybersecurity Advisory (CSA) emphasizes the urgency of identifying exploited vulnerabilities, keeping all network assets updated, and implementing a robust patch management process. Among the recommendations are the timely updating of software, prioritizing patches for known vulnerabilities, performing automated asset discovery, and implementing centralized patch management. \n\nQualys' suite of products directly aligns with these critical recommendations. Qualys Cybersecurity Asset Management (CSAM) ensures 360-degree visibility of assets, aligning with CSA's call for comprehensive asset discovery. Qualys Patch Management offers an advanced automated solution for timely updates, while Qualys VMDR facilitates the discovery, assessment, and prioritization of vulnerabilities. By leveraging Qualys' unified platform, organizations can efficiently adhere to international best practices outlined in the CSA, enhancing their defense against cyber threats. \n\nIn addition, the joint Cybersecurity Advisory (CSA) stresses the need for robust protective controls and architecture. Key recommendations include securing internet-facing network devices, continuously monitoring the attack surface, and prioritizing secure-by-default configurations. There is a strong focus on hardening network protocols, managing access controls, and employing security tools such as EDR and SIEM for enhanced protection. \n\nQualys Threat Protection aligns seamlessly with these recommendations by providing centralized control and comprehensive visibility of the threat landscape. By continuously correlating external threat information against vulnerabilities and the IT asset inventory, Qualys allows organizations to pinpoint and prioritize the most critical security threats. Whether managing vulnerabilities, controlling the threat prioritization process, or ensuring compliance with regulations, Qualys empowers organizations to align with the CSA's guidelines and achieve a fortified security posture. \n\nQualys TotalCloud also employs deep learning AI to continuously monitor the attack surface and investigate abnormal activity, aligning with CSA guidelines. It is leveraging an interconnected artificial neural network that detects known and unknown malware with over 99% accuracy in less than a second. Through these capabilities, Qualys TotalCloud delivers an advanced, rapid, and precise solution for malware detection in multi-cloud environments and bypassing the limitations of signature-based systems. \n\n\n\nFig 2. Qualys VMDR TruRisk Dashboard for top 12 routinely exploited vulnerabilities in 2022 \n\nThe [Qualys VMDR TruRisk Dashboard](<https://ik.imagekit.io/qualys/wp-content/uploads/2023/08/Qualys-VMDR-TruRisk-UDdashboard.json_.zip>) (JSON zipped) helps organizations to have complete visibility into open vulnerabilities that focus on the organization\u2019s global risk score, high-risk vulnerabilities, and Top Exploited Vulnerabilities. Once you identify the vulnerable assets for these top vulnerable CVEs prioritized among your remediation owners, you can instantly use Qualys Patch management to reduce the risk. \n\nIn conclusion, this Cybersecurity Advisory (CSA) offers valuable insights and mitigation strategies against routine vulnerabilities. Qualys provides robust solutions that align seamlessly with CSA's recommendations, including asset management, timely updates, vulnerability prioritization, and advanced threat detection capabilities in this growing landscape. Consequently, organizations can strengthen their defenses against cyber threats by sticking to CSA guidelines and leveraging comprehensive cybersecurity solutions like Qualys'. \n\n## References\n\n[CISA, NSA, FBI and International Partners Issue Advisory on the Top Routinely Exploited Vulnerabilities in 2022](<https://media.defense.gov/2023/Aug/03/2003273618/-1/-1/0/JOINT-CSA-2022-TOP-ROUTINELY-EXPLOITED-VULNERABILITIES.PDF>)\n\n## Additional Contributor \n\n * Ramesh Ramachandran, Principal Product Manager, Qualys\n * Aubrey Perin, Lead Threat Intelligence Analyst, Qualys", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 10.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2023-08-24T19:07:05", "type": "qualysblog", "title": "Qualys Tackles 2022\u2019s Top Routinely Exploited Cyber Vulnerabilities", "bulletinFamily": "blog", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-13379", "CVE-2021-26084", "CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523", "CVE-2021-40539", "CVE-2021-44228", "CVE-2022-1388", "CVE-2022-22954", "CVE-2022-22960", "CVE-2022-26134", "CVE-2022-30190"], "modified": "2023-08-24T19:07:05", "id": "QUALYSBLOG:56A00F45A170AF95CF38191399649A4C", "href": "https://blog.qualys.com/category/qualys-insights", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-11T05:29:14", "description": "_The U.S. Cybersecurity & Infrastructure Security Agency has published its report on the top exploited vulnerabilities of 2021. This blog summarizes the report\u2019s findings and how you can use Qualys VMDR to automatically detect and remediate these risks in your enterprise environment._\n\nThe Cybersecurity & Infrastructure Security Agency (CISA) releases [detailed alerts](<https://www.cisa.gov/uscert/ncas/alerts>) of critical vulnerabilities and threats when warranted. These alerts cover the most exploited security vulnerabilities and provide critical insights into the type, nature, and vendor product affected, as well as recommended mitigations that enterprise IT/security professionals can take to reduce their risk.\n\nTo that end, CISA has released its [2021 Top Routinely Exploited Vulnerabilities Report](<https://www.cisa.gov/uscert/ncas/alerts/aa22-117a>). It provides in-depth details of each exploited CVE, including which threat actors aggressively targeted both public and private sector organizations worldwide. It also provides mitigation guidance for all the top vulnerabilities.\n\nOf special interest in the report is this key finding by CISA:\n\n_Globally, in 2021, malicious cyber actors targeted internet-facing systems, such as email servers and virtual private network (VPN) servers, with exploits of newly disclosed vulnerabilities. For most of the top exploited vulnerabilities, researchers or other actors released proof of concept (POC) code within two weeks of the vulnerability's disclosure, likely facilitating exploitation by a broader range of malicious actors._\n\n### CISA\u2019s Top 15 Routinely Exploited Vulnerabilities of 2021\n\nThe top 15 routine vulnerability exploits observed by cybersecurity authorities in the U.S., Australia, Canada, New Zealand, and the U.K. are:\n\nCVE| Vulnerability Name| Vendor and Product| Type \n---|---|---|--- \n[CVE-2021-44228](<https://nvd.nist.gov/vuln/detail/CVE-2021-44228>)| [Log4Shell](<https://www.qualys.com/log4shell-cve-2021-44228/>) | Apache Log4j| Remote code execution (RCE) \n[CVE-2021-40539](<https://nvd.nist.gov/vuln/detail/CVE-2021-40539>)| | Zoho ManageEngine AD SelfService Plus| RCE \n[CVE-2021-34523](<https://nvd.nist.gov/vuln/detail/CVE-2021-34523>)| ProxyShell| Microsoft Exchange Server| Elevation of privilege \n[CVE-2021-34473](<https://nvd.nist.gov/vuln/detail/CVE-2021-34473>)| ProxyShell| Microsoft Exchange Server| RCE \n[CVE-2021-31207](<https://nvd.nist.gov/vuln/detail/CVE-2021-31207>)| ProxyShell| Microsoft Exchange Server| Security feature bypass \n[CVE-2021-27065](<https://nvd.nist.gov/vuln/detail/CVE-2021-27065>)| [ProxyLogon](<https://blog.qualys.com/vulnerabilities-threat-research/2021/03/03/microsoft-exchange-server-zero-days-automatically-discover-prioritize-and-remediate-using-qualys-vmdr>)| Microsoft Exchange Server| RCE \n[CVE-2021-26858](<https://nvd.nist.gov/vuln/detail/CVE-2021-26858>)| [ProxyLogon](<https://blog.qualys.com/vulnerabilities-threat-research/2021/03/03/microsoft-exchange-server-zero-days-automatically-discover-prioritize-and-remediate-using-qualys-vmdr>)| Microsoft Exchange Server| RCE \n[CVE-2021-26857](<https://nvd.nist.gov/vuln/detail/CVE-2021-26857>)| [ProxyLogon](<https://blog.qualys.com/vulnerabilities-threat-research/2021/03/03/microsoft-exchange-server-zero-days-automatically-discover-prioritize-and-remediate-using-qualys-vmdr>)| Microsoft Exchange Server| RCE \n[CVE-2021-26855](<https://nvd.nist.gov/vuln/detail/CVE-2021-26855>)| [ProxyLogon](<https://blog.qualys.com/vulnerabilities-threat-research/2021/03/03/microsoft-exchange-server-zero-days-automatically-discover-prioritize-and-remediate-using-qualys-vmdr>)| Microsoft Exchange Server| RCE \n[CVE-2021-26084](<https://nvd.nist.gov/vuln/detail/CVE-2021-26084>)| | Atlassian Confluence Server and Data Center| Arbitrary code execution \n[CVE-2021-21972](<https://nvd.nist.gov/vuln/detail/CVE-2021-21972>)| | VMware vSphere Client| RCE \n[CVE-2020-1472](<https://nvd.nist.gov/vuln/detail/CVE-2020-1472>)| [ZeroLogon](<https://blog.qualys.com/vulnerabilities-threat-research/2020/09/15/microsoft-netlogon-vulnerability-cve-2020-1472-zerologon-automatically-discover-prioritize-and-remediate-using-qualys-vmdr>)| Microsoft Netlogon Remote Protocol (MS-NRPC)| Elevation of privilege \n[CVE-2020-0688](<https://nvd.nist.gov/vuln/detail/CVE-2020-0688>)| | Microsoft Exchange Server| RCE \n[CVE-2019-11510](<https://nvd.nist.gov/vuln/detail/CVE-2019-11510>)| | Pulse Secure Pulse Connect Secure| Arbitrary file reading \n[CVE-2018-13379](<https://nvd.nist.gov/vuln/detail/CVE-2018-13379>)| | Fortinet FortiOS and FortiProxy| Path traversal \n \n### Highlights of Top Vulnerabilities Cited in CISA 2021 Report\n\nBased on the analysis of this report by the Qualys Research Team, let\u2019s review a few of the top vulnerabilities on the 2021 list and our recommendations for how Qualys enterprise customers can detect and respond to them.\n\n#### Log4Shell Vulnerability\n\nThe Log4Shell vulnerability **(CVE-2021-44228)** was disclosed in December 2021. It was widely exploited by sending a specially crafted code string, which allowed an attacker to execute arbitrary Java code on the server and take complete control of the system. Thousands of products used Log4Shell and were vulnerable to the Log4Shell exploitation.\n\nVisit the [Qualys Log4Shell website](<https://www.qualys.com/log4shell-cve-2021-44228/>) for full details on our response to this threat.\n\n### ProxyShell: Multiple Vulnerabilities\n\nThe multiple vulnerabilities called ProxyShell **(CVE-2021-34523, CVE-2021-34473, CVE-2021-31207)** affect Microsoft Exchange email servers. Successful exploitation of these vulnerabilities in combination (i.e., via "vulnerability chaining") enables a remote actor to execute arbitrary code and privilege escalation.\n\n### ProxyLogon: Multiple Vulnerabilities\n\nThe multiple vulnerabilities named ProxyLogon **(CVE-2021-26855, CVE-2021-26858, CVE-2021-26857, CVE-2021-27065)** also affect Microsoft Exchange email servers. Successful exploitation of these vulnerabilities in combination allows an unauthenticated threat actor to execute arbitrary code on vulnerable Exchange Servers, which enables the attacker to gain persistent access to files, mailboxes, and credentials stored on the servers.\n\n[Read our blog](<https://blog.qualys.com/product-tech/2021/03/10/security-advisory-mitigating-the-risk-of-microsoft-exchange-zero-day-proxylogon-vulnerabilities>) on this threat.\n\n#### Confluence Server and Data Center Vulnerability\n\nAn Object Graph Navigation Library injection vulnerability **(CVE-2021-26084)** exists in Confluence Server that could allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance.\n\n#### Top Vulnerabilities of 2020 Persist\n\nThree additional vulnerabilities **(CVE-2020-1472, CVE-2018-13379, CVE-2019-11510)** were part of the routinely exploited [top vulnerabilities of 2020](<https://www.cisa.gov/uscert/ncas/alerts/aa21-209a>) list but continued to be exploited well into 2021.\n\n### How Can Qualys Help?\n\nThe Qualys Research Team stays on top of CISA\u2019s vulnerability reports by mapping and releasing our QIDs as needed. The goal is to provide our enterprise customers with complete visibility into risk across their organizations.\n\n#### Detect CISA Top 15 Exploited Vulnerabilities using Qualys VMDR\n\n[Qualys VMDR](<https://www.qualys.com/apps/vulnerability-management-detection-response/>) provides coverage for all 15 vulnerabilities described in the CISA report. [Qualys Patch Management](<https://www.qualys.com/apps/patch-management/>) can automatically patch all Windows-related vulnerabilities which account for 60% of the 15 vulnerabilities. Organizations can quickly reduce the risk from these vulnerabilities. Organizations can quickly reduce the risk from these vulnerabilities.\n\nUsing VMDR and Qualys Query Language (QQL) lets you easily detect all your assets that are vulnerable to the top 15.\n\nUse this QQL statement:\n \n \n vulnerabilities.vulnerability.cveIds:[`CVE-2021-44228`, `CVE-2021-40539`, `CVE-2021-34523`, `CVE-2021-34473`, `CVE-2021-31207`, `CVE-2021-27065`, `CVE-2021-26858`, `CVE-2021-26857`, `CVE-2021-26855`, `CVE-2021-26084`, `CVE-2021-21972`, `CVE-2020-1472`, `CVE-2020-0688`, `CVE-2019-11510`, `CVE-2018-13379`]\n\nView vulnerabilities be severity in Qualys VMDR\n\nQualys Unified Dashboard provides a comprehensive view of the top 15 exploited vulnerabilities as they affect your entire enterprise environment. The dashboard allows the security team to keep track of each vulnerability as they may propagate across multiple assets in your infrastructure.\n\nDashboard CISA: Alert (AA22-117A) | Top 15 Routinely Exploited\n\nQualys Unified Dashboard\n\n#### Prioritize CISA Top 15 Exploited Vulnerabilities using Qualys VMDR\n\nQualys VMDR makes it easy to prioritize the top 15 exploited vulnerabilities affecting your company\u2019s internet-facing assets. To do so, apply the tag \u201cInternet Facing Assets\u201d in the Prioritization tab. You can add tags like "Cloud Environments", "Type: Servers", "Web Servers", and "VMDR-Web Servers" to increase your scope of assets.\n\nUse this QQL statement:\n \n \n vulnerabilities.vulnerability.cveIds:[`CVE-2021-44228`, `CVE-2021-40539`, `CVE-2021-34523`, `CVE-2021-34473`, `CVE-2021-31207`, `CVE-2021-27065`, `CVE-2021-26858`, `CVE-2021-26857`, `CVE-2021-26855`, `CVE-2021-26084`, `CVE-2021-21972`, `CVE-2020-1472`, `CVE-2020-0688`, `CVE-2019-11510`, `CVE-2018-13379`]\n\nPrioritizing vulnerabilities for remediation in Qualys VMDR\n\n#### Remediate CISA Top 15 Exploited Vulnerabilities using Qualys VMDR\n\nQualys Patch Management offers out-of-the-box support for patching multiple CISA vulnerabilities. Patch Management also provides patches for many Microsoft, Linux, and third-party application vulnerabilities.\n\nTo view the patchable QIDs, enable the "Show only Patchable" toggle button. After that, you can configure the patch job to patch the relevant QIDs and their respective associated CVEs.\n\nUsing Qualys Patch Management to apply patches\n\nQualys Patch Management also provides the ability to deploy custom patches. The flexibility to customize patch deployment allows you to patch all the remaining CVEs in your patching to-do list.\n\nTo get a view of all available patches for CISA\u2019s top 15 exploitable vulnerabilities of 2021, go to the Patch Management application and run this QQL statement in the Patches tab:\n \n \n cve:[`CVE-2021-44228`, `CVE-2021-40539`, `CVE-2021-34523`, `CVE-2021-34473`, `CVE-2021-31207`, `CVE-2021-27065`, `CVE-2021-26858`, `CVE-2021-26857`, `CVE-2021-26855`, `CVE-2021-26084`, `CVE-2021-21972`, `CVE-2020-1472`, `CVE-2020-0688`, `CVE-2019-11510`, `CVE-2018-13379`]\n\nViewing available patches in Qualys Patch Management\n\nFor additional patch details about vulnerabilities reported by CISA, please see the [Appendix](<https://www.cisa.gov/uscert/ncas/alerts/aa22-117a>) of the CISA report.\n\n### Getting Started\n\nReady to get started? Learn how [Qualys VMDR](<https://www.qualys.com/subscriptions/vmdr/>) provides actionable vulnerability guidance and automates remediation in one solution.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 10.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2022-05-06T12:19:24", "type": "qualysblog", "title": "CISA Alert: Top 15 Routinely Exploited Vulnerabilities", "bulletinFamily": "blog", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-13379", "CVE-2019-11510", "CVE-2020-0688", "CVE-2020-1472", "CVE-2021-21972", "CVE-2021-26084", "CVE-2021-26855", "CVE-2021-26857", "CVE-2021-26858", "CVE-2021-27065", "CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523", "CVE-2021-40539", "CVE-2021-44228"], "modified": "2022-05-06T12:19:24", "id": "QUALYSBLOG:CAF5B766E6B0E6C1A5ADF56D442E7BB2", "href": "https://blog.qualys.com/category/vulnerabilities-threat-research", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-08-08T15:22:18", "description": "The [previous blog](<https://blog.qualys.com/product-tech/2023/07/11/an-in-depth-look-at-the-latest-vulnerability-threat-landscape-part-1>) from this three-part series showcased an overview of the vulnerability threat landscape. To summarize quickly, it illustrated the popular methods of exploiting vulnerabilities and the tactical techniques employed by threat actors, malware, and ransomware groups. Perhaps more crucially, we stated that commonly used solutions (CISA KEV/EPSS) often fall short in identifying high-risk vulnerabilities. \n\nIn this blog, we will focus on an **insider's perspective on the threat landscape**, viewing it through the eyes of an attacker. We will examine how quickly vulnerabilities get exploited in the wild, identify popularly sought-after vulnerabilities by threat actors, malware, and ransomware groups, and explore their underlying motives. \n\nWe will also provide insights on what measures to take you can take to safeguard your organizations from these vulnerabilities. \n\nSo, let's dive headfirst into this intriguing world without further ado. \n\n### How Fast Are Vulnerabilities Getting Exploited (Time to CISA KEV)?\n\nWe've already highlighted one of the most noteworthy efforts by the team at CISA - the creation of the known exploited vulnerabilities catalog in our previous blog. Initiated as part of [Binding Operational Directive 22-01 in 2021](<https://www.cisa.gov/news-events/directives/binding-operational-directive-22-01>), this project was born out of the need to minimize risks associated with these vulnerabilities. In its early years, there was a substantial backlog to address. Still, by 2023, the CISA team has had their operation running like a well-oiled machine and is swiftly updating the catalog with newly exploited vulnerabilities as soon as evidence emerges. \n\nSo, let's dive deep into understanding how quickly the vulnerabilities get exploited in the wild, as disclosed by the National Vulnerability Database(NVD).\n\nThe following graph illustrates the average duration it takes to include a vulnerability in the Known Exploited Vulnerabilities (KEV) catalog from when it was published in NVD.\n\nFor those CVEs disclosed in 2023, the gap to **time to KEV was just eight days**.\n\nFig 1. Average Time in Days to CISA KEV Catalog\n\nDefenders, therefore, have limited time to respond to vulnerabilities. The only viable response is through automation to patch these vulnerabilities before attackers can exploit them. Note that the average timeframe mentioned here, as in some instances, vulnerabilities are exploited almost instantly.\n\n### Which Vulnerabilities Are Exploited and by Whom?\n\nSo which vulnerabilities are exploited in the wild? And who is exploiting them? Are there any specific vulnerabilities that are more sought-after than others? If so, which ones?\n\nTo understand these questions, let's examine three main groups of attackers.\n\n * Threat Actor groups\n * Malwares\n * Ransomware groups\n\nAlthough there is some overlap within each group, it appears to favor a slightly different set of vulnerabilities depending on the use case.\n\n## Top Ten Vulnerabilities Exploited by Threat Actors\n\nHere\u2019s a list of the top ten vulnerabilities exploited by threat actors.\n\nThe chart below shows **the number of threat actors known to exploit a given vulnerability**.\n\n[](<https://ik.imagekit.io/qualys/wp-content/uploads/2023/07/Fig-2-Top-10-Vulnerabilities-Exploited-by-Threat-Actors.png>)Fig 2. Top Ten Vulnerabilities Exploited by Threat Actors for High-Risk Vulnerabilities\n\n**Title** | **CVE**s | **Threat Actor Count** | **TruRisk Score** **(QVS)** | **Description** \n---|---|---|---|--- \nMicrosoft Office/WordPad Remote Code Execution Vulnerability | CVE-2017-0199 | 53 | 100 | Allows a malicious actor to download Visual Basic script containing PowerShell commands. Works reliably well across a wide attack surface. Popular with [APT Groups](<https://www.fireeye.com/blog/threat-research/2017/04/cve-2017-0199-hta-handler.html>). \nMicrosoft Office Equation Editor Remote Code Execution Vulnerability | CVE-2017-11882 | 52 | 100 | Exploits Office's default Equation Editor feature by tricking the user to open a malicious file. This one is the hacking group\u2019s most favorite vulnerability, especially groups such as Cobalt or other malware as you will see in the next section. \nWindows Common Controls Remote Code Execution Vulnerability | CVE-2012-0158 | 45 | 100 | Executes remote code by tricking the user to click on a malicious link or specially crafted malicious file. \nApache Log4j RCE (Log4Shell) | CVE-2021-44228 | 26 | 100 | [Log4Shell](<https://www.qualys.com/log4shell-cve-2021-44228/>). Do we need to say anything more? \nMicrosoft Office Memory Corruption Vulnerability | CVE-2018-0802 | 24 | 100 | Executes remote code by tricking the user to open a specially crafted malicious file in Office or WordPad. \nMicrosoft Exchange Server Remote Code Execution Vulnerability (ProxyLogon) | CVE-2021-26855 | 22 | 100 | Allows an unauthenticated user to run arbitrary commands on the exchange server in its default configuration. Heavily exploited by the [Hafnium](<https://www.microsoft.com/en-us/security/blog/2021/03/02/hafnium-targeting-exchange-servers/>) group among others. \nMicrosoft Exchange Server Remote Code Execution Vulnerability (ProxyShell) | CVE-2021-34473 | 20 | 100 | Allows an unauthenticated user to run arbitrary commands on the exchange server. Can be clubbed with other CVE\u2019s CVE-2021-34523 and CVE-2021-31207 making it more attractive to cybercriminals. \nArbitrary file write vulnerability in Exchange | CVE-2021-27065 | 19 | 95 | Requires authentication that can then write arbitrary file write vulnerability in Exchange. Leveraged as part of the attack chain once an attacker has initial access. Exploited by Hafnium group among others. \nMicrosoft Exchange Server Remote Code Execution Vulnerability (ProxyShell) | CVE-2021-34523 | 17 | 100 | Allows an unauthenticated user to run arbitrary commands on the exchange server. Can be chained with other CVE\u2019s CVE-2021-34473 and CVE-2021-31207 making it more attractive to cybercriminals. \nMicrosoft Exchange Server Remote Code Execution Vulnerability (ProxyShell) | CVE-2021-31207 | 17 | 95 | Allows an unauthenticated user to run arbitrary commands on the exchange server. Can be chained with other CVE\u2019s CVE-2021-34473 and CVE-2021-31207 making it more attractive to cybercriminals. \n \nTable 1. Top 10 Vulnerabilities Exploited by Threat Actors for High-Risk Vulnerabilities\n\n## Top Ten Highly Active Threat Actors\n\nNext, let\u2019s talk about some of the most active threat actors known to leverage the maximum number of vulnerabilities as part of their arsenal capable of compromising systems across the globe.\n\n[](<https://ik.imagekit.io/qualys/wp-content/uploads/2023/07/Fig-3-Most-Active-Threat-Actors.png>)Fig 3. Most Active Threat Actors for High-Risk Vulnerabilities\n\n**Threat Actor ** | **CVEs Exploited ** | **Description ** \n---|---|--- \nEquation Group** ** | 51 | Uses a variety of malware, including backdoors, trojans, and rootkits, often targeting zero-day vulnerabilities. Such kinds of malware are often challenging to detect and remove. \nFancy Bear** ** | 44 | Best known as APT28 or Sofacy, it uses advanced malware and spear-phishing tactics. The group is also known for using \u201cwatering hole\u201d attacks. In 2016, APT28 reportedly attempted to interfere with the U.S. presidential elections. \nWicked Panda** ** | 30 | Also known by Axiom, Winnti, APT41, or Bronze Atlas. This group conducts financially motivated operations. It's been observed to target healthcare, telecom, technology, and video game industries in 14 countries. \nRicochet Chollima** ** | 26 | Also known as APT37, Reaper, and ScarCruft, they primarily target financial institutions, academics, and journalists. \nLabyrinth Chollima** ** | 24 | This is a sub-group of the Lazarus Group that has been attributed to the Reconnaissance General Bureau. It was reportedly responsible for the November 2014 destructive wiper attack against Sony Pictures Entertainment as part of a known campaign called The Operation Blockbuster campaign by Novetta. \nStardust Chollima** ** | 22 | Also known as BlueNoroff, it is a sub-group of the Lazarus Group and has been attributed to the Reconnaissance General Bureau, target banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at least 38 countries worldwide. \nCarbon Spider** ** | 22 | Also known as Carbanak, FIN7, and Anunak, this threat actor is a financially motivated threat group that targets the U.S. retail, restaurant, and hospitality sectors, often using point-of-sale malware. \nCozy Bear** ** | 20 | Also known as APT29, often targets government networks in Europe and NATO member countries, research institutes, and think tanks. \nAPT37** ** | 20 | It is also linked to the following campaigns between 2016-2018: Operation Daybreak, Operation Erebus, Golden Time, Evil New Year, Are You Happy? FreeMilk, North Korean Human Rights, and Evil New Year 2018. \n | | \n \nTable 2. Most Active Threat Actors for High-Risk Vulnerabilities \n\n## Top Ten Most Exploited Vulnerabilities by Malware\n\nNow, let\u2019s check some of the commonly exploited vulnerabilities by malware.\n\n[](<https://ik.imagekit.io/qualys/wp-content/uploads/2023/07/Fig-4-Top-10-Vulnerabilities-Exploited-by-Malwares.png>)Fig 4. Top Ten Vulnerabilities Exploited by Malware for High-Risk Vulnerabilities\n\nTitle | CVEs | Malware Count | TruRisk Score (QVS) | Description \n---|---|---|---|--- \nMicrosoft Office Equation Editor Remote Code Execution Vulnerability | CVE-2017-11882 | 467 | 100 | The absolute granddaddy of all CVEs most exploited by malware. \nIn the history of CVEs, this would be the most beloved malware CVE of all time. \nMicrosoft Office/WordPad Remote Code Execution Vulnerability | CVE-2017-0199 | 92 | 100 | [Allows a malicious actor to download Visual Basic script containing PowerShell commands. Works reliably well across a wide attack surface. Popular with APT Groups.](<https://www.fireeye.com/blog/threat-research/2017/04/cve-2017-0199-hta-handler.html>) \nJava Applet Field Bytecode Verifier Cache RCE | CVE-2012-1723 | 91 | 100 | Exploits the vulnerability in JRE to download and install files of an attacker\u2019s choice onto the system. \nMicrosoft Office Remote Code Execution Vulnerability | CVE-2017-8570 | 52 | 100 | [Executes remote code by tricking the user to open a malicious RTF file. Bypasses the patch from CVE-2017-0199. Known to be used in malware spam campaigns.](<https://www.zscaler.com/blogs/security-research/cve-2017-8570-and-cve-2018-0802-exploits-being-used-spread-lokibot>) \nWindows Graphics Device Interface (GDI) RCE | CVE-2019-0903 | 30 | 93 | Exploits vulnerability in the Graphics Component which is fundamental part of the Windows OS used for rendering graphics. \nMicrosoft Office Memory Corruption Vulnerability | CVE-2018-0802 | 29 | 100 | Exploits a vulnerability that was not patched by CVE-2017-11882. \nMicrosoft Exchange Server Remote Code Execution Vulnerability (ProxyLogon) | CVE-2021-26855 | 19 | 100 | [Allows an unauthenticated user to run arbitrary commands on the exchange server in its default configuration. Heavily exploited by Hafnium group among others.](<https://www.microsoft.com/en-us/security/blog/2021/03/02/hafnium-targeting-exchange-servers/>) \nMicrosoft Windows Netlogon Privilege Escalation (ZeroLogon) | CVE-2020-1472 | 17 | 100 | Allows an unauthenticated attacker with network access to a domain controller to completely compromise all Active Directory identity services. \nLets the attacker instantly become an admin on enterprise networks. \nMicrosoft Windows CryptoAPI Spoofing Vulnerability | CVE-2020-0601 | 17 | 95 | Enables attackers to execute spoofing attacks, masquerading malicious programs as legitimate software, apparently authenticated with a genuine digital signature. \nThis essentially allows for the delivery of malware under the guise of legitimate software. \nMicrosoft Exchange Server Remote Code Execution Vulnerability (ProxyShell) | CVE-2021-34473 | 12 | 100 | Allows an unauthenticated user to run arbitrary commands on the exchange server. \nIt can be chained with other CVE\u2019s CVE-2021-34523 and CVE-2021-31207 making it more attractive to cybercriminals. \n \nTable 3. Top Ten Vulnerabilities Exploited by Malware for High-Risk Vulnerabilities\n\n## Top Ten Most Active Malware\n\nAnd here\u2019s a list of the ten most common malware names that are known to exploit vulnerabilities that compromise systems.\n\n[](<https://ik.imagekit.io/qualys/wp-content/uploads/2023/07/Fig-5-Most-Active-Malwares.png>)Fig 5. Most Active Malware for High-Risk Vulnerabilities\n\nMalware | CVEs Count | Description \n---|---|--- \nHeuristic | 117 | Heuristic viruses can refer to malware detected by heuristic analysis or the virus Heur. The Invader, which compromises a device\u2019s security and antivirus measures. Some examples of heuristic viruses include adware and Trojans. \nWacatac | 94 | Also known as Trojan: Win32/Wacatac.B, is a trojan horse that is designed to steal personal information, such as passwords, credit card numbers, and other sensitive data. \nPidief | 73 | Pidief malware is a file infector, that can infect executable files, such as .exe files, it will modify the file to execute the Pidief malware. \nSkeeyah | 52 | Skeeyah malware is a file infector that can infect executable files, such as .exe files. It will modify the file in a way that will execute the Skeeyah malware when the file is opened. \nBitrep | 49 | Trojan horse virus that infiltrates a computer via a vulnerability in Adobe Flash. Swifi is downloaded from a malicious website without user knowledge or consent and may cause performance degradation, and security malfunctions leading to unauthorized users gaining remote access \nMeterpreter | 46 | Meterpreter is a malicious trojan-type program that allows cyber criminals to remotely control infected computers, without writing anything to disk. This malware can log keystrokes - recording keyboard input (keys pressed) to steal credentials (logins, passwords) linked with various accounts and personal information. \nSwifi | 42 | Trojan horse virus that infiltrates a computer via a vulnerability in Adobe Flash. Swifi is downloaded from a malicious website without user knowledge or consent, and may cause performance degradation, and security malfunctions leading to unauthorized users gaining remote access \nIFrame | 38 | The iframes are used to inject malicious content into a website and can be spread through malicious websites that contain iframes with malicious content. \nLotoor | 35 | It can infect Android devices, often spread through malicious apps available on third-party app stores. These apps may appear to be legitimate, but they actually contain the Lotoor malware. \nRedirector | 34 | Redirects users to malicious websites without their knowledge or consent. This type of malware can be very dangerous, leading users to download other malicious software or enter personal information. \n \nTable 4. Most Active Malware for High-Risk Vulnerabilities\n\n## Top Ten Vulnerabilities Exploited by Ransomware\n\nLastly, let's examine the vulnerabilities that ransomware tends to exploit. **Ransomware is a particular type of malware that encrypts data on storage systems, rendering them inaccessible unless the victim pays a ransom, typically in Bitcoin.** Since the notorious WannaCry crypto-ransomware incident in May 2017, the use of such malicious software has notably escalated.\n\nThe latest report on such escalating threat involves a data breach during a MOVEit transfer, for which the BlackCat ransomware gang claimed responsibility. This same group alleges to be behind the data theft attack on Reddit.\n\n[](<https://ik.imagekit.io/qualys/wp-content/uploads/2023/07/Fig-6-Top-10-Vulnerabilities-Exploited-by-Ransomware.png>)Fig 6. Top Ten Vulnerabilities Exploited by Ransomware for High-Risk Vulnerabilities\n\n**Title** | **CVEs** | **Ransomware Count** | **TruRisk** **Score (QVS)** | **Description** \n---|---|---|---|--- \nMicrosoft Office Equation Editor Remote Code Execution Vulnerability | CVE-2017-11882 | 14 | 100 | Allows an unauthenticated attacker to exploit the vulnerability in SMBv1 to completely compromise systems. It was used by the [WannaCry crypto worm](<https://en.wikipedia.org/wiki/WannaCry_ransomware_attack>) as part of a worldwide cyberattack. \nJava AtomicReferenceArray deserialization RCE | CVE-2012-0507 | 42 | 100 | Exploits the vulnerability in JRE to download and install files of an attacker\u2019s choice onto the system by tricking the user to visit a malicious link. Old CVE, but still relevant. \nJava Applet Field Bytecode Verifier Cache RCE | CVE-2012-1723 | 13 | 100 | Exploits the vulnerability in JRE to download and install files of an attacker\u2019s choice onto the system. \nWindows SMB v1 Remote Code Execution (WannaCry) | CVE-2017-0145 | 13 | 100 | Allows an unauthenticated, remote attacker to read arbitrary files allowing the attacker to access private keys or user/password information, which is then used to gain further unauthorized access. \nMicrosoft Exchange Server Remote Code Execution Vulnerability (ProxyShell) | CVE-2021-34473 | 12 | 100 | Allows an unauthenticated user to run arbitrary commands on the exchange server. It Can be chained with other CVE\u2019s CVE-2021-34523 and CVE-2021-31207 making it more attractive to cybercriminals. \nPulse Connect Secure SSL VPN Vulnerability | CVE-2019-11510 | 12 | 100 | Allows an unauthenticated attacker to exploit the vulnerability in SMBv1 that completely compromises systems. It was leveraged by the WannaCry crypto worm as part of a worldwide cyberattack. \nWindows SMB v1 Remote Code Execution (WannaCry) | CVE-2017-0144 | 12 | 95 | Allows an unauthenticated attacker with network access to a domain controller to completely compromise all Active Directory identity services. It lets the attacker instantly become an admin on enterprise networks. \nMicrosoft Windows Netlogon Privilege Escalation (ZeroLogon) | CVE-2020-1472 | 11 | 93 | Allows an unauthenticated attacker with network access to a domain controller to completely compromise all Active Directory identity services. It lets the attacker instantly become an admin on enterprise networks. \nMicrosoft Exchange Server Remote Code Execution Vulnerability (ProxyShell) | CVE-2021-34523 | 10 | 100 | Allows an unauthenticated attacker with network access to a domain controller to completely compromise all Active Directory identity services. \nIt lets the attacker instantly become an admin on enterprise networks. \nCitrix Application Delivery Controller/NetScaler RCE | CVE-2019-19781 | 10 | 100 | Allows an unauthenticated attacker to execute arbitrary code on the system. Was leveraged to drop NOTROBIN malware to maintain persistent access. \n \nTable 5. Top 10 Vulnerabilities Exploited by Ransomware for High-Risk Vulnerabilities\n\n[](<https://ik.imagekit.io/qualys/wp-content/uploads/2023/07/Fig-7-Most-Active-Ransomwares.png>)Fig 7. Most Active Ransomware for High-Risk Vulnerabilities\n\n**Ransomware** | **CVEs** **Count** | **Description** \n---|---|--- \n**Conti** | 30 | "Conti" is a Ransomware-as-a-Service (RaaS) targeting corporations and agencies by stealing and threatening to publish their sensitive data unless a ransom is paid. It uses unique encryption keys for each file and victim and leverages the Windows Restart Manager to unlock files for encryption. \n**Cerber** | 30 | This modular ransomware can spread through email attachments, exploit kits, and drive-by downloads. It encrypts files and demands a ransom payment in Bitcoin. \n**REvil** | 25 | This modular ransomware can spread through email attachments, exploit kits, and drive-by downloads. It encrypts files and demands a ransom payment in Bitcoin. \n**Sodinokibi** | 21 | A successor to REvil that is even more sophisticated. It can encrypt files on all types of devices, including servers, laptops, and mobile phones. \n**Lucky** | 21 | This ransomware is known for its aggressive spam campaigns. It sends emails with malicious attachments that, when opened, infect the victim's computer with ransomware. \n**GandCrab** | 19 | This ransomware is known for its high ransom demands. It has targeted businesses in various industries, including healthcare, finance, and manufacturing. \n**Ryuk** | 17 | This ransomware is known for its high ransom demands. It has targeted businesses in various industries, including healthcare, finance, and manufacturing. \n**Reveton** | 16 | Known for its scareware tactics, this ransomware displays a fake warning message claiming the victim's computer has been infected with malware. The message demands that the victim pay a ransom to remove the malware. \n**STOP** | 15 | Ransomware operators are known to be aggressive and persistent, often threatening to release stolen data or to attack systems again if the ransom is not paid. \n**Satan** | 15 | Satan ransomware can be very high, and there is no guarantee that victims will get their data back even if they pay the ransom. Used in attacks against high-profile organizations, healthcare, education, government, and businesses of all sizes. \n \nTable 6. Most Active Ransomware for High-Risk Vulnerabilities\n\n## Prioritizing Exploited Vulnerabilities with The Qualys VMDR and TruRisk\n\nOftentimes, malicious actors frequently target diverse sets of vulnerabilities to accomplish their objectives. As such, keeping track of who is exploiting what can be daunting, and it's certainly not an efficient use of the time for practitioners or security & risk management leaders.\n\nHence, **The Qualys VMDR with TruRisk** facilitates this process, substantially simplifying the prioritization process by translating the risk associated with vulnerabilities, assets, and asset groups into an easily understandable score that both technical and non-technical teams can comprehend this scoring system.\n\nWhen you carefully observe, each vulnerability mentioned above has a TruRisk Score (QVS) of over 90. TruRisk considers these factors daily, consistently assigning a score higher than 90.\n\nSo, from a prioritization standpoint, any issue with a score of 90 or above should be immediately prioritized and remedied.\n\nLet\u2019s take CVE-2017-11882 as an example. The TruRisk score clearly indicates why this is a high-risk vulnerability, with more than 400 malware and 50 threat actors exploiting it, and **we see evidence of exploitation as recently as July 16th, 2023, for a 6-year-old vulnerability. **\n\n[](<https://ik.imagekit.io/qualys/wp-content/uploads/2023/07/Fig-8-Microsoft-Office-Memory-Corruption-Vulnerability_-CVE-2017-11882.jpg>)\n\nFig 8. Microsoft Office Memory Corruption Vulnerability: CVE-2017-11882\n\n## Assess Your Organizations Exposure to Risk / TruRisk Dashboard\n\nThe Qualys VMDR helps organizations get instant visibility into high-risk vulnerabilities, especially those exploited in the wild.\n\n[](<https://ik.imagekit.io/qualys/wp-content/uploads/2023/07/Fig-9-1.jpg>)\n\nFig 9. Qualys VMDR TruRisk Dashboard for High-Risk Vulnerabilities\n\nThe fastest method to gain insights into your TruRisk is by downloading and importing the TruRisk Dashboard into your VMDR subscription.\n\nThe TruRisk VMDR Dashboard is available \u2013 [Download the Dashboard Here](<https://blog.qualys.com/wp-content/uploads/2023/07/Qualys_VMDR_TruRisk__UDDashboard.zip>)\n\nAnd once you have the visibility patch with Qualys Patch management instantly reduce the risk.\n\n## Key Insights & Takeaways\n\n * The time to Known Exploited Vulnerability (KEV) is down to eight days for CVEs published in 2023. Defenders should leverage automation to patch high-risk vulnerabilities.\n * CVE-2017-11882 stands out as the pinnacle among CVEs in its exploitation by malware, threat actors, and ransomware groups. With over 400 malware, 50 threat actors, and 14 ransomware groups taking advantage of this vulnerability, it will likely be remembered as the most cherished attacker CVE ever.\n * Attackers prominently exploit vulnerabilities in popular applications such as Microsoft Office, Microsoft Exchange, Windows Operating systems, Java, Pulse Secure SSL VPN, and Citrix ADC/NetScaler. Attackers seek these applications** primarily due to their widespread usage and potential for exploiting security weaknesses.**\n * Organizations should leverage threat intelligence to prioritize vulnerabilities that reduce the risk of exploitation.\n * The Qualys VMDR with TruRisk automatically prioritizes vulnerabilities exploited in the wild with a **TruRisk score of 90 or higher,** greatly simplifying the prioritization process.\n\nConcluding this series in the next blog we will discuss the _**15 most exploited vulnerabilitie**_**_s ever_**.\n\nWatch out for our next blog.\n\n## References\n\n * <https://blog.qualys.com/product-tech/2023/07/11/an-in-depth-look-at-the-latest-vulnerability-threat-landscape-part-1>\n * <https://blog.qualys.com/qualys-insights/2022/10/10/in-depth-look-into-data-driven-science-behind-qualys-trurisk>\n * <https://blog.qualys.com/vulnerabilities-threat-research/2022/12/16/implement-risk-based-vulnerability-management-with-qualys-trurisk-part-2>\n * <https://blog.qualys.com/qualys-insights/2022/08/08/a-deep-dive-into-vmdr-2-0-with-qualys-trurisk>\n\n## Additional Contributor\n\nShreya Salvi, Data Scientist, Qualys", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 10.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2023-07-18T13:38:53", "type": "qualysblog", "title": "Part 2: An In-Depth Look at the Latest Vulnerability Threat Landscape (Attackers\u2019 Edition)", "bulletinFamily": "blog", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-0158", "CVE-2012-0507", "CVE-2012-1723", "CVE-2017-0144", "CVE-2017-0145", "CVE-2017-0199", "CVE-2017-11882", "CVE-2017-8570", "CVE-2018-0802", "CVE-2019-0903", "CVE-2019-11510", "CVE-2019-19781", "CVE-2020-0601", "CVE-2020-1472", "CVE-2021-26855", "CVE-2021-27065", "CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523", "CVE-2021-44228"], "modified": "2023-07-18T13:38:53", "id": "QUALYSBLOG:1D4C1F32168D08F694C602531AEBC9D9", "href": "https://blog.qualys.com/category/vulnerabilities-threat-research", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-09-22T16:37:11", "description": "The earlier blog posts showcased an overview of the **vulnerability threat landscape** that is either remotely exploited or most targeted by attackers._ _A quick recap \u2013 We focused on high-risk vulnerabilities that can be remotely exploited with or without authentication, and with the view on the time to CISA being down to 8 days, the most vulnerabilities targeted by threat actors, malware & ransomware.\n\nThis blog post will focus on **Qualys\u2019 Top Twenty Vulnerabilities, **targeted by threat actors, malware, and ransomware, with recent trending/sightings observed in the last few years and the current year.\n\nSome of these vulnerabilities are part of the recent [**CISA Joint Cybersecurity Advisory (CSA)**](<https://www.cisa.gov/news-events/alerts/2023/08/03/cisa-nsa-fbi-and-international-partners-release-joint-csa-top-routinely-exploited-vulnerabilities>)**,** published on August 3, 2023; you can access it from [**2022 Top Routinely Exploited Vulnerabilities**](<https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a>)**.**\n\nRead on- \n\n## Stats on the Top 20 Vulnerable Vendors & By-Products\n\n**Fig 1. Top Vulnerable Vendor**\n\n**Fig 2. Top Vulnerable Products**\n\n## Top Twenty Most Targeted by Attackers\n\n### **1. CVE-2017-11882: Microsoft Office Memory Corruption Vulnerability**\n\n**Vulnerability Trending Over Years: 2018, 2020, 2021, 2022, 2023 (79 times)**\n\nIt was exploited by 467 Malware, 53 Threat Actors, and 14 Ransomware and was trending in the wild as recently as August 31, 2023. \n\n**In the "Additional Routinely Exploited Vulnerabilities in 2022" list, published by CISA earlier.**\n\n**Qualys Vulnerability Detection (QID): 110308**\n\nDisclosed in 2017, CVE-2017-11882 is a **significant memory corruption vulnerability** in Microsoft Office's Equation Editor. It could enable an attacker to execute arbitrary code under the current user's permissions. \n\nIf the user has administrative rights, the attacker could gain complete control of the system, install programs, alter data, or create new user accounts with full privileges. This vulnerability will be exploited if the user opens a specially crafted file, potentially sent via email or hosted on a compromised website.\n\nIt\u2019s been primarily exploited in various cyber-attacks and espionage campaigns.\n\n### 2\\. **CVE-2017-0199: Microsoft Wordpad Remote Code Execution Vulnerability**\n\n**Vulnerability Trending Over Years: 2017, 2020, 2021, 2023 (59 times)**\n\nIt was exploited by 93 Malware, 53 Threat Actors, and 5 Ransomware and was trending in the wild as recently as September 4, 2023.\n\n**Qualys Vulnerability Detection (QID): 110297**\n\n**In the "Additional Routinely Exploited Vulnerabilities in 2022" list, published by CISA earlier.**\n\nCVE-2017-0199 is a notable remote code execution vulnerability that affects specific Microsoft Office and WordPad versions precisely when they parse specially crafted files. This vulnerability is the most favored vulnerability by malware, threat actors, and ransomware. \n\nIf successfully exploited, an attacker could execute arbitrary code in the current user's security context, potentially taking control of the system. Exploitation involves a user opening or previewing a maliciously crafted file, often sent via email. Microsoft has addressed this vulnerability by correcting how Office and WordPad parse these files and by enabling certain API functionality in Windows for further resolution.\n\n### 3\\. **CVE-2012-0158: Vulnerability in Windows Common Controls Could Allow RCE**\n\n**Vulnerability Trending Over Years: 2013, 2020, 2021, 2023 (33 times)**\n\nIt was exploited by 63 Malware, 45 Threat Actors, 2 Ransomware and was trending in the wild as recently as August 31, 2023.\n\n**Qualys Vulnerability Detection (QID): 90793**\n\nCVE-2012-0158 is a substantial remote code execution vulnerability in Windows standard controls. An attacker can exploit the flaw by constructing a specially crafted webpage. Upon viewing this webpage, the vulnerability can allow remote code execution, potentially granting the attacker the same rights as the logged-on user. \n\nIf the user has administrative privileges, this could mean total control of the affected system. Disclosed in 2012, this vulnerability has been notably exploited in various cyber-attacks, enabling attackers to install programs, manipulate data, or create new accounts with full user rights.\n\n### 4\\. **CVE-2017-8570: Microsoft Office Remote Code Execution Vulnerability**\n\n**Vulnerability Trending Over Years: 2018, 2020, 2023 (25 times)**\n\nIt was exploited by 52 Malware 11 Threat Actors and was trending in the wild as recently as September 2, 2023\n\n**Qualys Vulnerability Detection (QID): 110300**\n\nCVE-2017-8570 is a significant remote code execution vulnerability in Microsoft Office and WordPad. It involves the way these applications handle specially crafted files. It can be exploited by an attacker who convinces a user to open a specially designed file, potentially allowing the attacker to run arbitrary code on the victim's machine with the same privileges as the logged-in user and serving as a downloader to other high-profile malware.\n\n### 5\\. **CVE-2020-1472: Zerologon - An Unauthenticated Privilege Escalation to Full Domain Privileges**\n\n**Vulnerability Trending Over Years: 2020, 2021, 2022, 2023 (56 times)**\n\nIt was exploited by 18 Malware, 16 Threat Actors, 11 Ransomware and was trending in the wild as recently as September 4, 2023.\n\n**Qualys Vulnerability Detection (QID):** **91680**\n\n**In the "Additional Routinely Exploited Vulnerabilities in 2022" list, published by CISA earlier. **\n\nCVE-2020-1472, or **Zerologon, is a severe vulnerability in Microsoft's Netlogon Remote Protocol** due to a flawed implementation of AES-CFB8 encryption.\n\nUsing a fixed initialization vector and accepting unencrypted sessions allows an attacker to impersonate a server and compromise the entire Windows domain. The attacker takes control over all the Active Directory identity services.\n\n### 6\\. **CVE-2017-0144, CVE-2017-0145, CVE-2017-0143: Windows SMBv1 Remote Code Execution Vulnerability WannaCry, Petya**\n\n**Vulnerability Trending Over Years: 2017, 2020, 2021, 2023 (50 times)**\n\nIt was exploited by 12 Malware, 10 Threat Actors, and 12 Ransomware and was trending in the wild as recently as September 1, 2023.\n\n**Qualys Vulnerability Detection (QID): 91361, 91360, 91359, 91345**\n\nCommonly known as Shadow Broker or MS17-010, or "ETERNALBLUE," or "ETERNALSYNERGY" or "ETERNAL ROMANCE" is a remote code execution vulnerability in Microsoft's Server Message Block 1.0 (SMBv1) protocol.\n\nThe vulnerability arises from how SMBv1 handles specific requests, allowing an attacker(usually authenticated) to send a specially crafted packet to an SMBv1 server, enabling them to execute code on the target server.\n\nIt was infamously exploited in the widespread WannaCry ransomware attack in 2017, leading to global data encryption and ransom demands.\n\n### 7\\. **CVE-2012-1723: Java Applet Field Bytecode Verifier Cache Remote Code Execution**\n\n**Vulnerability Trending Over Years: 2023 (6 times)**\n\nIt was exploited by 91 Malware, 8 Threat Actors, 41 Ransomware and was trending in the wild as recently as August 17, 2023.\n\n**Qualys Vulnerability Detection (QID): 120274**\n\nCVE-2012-1723 is a substantial vulnerability found in the Java Runtime Environment. It can be exploited through a malicious web page, hosting a rogue Java applet can be exploited through a malicious web page hosting rogue Java applet.\n\nThe issue, originating from a type-confusion error in the "HotSpot" component, allows untrusted Java applets or applications to bypass the Java sandbox security restrictions and execute arbitrary code on a user's system\n\n### 8\\. **CVE-2021-34473, CVE-2021-34523, CVE-2021-31207: Microsoft Exchange Server RCE (ProxyShell)**\n\n**Vulnerability Trending Over Years: 2021, 2022, 2023 (39 times)**\n\nIt was exploited by 12 Malware, 20 Threat Actors, and 12 Ransomware and was trending in the wild as recently as September 2, 2023.\n\n**Qualys Vulnerability Detection (QID): 50114, 50111, 50112**\n\n**In the "Top 12 Routinely Exploited Vulnerabilities in 2022" list, published by CISA earlier. **\n\nProxyShell, a chain of vulnerabilities that impacts on-premises Microsoft Exchange Servers, is widely used for email and associated services globally.\n\nThese vulnerabilities exist in the Microsoft Client Access Service (CAS), typically running on port 443 in IIS, often exposed to the internet to allow users to access their email remotely. This exposure has led to widespread exploitation by threat actors deploying web shells to execute arbitrary code on compromised devices. They allow an actor to bypass authentication and execute code as a privileged user.\n\n### 9\\. **CVE-2019-11510: Pulse Secure Pulse Connect Secure SSL VPN Unauthenticated Path**\n\n**Vulnerability Trending Over Years: 2019, 2020, 2023 (53 times)**\n\nIt was exploited by 13 Malware, 18 Threat Actors, and 12 Ransomware and was trending in the wild as recently as September 4, 2023.\n\n**Qualys Vulnerability Detection (QID): 38771**\n\n**In the "Additional Routinely Exploited Vulnerabilities in 2022" list, published by CISA earlier.**\n\nCVE-2019-11510 is a critical vulnerability found in Pulse Connect Secure, a widely used VPN solution by Pulse Secure. The flaw enables an unauthenticated, remote attacker to exploit a specific endpoint and read arbitrary files on the system, including sensitive information such as private keys and user credentials.\n\nDue to its severity, It can provide an attacker with similar access to the corporate network as a legitimate user.\n\n### 10\\. **CVE-2021-44228: Apache Log4j Remote Code Execution Vulnerability**\n\n**Vulnerability Trending Over Years: 2021, 2022, 2023 (77 times)**\n\nIt was exploited by 10 Malware, 26 Threat Actors, and 5 Ransomware and was trending in the wild as recently as September 4, 2023.\n\n**Qualys Vulnerability Detection (QID): 376157, 730297**\n\n**In the "Top 12 Routinely Exploited Vulnerabilities in 2022" list, published by CISA earlier.**\n\nCVE-2021-44228, or "Log4Shell," is a severe vulnerability in Apache's log4j Java library. The flaw exploits the 'lookups' feature of log4j, enabling an attacker to use a specially crafted input to trigger the execution of a remote Java class on an LDAP server, leading to Remote Code Execution.\n\nThis issue is highly dangerous if the user input containing specific characters is logged by log4j. It can trigger Java method lookup, resulting in the execution of a user-defined remote Java class on an LDAP server, leading to Remote Code Execution (RCE) on the server running the vulnerable log4j instance.\n\n### 11\\. **CVE-2014-6271: Shellshock \u2013 Linux Bash Vulnerability**\n\n**Vulnerability Trending Over Years: 2014, 2016, 2017, 2020, 2021, 2022, 2023 (70 times)**\n\nIt was exploited by 18 Malware, 1 Threat Actors, and was trending in the wild as recently as September 2, 2023.\n\n**Qualys Vulnerability Detection (QID): 122693, 13038, 150134**\n\nShellshock (CVE-2014-6271) is a critical vulnerability affecting the Unix Bash shell in many Linux, Unix, and Mac OS systems. It allows remote code execution by misusing Bash's processing of environment variables, enabling attackers to append and execute malicious commands. It has a high severity score since it can impact multiple devices and applications, risking unauthorized data access or service disruption,\n\n### 12\\. **CVE-2018-8174: Windows VBScript Engine Remote Code Execution Vulnerability**\n\n**Vulnerability Trending Over Years: 2018, 2020, 2023 (30 times)**\n\nIt was exploited by 21 Malware, 10 Threat Actors, and 7 Ransomware and was trending in the wild as recently as September 4, 2023.\n\n**Qualys Vulnerability Detection (QID): 91447**\n\nCVE-2018-8174 is a critical vulnerability in Microsoft Windows' VBScript Engine, enabling remote code execution. Triggered by viewing a malicious website with Internet Explorer or opening a rigged Microsoft Office document, this flaw allows an attacker to manipulate memory objects and execute code. \nThe attacker can fully control the system if the user has administrative rights.** \n**\n\n### 13\\. **CVE-2013-0074: Microsoft Silverlight Could Allow Remote Code Execution**\n\n**Vulnerability Trending Over Years**_**: **_**2023 (8 times)**\n\nIt was exploited by 62 Malware 50 Ransomware and was trending in the wild as recently as August 20, 2023.\n\n**Qualys Vulnerability Detection (QID): 90870**\n\nCVE-2013-0074 is a remote code execution vulnerability in Microsoft Silverlight, which permits a crafted Silverlight application to access memory unsafely, thereby leading to the execution of arbitrary code under the current user\u2019s security context.\n\nIf the user has admin rights, the attacker installs programs, alters or deletes data, or generates new accounts with full privileges. The user can be deceived into visiting a malicious website or clicking on a link, commonly through an email or instant message.\n\n### 14\\. **CVE-2012-0507: Oracle Java SE Remote Java Runtime Environment Vulnerability**\n\n**Vulnerability Trending Over Years: 2023 (10 times)**\n\nIt was exploited by 66 Malware, 3 Threat Actors, and 42 Ransomware and was trending in the wild as recently as July 26, 2023.\n\n**Qualys Vulnerability Detection (QID): 119956**\n\nCVE-2012-0507 is a critical vulnerability in the Java Runtime Environment (JRE) allowing untrusted Java applets to execute arbitrary code outside the Java sandbox. Originating from a flaw in the AtomicReferenceArray class implementation, **this vulnerability was exploited by Flashback Trojan in 2012**. It was observed to have led to one of the most significant known malware attacks on Apple devices. Attackers can exploit this vulnerability by tricking users into visiting a malicious website hosting a Java applet.\n\n### 15\\. **CVE-2019-19781: Citrix ADC and Citrix Gateway - Remote Code Execution (RCE) Vulnerability**\n\n**Vulnerability Trending Over Years: 2020, 2022, 2023 (60 times)**\n\nIt was exploited by 11 Malware, 12 Threat Actors, and 10 Ransomware and was trending in the wild as recently as September 4, 2023.\n\n**Qualys Vulnerability Detection (QID): 372305, 150273**\n\n**In the "Additional Routinely Exploited Vulnerabilities in 2022" list, published by CISA earlier.**\n\nCVE-2019-19781, or "Shitrix," is a significant vulnerability associated with Citrix Application Delivery Controller (ADC) and Citrix Gateway, allowing unauthenticated attackers to perform arbitrary code execution, granting them access to internal network resources.\n\nThe flaw resides in the VPN component of the affected products, enabling directory traversal and giving attackers both read and write access to the underlying file system.\n\n### 16\\. **CVE-2018-0802: Microsoft Office Memory Corruption Vulnerability**\n\n**Vulnerability Trending Over Years: 2021, 2022, 2023 (19 times)**\n\nExploited by 29 Malware 24 Threat Actors, and was trending in the wild as recently as September 2, 2023.\n\n**Qualys Vulnerability Detection (QID): 110310**\n\nCVE-2018-0802 is a critical vulnerability within Microsoft Office and WordPad, which, if exploited, allows remote code execution via specially crafted files.\n\nAttackers can run arbitrary code in the current user's context, potentially taking over the system if the user holds administrative rights. This vulnerability was notably used in targeted attacks and was being actively exploited before Microsoft released a security update in January 2018 that correctly handles objects in memory, resolving the issue.\n\n### 17\\. **CVE-2021-26855: Microsoft Exchange Server Authentication Bypass (RCE)**\n\n**Vulnerability Trending Over Years:** **2021, 2023 (46 times)**\n\nIt was exploited by 19 Malware, 22 Threat Actors, and 9 Ransomware and was trending in the wild as recently as September 2, 2023.\n\n**Qualys Vulnerability Detection (QID): 50107, 50108**\n\n**In the "Additional Routinely Exploited Vulnerabilities in 2022" list, published by CISA earlier.**\n\nCVE-2021-26855, a part of the ProxyLogon exploit chain, is a server-side request forgery (SSRF) vulnerability in Microsoft Exchange Server that enables attackers to bypass authentication mechanisms and impersonate users.\n\nThe flaw allows arbitrary HTTP requests, granting access to users' mailboxes and enabling information theft. It has been widely exploited by various threat actors, leading to emergency patches by Microsoft.\n\n### 18\\. **CVE-2019-2725: Oracle WebLogic Affected by Unauthenticated RCE Vulnerability**\n\n**Vulnerability Trending Over Years: 2019, 2020, 2022, 2023 (53 times)** \n\nIt was exploited by 10 Malware, 4 Threat Actors, 9 Ransomware and was trending in the wild as recently as September 4, 2023.\n\n**Qualys Vulnerability Detection (QID): 150267, 87386** \n\nCVE-2019-2725 is a severe remote code execution vulnerability in Oracle WebLogic Server that allows unauthenticated attackers to execute arbitrary code over a network without user interaction. It was quickly weaponized to install cryptocurrency miners. \n\n### 19\\. **CVE-2018-13379: Fortinet FortiGate (FortiOS) System File Leak through Secure Sockets Layer (SSL)**\n\n**Vulnerability Trending Over Years: 2020, 2021, 2023 (41 times)** \n\nIt was exploited by 6 Malware, 13 Threat Actors, 6 Ransomware and was trending in the wild as recently as August 30, 2023.\n\n**Qualys Vulnerability Detection (QID): 43702** \n\n**In the "Top 12 Routinely Exploited Vulnerabilities in 2022" list, published by CISA earlier. **\n\nCVE-2018-13379 is a path traversal vulnerability found in the Fortinet FortiOS SSL VPN web portal. An unauthenticated attacker can read sensitive system files via specially crafted HTTP requests. The exploit could expose SSL VPN session data, leading to more severe attacks. \n\n### 20\\. CVE-2021-26084: Atlassian Confluence Server Webwork OGNL Injection RCE Vulnerability\n\n**Vulnerability Trending Over Years: 2021, 2022, 2023 (35 times)**\n\nIt was exploited by 8 Malware, 6 Threat Actors, and 8 Ransomware and was trending in the wild as recently as September 2, 2023.\n\n**Qualys Vulnerability Detection (QID): 730172, 150368, 375839**\n\n**In the "Top 12 Routinely Exploited Vulnerabilities in 2022" list, published by CISA earlier.**\n\nCVE-2021-26084 is a critical vulnerability in Atlassian's Confluence Server and Data Center, specifically within the Webwork OGNL component. This vulnerability can enable an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance, potentially compromising system integrity.\n\n## TruRisk Dashboard\n\nThe Qualys VMDR helps organizations get instant visibility into high-risk and top twenty vulnerabilities.\n\n[](<https://ik.imagekit.io/qualys/wp-content/uploads/2023/09/Blog-3.jpg>)Fig 3. Qualys VMDR TruRisk Dashboard for Top 20 Vulnerabilities\n\nThe **Qualys VMDR TruRisk Dashboard** helps organizations to have complete visibility into open vulnerabilities that focus on the organization\u2019s global risk score and high-risk vulnerabilities with your organization\u2019s global risk score and high-risk vulnerabilities. Once you identify the vulnerable assets for these top twenty CVEs prioritized among your remediation owners, you can use Qualys Patch management to instantly reduce the risk.\n\nThe TruRisk VMDR Dashboard is available \u2013 [Download the Dashboard Here](<https://blog.qualys.com/wp-content/uploads/2023/09/Qualys_VMDR_TruRisk__Dashboard.zip>)\n\n## Key Insights & Takeaways\n\n * In the current Vulnerability Threat Landscape, identifying open vulnerabilities and effective remediation is the highest priority for every defender.\n * Among the vast scale of the CVEs available, you need to know the weaponized high-risk vulnerabilities that are actively targeted by Threat Actors, Malware, and ransomware families.\n * Use multi-dimensional Threat Intelligence to prioritize vulnerabilities rather than implementing multiple siloed threat approaches.\n * The Qualys VMDR with TruRisk automatically prioritizes vulnerabilities exploited in the wild with a TruRisk score of 90 or higher, greatly simplifying the prioritization process.\n\n## References\n\n * [Part 1: An In-Depth Look at the Latest Vulnerability Threat Landscape](<https://blog.qualys.com/product-tech/2023/07/11/an-in-depth-look-at-the-latest-vulnerability-threat-landscape-part-1>)\n * [Part 2: An In-Depth Look at the Latest Vulnerability Threat Landscape (Attackers\u2019 Edition)](<https://blog.qualys.com/vulnerabilities-threat-research/2023/07/18/part-2-an-in-depth-look-at-the-latest-vulnerability-threat-landscape-attackers-edition>)\n\n## Additional Contributors\n\n * **Shreya Salvi, Data Scientist, Qualys**\n * **Saeed Abbasi, Product Manager, Vulnerability Research**", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 10.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2023-09-04T14:00:00", "type": "qualysblog", "title": "Qualys Top 20 Most Exploited Vulnerabilities", "bulletinFamily": "blog", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-0158", "CVE-2012-0507", "CVE-2012-1723", "CVE-2013-0074", "CVE-2014-6271", "CVE-2017-0143", "CVE-2017-0144", "CVE-2017-0145", "CVE-2017-0199", "CVE-2017-11882", "CVE-2017-8570", "CVE-2018-0802", "CVE-2018-13379", "CVE-2018-8174", "CVE-2019-11510", "CVE-2019-19781", "CVE-2019-2725", "CVE-2020-1472", "CVE-2021-26084", "CVE-2021-26855", "CVE-2021-31207", "CVE-2021-34473", "CVE-2021-34523", "CVE-2021-44228"], "modified": "2023-09-04T14:00:00", "id": "QUALYSBLOG:6AFD8E9AB405FBE460877D857273A9AF", "href": "https://blog.qualys.com/category/vulnerabilities-threat-research", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-11-09T06:36:02", "description": "[Start your VMDR 30-day, no-cost trial today](<https://www.qualys.com/forms/vmdr/>)\n\n## Overview\n\nOn November 3, 2021, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a [Binding Operational Directive 22-01](<https://cyber.dhs.gov/bod/22-01/>), "Reducing the Significant Risk of Known Exploited Vulnerabilities." [This directive](<https://www.cisa.gov/news/2021/11/03/cisa-releases-directive-reducing-significant-risk-known-exploited-vulnerabilities>) recommends urgent and prioritized remediation of the vulnerabilities that adversaries are actively exploiting. It establishes a CISA-managed catalog of known exploited vulnerabilities that carry significant risk to the federal government and establishes requirements for agencies to remediate these vulnerabilities.\n\nThis directive requires agencies to review and update agency internal vulnerability management procedures within 60 days according to this directive and remediate each vulnerability according to the timelines outlined in 'CISA's vulnerability catalog.\n\nQualys helps customers to identify and assess risk to organizations' digital infrastructure and automate remediation. Qualys' guidance for rapid response to Operational Directive is below.\n\n## Directive Scope\n\nThis directive applies to all software and hardware found on federal information systems managed on agency premises or hosted by third parties on an agency's behalf.\n\nHowever, CISA strongly recommends that private businesses and state, local, tribal, and territorial (SLTT) governments prioritize the mitigation of vulnerabilities listed in CISA's public catalog.\n\n## CISA Catalog of Known Exploited Vulnerabilities\n\nIn total, CISA posted a list of [291 Common Vulnerabilities and Exposures (CVEs)](<https://www.cisa.gov/known-exploited-vulnerabilities-catalog>) that pose the highest risk to federal agencies. The Qualys Research team has mapped all these CVEs to applicable QIDs. You can view the complete list of CVEs and the corresponding QIDs [here](<https://success.qualys.com/discussions/s/article/000006791>).\n\n### Not all vulnerabilities are created equal\n\nOur quick review of the 291 CVEs posted by CISA suggests that not all vulnerabilities hold the same priority. CISA has ordered U.S. federal enterprises to apply patches as soon as possible. The remediation guidance can be grouped into three distinct categories:\n\n#### Category 1 \u2013 Past Due\n\nRemediation of 15 CVEs (~5%) are already past due. These vulnerabilities include some of the most significant exploits in the recent past, including PrintNightmare, SigRed, ZeroLogon, and vulnerabilities in CryptoAPI, Pulse Secure, and more. Qualys Patch Management can help you remediate most of these vulnerabilities.\n\n#### Category 2 \u2013 Patch in less than two weeks\n\n100 (34%) Vulnerabilities need to be patched in the next two weeks, or by **November 17, 2022**.\n\n#### Category 3 \u2013 Patch within six months\n\nThe remaining 176 vulnerabilities (60%) must be patched within the next six months or by **May 3, 2022**.\n\n## Detect CISA's Vulnerabilities Using Qualys VMDR\n\nThe Qualys Research team has released several remote and authenticated detections (QIDs) for the vulnerabilities. Since the directive includes 291 CVEs, we recommend executing your search based on vulnerability criticality, release date, or other categories.\n\nFor example, to detect critical CVEs released in 2021:\n\n_vulnerabilities.vulnerability.criticality:CRITICAL and vulnerabilities.vulnerability.cveIds:[ `CVE-2021-1497`,`CVE-2021-1498`,`CVE-2021-1647`,`CVE-2021-1675`,`CVE-2021-1732`,`CVE-2021-1782`,`CVE-2021-1870`,`CVE-2021-1871`,`CVE-2021-1879`,`CVE-2021-1905`,`CVE-2021-1906`,`CVE-2021-20016`,`CVE-2021-21017`,`CVE-2021-21148`,`CVE-2021-21166`,`CVE-2021-21193`,`CVE-2021-21206`,`CVE-2021-21220`,`CVE-2021-21224`,`CVE-2021-21972`,`CVE-2021-21985`,`CVE-2021-22005`,`CVE-2021-22205`,`CVE-2021-22502`,`CVE-2021-22893`,`CVE-2021-22894`,`CVE-2021-22899`,`CVE-2021-22900`,`CVE-2021-22986`,`CVE-2021-26084`,`CVE-2021-26411`,`CVE-2021-26855`,`CVE-2021-26857`,`CVE-2021-26858`,`CVE-2021-27059`,`CVE-2021-27065`,`CVE-2021-27085`,`CVE-2021-27101`,`CVE-2021-27102`,`CVE-2021-27103`,`CVE-2021-27104`,`CVE-2021-28310`,`CVE-2021-28550`,`CVE-2021-28663`,`CVE-2021-28664`,`CVE-2021-30116`,`CVE-2021-30551`,`CVE-2021-30554`,`CVE-2021-30563`,`CVE-2021-30632`,`CVE-2021-30633`,`CVE-2021-30657`,`CVE-2021-30661`,`CVE-2021-30663`,`CVE-2021-30665`,`CVE-2021-30666`,`CVE-2021-30713`,`CVE-2021-30761`,`CVE-2021-30762`,`CVE-2021-30807`,`CVE-2021-30858`,`CVE-2021-30860`,`CVE-2021-30860`,`CVE-2021-30869`,`CVE-2021-31199`,`CVE-2021-31201`,`CVE-2021-31207`,`CVE-2021-31955`,`CVE-2021-31956`,`CVE-2021-31979`,`CVE-2021-33739`,`CVE-2021-33742`,`CVE-2021-33771`,`CVE-2021-34448`,`CVE-2021-34473`,`CVE-2021-34523`,`CVE-2021-34527`,`CVE-2021-35211`,`CVE-2021-36741`,`CVE-2021-36742`,`CVE-2021-36942`,`CVE-2021-36948`,`CVE-2021-36955`,`CVE-2021-37973`,`CVE-2021-37975`,`CVE-2021-37976`,`CVE-2021-38000`,`CVE-2021-38003`,`CVE-2021-38645`,`CVE-2021-38647`,`CVE-2021-38647`,`CVE-2021-38648`,`CVE-2021-38649`,`CVE-2021-40444`,`CVE-2021-40539`,`CVE-2021-41773`,`CVE-2021-42013`,`CVE-2021-42258` ]_\n\n\n\nUsing [Qualys VMDR](<https://www.qualys.com/subscriptions/vmdr/>), you can effectively prioritize those vulnerabilities using the VMDR Prioritization report.\n\n\n\nIn addition, you can locate a vulnerable host through Qualys Threat Protection by simply clicking on the impacted hosts to effectively identify and track this vulnerability.\n\n\n\nWith Qualys Unified Dashboard, you can track your exposure to the CISA Known Exploited Vulnerabilities and gather your status and overall management in real-time. With trending enabled for dashboard widgets, you can keep track of the status of the vulnerabilities in your environment using the ["CISA 2010-21| KNOWN EXPLOITED VULNERABILITIES"](<https://success.qualys.com/support/s/article/000006791>) Dashboard.\n\n### Detailed Operational Dashboard:\n\n\n\n### Summary Dashboard High Level Structured by Vendor:\n\n\n\n## Remediation\n\nTo comply with this directive, federal agencies must remediate most "Category 2" vulnerabilities by **November 17, 2021**, and "Category 3" by May 3, 2021. Qualys Patch Management can help streamline the remediation of many of these vulnerabilities.\n\nCustomers can copy the following query into the Patch Management app to help customers comply with the directive's aggressive remediation date of November 17, 2021. Running this query will find all required patches and allow quick and efficient deployment of those missing patches to all assets directly from within the Qualys Cloud Platform.\n\ncve:[`CVE-2021-1497`,`CVE-2021-1498`,`CVE-2021-1647`,`CVE-2021-1675`,`CVE-2021-1732`,`CVE-2021-1782`,`CVE-2021-1870`,`CVE-2021-1871`,`CVE-2021-1879`,`CVE-2021-1905`,`CVE-2021-1906`,`CVE-2021-20016`,`CVE-2021-21017`,`CVE-2021-21148`,`CVE-2021-21166`,`CVE-2021-21193`,`CVE-2021-21206`,`CVE-2021-21220`,`CVE-2021-21224`,`CVE-2021-21972`,`CVE-2021-21985`,`CVE-2021-22005`,`CVE-2021-22205`,`CVE-2021-22502`,`CVE-2021-22893`,`CVE-2021-22894`,`CVE-2021-22899`,`CVE-2021-22900`,`CVE-2021-22986`,`CVE-2021-26084`,`CVE-2021-26411`,`CVE-2021-26855`,`CVE-2021-26857`,`CVE-2021-26858`,`CVE-2021-27059`,`CVE-2021-27065`,`CVE-2021-27085`,`CVE-2021-27101`,`CVE-2021-27102`,`CVE-2021-27103`,`CVE-2021-27104`,`CVE-2021-28310`,`CVE-2021-28550`,`CVE-2021-28663`,`CVE-2021-28664`,`CVE-2021-30116`,`CVE-2021-30551`,`CVE-2021-30554`,`CVE-2021-30563`,`CVE-2021-30632`,`CVE-2021-30633`,`CVE-2021-30657`,`CVE-2021-30661`,`CVE-2021-30663`,`CVE-2021-30665`,`CVE-2021-30666`,`CVE-2021-30713`,`CVE-2021-30761`,`CVE-2021-30762`,`CVE-2021-30807`,`CVE-2021-30858`,`CVE-2021-30860`,`CVE-2021-30860`,`CVE-2021-30869`,`CVE-2021-31199`,`CVE-2021-31201`,`CVE-2021-31207`,`CVE-2021-31955`,`CVE-2021-31956`,`CVE-2021-31979`,`CVE-2021-33739`,`CVE-2021-33742`,`CVE-2021-33771`,`CVE-2021-34448`,`CVE-2021-34473`,`CVE-2021-34523`,`CVE-2021-34527`,`CVE-2021-35211`,`CVE-2021-36741`,`CVE-2021-36742`,`CVE-2021-36942`,`CVE-2021-36948`,`CVE-2021-36955`,`CVE-2021-37973`,`CVE-2021-37975`,`CVE-2021-37976`,`CVE-2021-38000`,`CVE-2021-38003`,`CVE-2021-38645`,`CVE-2021-38647`,`CVE-2021-38647`,`CVE-2021-38648`,`CVE-2021-38649`,`CVE-2021-40444`,`CVE-2021-40539`,`CVE-2021-41773`,`CVE-2021-42013`,`CVE-2021-42258` ]\n\n\n\nQualys patch content covers many Microsoft, Linux, and third-party applications; however, some of the vulnerabilities introduced by CISA are not currently supported out-of-the-box by Qualys. To remediate those vulnerabilities, Qualys provides the ability to deploy custom patches. The flexibility to customize patch deployment allows customers to patch the remaining CVEs in this list.\n\nNote that the due date for \u201cCategory 1\u201d patches has already passed. To find missing patches in your environment for \u201cCategory 1\u201d past due CVEs, copy the following query into the Patch Management app:\n\ncve:['CVE-2021-1732\u2032,'CVE-2020-1350\u2032,'CVE-2020-1472\u2032,'CVE-2021-26855\u2032,'CVE-2021-26858\u2032,'CVE-2021-27065\u2032,'CVE-2020-0601\u2032,'CVE-2021-26857\u2032,'CVE-2021-22893\u2032,'CVE-2020-8243\u2032,'CVE-2021-22900\u2032,'CVE-2021-22894\u2032,'CVE-2020-8260\u2032,'CVE-2021-22899\u2032,'CVE-2019-11510']\n\n\n\n## Federal Enterprises and Agencies Can Act Now\n\nFor federal enterprises and agencies, it's a race against time to remediate these vulnerabilities across their respective environments and achieve compliance with this binding directive. Qualys solutions can help achieve compliance with this binding directive. Qualys Cloud Platform is FedRAMP authorized, with [107 FedRAMP authorizations](<https://marketplace.fedramp.gov/#!/product/qualys-cloud-platform?sort=-authorizations>).\n\nHere are a few steps Federal enterprises can take immediately:\n\n * Run vulnerability assessments against all your assets by leveraging various sensors such as Qualys agent, scanners, and more\n * Prioritize remediation by due dates\n * Identify all vulnerable assets automatically mapped into the threat feed\n * Use Patch Management to apply patches and other configurations changes\n * Track remediation progress through Unified Dashboards\n\n## Summary\n\nUnderstanding vulnerabilities is a critical but partial part of threat mitigation. Qualys VMDR helps customers discover, assess threats, assign risk, and remediate threats in one solution. Qualys customers rely on the accuracy of Qualys' threat intelligence to protect their digital environments and stay current with patch guidance. Using Qualys VMDR can help any organization efficiently respond to the CISA directive.\n\n## Getting Started\n\nLearn how [Qualys VMDR](<https://www.qualys.com/subscriptions/vmdr/>) provides actionable vulnerability guidance and automates remediation in one solution. Ready to get started? Sign up for a 30-day, no-cost [VMDR trial](<https://www.qualys.com/forms/vmdr/>).", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 10.0, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 6.0}, "published": "2021-11-09T06:15:01", "type": "qualysblog", "title": "Qualys Response to CISA Alert: Binding Operational Directive 22-01", "bulletinFamily": "blog", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-11510", "CVE-2020-0601", "CVE-2020-1350", "CVE-2020-1472", "CVE-2020-8243", "CVE-2020-8260", "CVE-2021-1497", "CVE-2021-1498", "CVE-2021-1647", "CVE-2021-1675", "CVE-2021-1732", "CVE-2021-1782", "CVE-2021-1870", "CVE-2021-1871", "CVE-2021-1879", "CVE-2021-1905", "CVE-2021-1906", "CVE-2021-20016", "CVE-2021-21017", "CVE-2021-21148", "CVE-2021-21166", "CVE-2021-21193", "CVE-2021-21206", "CVE-2021-21220", "CVE-2021-21224", "CVE-2021-21972", "CVE-2021-21985", "CVE-2021-22005", "CVE-2021-22205", "CVE-2021-22502", "CVE-2021-22893", "CVE-2021-22894", "CVE-2021-22899", "CVE-2021-22900", "CVE-2021-22986", "CVE-2021-26084", "CVE-2021-26411", "CVE-2021-26855", "CVE-2021-26857", "CVE-2021-26858", "CVE-2021-27059", "CVE-2021-27065", "CVE-2021-27085", "CVE-2021-27101", "CVE-2021-27102", "CVE-2021-27103", "CVE-2021-27104", "CVE-2021-28310", "CVE-2021-28550", "CVE-2021-28663", "CVE-2021-28664", "CVE-2021-30116", "CVE-2021-30551", "CVE-2021-30554", "CVE-2021-30563", "CVE-2021-30632", "CVE-2021-30633", "CVE-2021-30657", "CVE-2021-30661", "CVE-2021-30663", "CVE-2021-30665", "CVE-2021-30666", "CVE-2021-30713", "CVE-2021-30761", "CVE-2021-30762", "CVE-2021-30807", "CVE-2021-30858", "CVE-2021-30860", "CVE-2021-30869", "CVE-2021-31199", "CVE-2021-31201", "CVE-2021-31207", "CVE-2021-31955", "CVE-2021-31956", "CVE-2021-31979", "CVE-2021-33739", "CVE-2021-33742", "CVE-2021-33771", "CVE-2021-34448", "CVE-2021-34473", "CVE-2021-34523", "CVE-2021-34527", "CVE-2021-35211", "CVE-2021-36741", "CVE-2021-36742", "CVE-2021-36942", "CVE-2021-36948", "CVE-2021-36955", "CVE-2021-37973", "CVE-2021-37975", "CVE-2021-37976", "CVE-2021-38000", "CVE-2021-38003", "CVE-2021-38645", "CVE-2021-38647", "CVE-2021-38648", "CVE-2021-38649", "CVE-2021-40444", "CVE-2021-40539", "CVE-2021-41773", "CVE-2021-42013", "CVE-2021-42258"], "modified": "2021-11-09T06:15:01", "id": "QUALYSBLOG:BC22CE22A3E70823D5F0E944CBD5CE4A", "href": "https://blog.qualys.com/category/vulnerabilities-threat-research", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-02-25T19:27:09", "description": "_CISA released a directive in November 2021, recommending urgent and prioritized remediation of actively exploited vulnerabilities. Both government agencies and corporations should heed this advice. This blog outlines how Qualys Vulnerability Management, Detection & Response can be used by any organization to respond to this directive efficiently and effectively._\n\n### Situation\n\nLast November 2021, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a [Binding Operational Directive 22-01](<https://cyber.dhs.gov/bod/22-01/>) called \u201cReducing the Significant Risk of Known Exploited Vulnerabilities.\u201d [This directive](<https://www.cisa.gov/news/2021/11/03/cisa-releases-directive-reducing-significant-risk-known-exploited-vulnerabilities>) recommends urgent and prioritized remediation of the vulnerabilities that adversaries are actively exploiting. It establishes a CISA-managed catalog of Known Exploited Vulnerabilities that carry significant risk to the federal government and sets requirements for agencies to remediate these vulnerabilities.\n\nThis directive requires federal agencies to review and update internal vulnerability management procedures to remediate each vulnerability according to the timelines outlined in CISA\u2019s vulnerability catalog.\n\n### Directive Scope\n\nThis CISA directive applies to all software and hardware found on federal information systems managed on agency premises or hosted by third parties on an agency\u2019s behalf.\n\nHowever, CISA strongly recommends that public and private businesses as well as state, local, tribal, and territorial (SLTT) governments prioritize the mitigation of vulnerabilities listed in CISA\u2019s public catalog. This is truly vulnerability management guidance for all organizations to heed.\n\n### CISA Catalog of Known Exploited Vulnerabilities\n\nIn total, CISA posted a list of [379 Common Vulnerabilities and Exposures (CVEs)](<https://www.cisa.gov/known-exploited-vulnerabilities-catalog>) that pose the highest risk to federal agencies. CISA\u2019s most recent update was issued on February 22, 2022.\n\nThe Qualys Research team is continuously updating CVEs to available QIDs (Qualys vulnerability identifiers) in the Qualys Knowledgebase, with the RTI field \u201cCISA Exploited\u201d and this is going to be a continuous approach, as CISA frequently amends with the latest CVE as part of their regular feeds.\n\nOut of these vulnerabilities, Directive 22-01 urges all organizations to reduce their exposure to cyberattacks by effectively prioritizing the remediation of the identified Vulnerabilities.\n\nCISA has ordered U.S. federal agencies to apply patches as soon as possible. The remediation guidance is grouped into multiple categories by CISA based on attack surface severity and time-to-remediate. The timelines are available in the [Catalog](<https://www.cisa.gov/known-exploited-vulnerabilities-catalog>) for each of the CVEs.\n\n### Detect CISA Vulnerabilities Using Qualys VMDR\n\nQualys helps customers to identify and assess the risk to their organizations\u2019 digital infrastructure, and then to automate remediation. Qualys\u2019 guidance for rapid response to Directive 22-01 follows.\n\nThe Qualys Research team has released multiple remote and authenticated detections (QIDs) for these vulnerabilities. Since the directive includes 379 CVEs (as of February 22, 2022) we recommend executing your search based on QQL (Qualys Query Language), as shown here for released QIDs by Qualys **_vulnerabilities.vulnerability.threatIntel.cisaKnownExploitedVulns:"true"_**\n\n\n\n### CISA Exploited RTI\n\nUsing [Qualys VMDR](<https://www.qualys.com/subscriptions/vmdr/>), you can effectively prioritize those vulnerabilities using VMDR Prioritization. Qualys has introduced an **RTI Category, CISA Exploited**.\n\nThis RTI indicates that the vulnerabilities are associated with the CISA catalog.\n\n\n\nIn addition, you can locate a vulnerable host through Qualys Threat Protection by simply clicking on the impacted hosts to effectively identify and track this vulnerability.\n\n\n\nWith Qualys Unified Dashboard, you can track your exposure to CISA Known Exploited Vulnerabilities and track your status and overall management in real-time. With dashboard widgets, you can keep track of the status of vulnerabilities in your environment using the [\u201cCISA 2010-21| KNOWN EXPLOITED VULNERABILITIES\u201d](<https://success.qualys.com/support/s/article/000006791>) Dashboard.\n\n### Detailed Operational Dashboard\n\n\n\n### Remediation\n\nTo comply with this directive, federal agencies need to remediate all vulnerabilities as per the remediation timelines suggested in [CISA Catalog](<https://www.cisa.gov/known-exploited-vulnerabilities-catalog>)**.**\n\nQualys patch content covers many Microsoft, Linux, and third-party applications. However, some of the vulnerabilities introduced by CISA are not currently supported out-of-the-box by Qualys. To remediate those vulnerabilities, Qualys provides the ability to deploy custom patches. The flexibility to customize patch deployment allows customers to patch all the remaining CVEs in their list.\n\nCustomers can copy the following query into the Patch Management app to help customers comply with the directive\u2019s aggressive remediation timelines set by CISA. Running this query for specific CVEs will find required patches and allow quick and efficient deployment of those missing patches to all assets directly from within Qualys Cloud Platform.\n \n \n cve:[`CVE-2010-5326`,`CVE-2012-0158`,`CVE-2012-0391`,`CVE-2012-3152`,`CVE-2013-3900`,`CVE-2013-3906`,`CVE-2014-1761`,`CVE-2014-1776`,`CVE-2014-1812`,`CVE-2015-1635`,`CVE-2015-1641`,`CVE-2015-4852`,`CVE-2016-0167`,`CVE-2016-0185`,`CVE-2016-3088`,`CVE-2016-3235`,`CVE-2016-3643`,`CVE-2016-3976`,`CVE-2016-7255`,`CVE-2016-9563`,`CVE-2017-0143`,`CVE-2017-0144`,`CVE-2017-0145`,`CVE-2017-0199`,`CVE-2017-0262`,`CVE-2017-0263`,`CVE-2017-10271`,`CVE-2017-11774`,`CVE-2017-11882`,`CVE-2017-5638`,`CVE-2017-5689`,`CVE-2017-6327`,`CVE-2017-7269`,`CVE-2017-8464`,`CVE-2017-8759`,`CVE-2017-9791`,`CVE-2017-9805`,`CVE-2017-9841`,`CVE-2018-0798`,`CVE-2018-0802`,`CVE-2018-1000861`,`CVE-2018-11776`,`CVE-2018-15961`,`CVE-2018-15982`,`CVE-2018-2380`,`CVE-2018-4878`,`CVE-2018-4939`,`CVE-2018-6789`,`CVE-2018-7600`,`CVE-2018-8174`,`CVE-2018-8453`,`CVE-2018-8653`,`CVE-2019-0193`,`CVE-2019-0211`,`CVE-2019-0541`,`CVE-2019-0604`,`CVE-2019-0708`,`CVE-2019-0752`,`CVE-2019-0797`,`CVE-2019-0803`,`CVE-2019-0808`,`CVE-2019-0859`,`CVE-2019-0863`,`CVE-2019-10149`,`CVE-2019-10758`,`CVE-2019-11510`,`CVE-2019-11539`,`CVE-2019-1214`,`CVE-2019-1215`,`CVE-2019-1367`,`CVE-2019-1429`,`CVE-2019-1458`,`CVE-2019-16759`,`CVE-2019-17026`,`CVE-2019-17558`,`CVE-2019-18187`,`CVE-2019-18988`,`CVE-2019-2725`,`CVE-2019-8394`,`CVE-2019-9978`,`CVE-2020-0601`,`CVE-2020-0646`,`CVE-2020-0674`,`CVE-2020-0683`,`CVE-2020-0688`,`CVE-2020-0787`,`CVE-2020-0796`,`CVE-2020-0878`,`CVE-2020-0938`,`CVE-2020-0968`,`CVE-2020-0986`,`CVE-2020-10148`,`CVE-2020-10189`,`CVE-2020-1020`,`CVE-2020-1040`,`CVE-2020-1054`,`CVE-2020-1147`,`CVE-2020-11738`,`CVE-2020-11978`,`CVE-2020-1350`,`CVE-2020-13671`,`CVE-2020-1380`,`CVE-2020-13927`,`CVE-2020-1464`,`CVE-2020-1472`,`CVE-2020-14750`,`CVE-2020-14871`,`CVE-2020-14882`,`CVE-2020-14883`,`CVE-2020-15505`,`CVE-2020-15999`,`CVE-2020-16009`,`CVE-2020-16010`,`CVE-2020-16013`,`CVE-2020-16017`,`CVE-2020-17087`,`CVE-2020-17144`,`CVE-2020-17496`,`CVE-2020-17530`,`CVE-2020-24557`,`CVE-2020-25213`,`CVE-2020-2555`,`CVE-2020-6207`,`CVE-2020-6287`,`CVE-2020-6418`,`CVE-2020-6572`,`CVE-2020-6819`,`CVE-2020-6820`,`CVE-2020-8243`,`CVE-2020-8260`,`CVE-2020-8467`,`CVE-2020-8468`,`CVE-2020-8599`,`CVE-2021-1647`,`CVE-2021-1675`,`CVE-2021-1732`,`CVE-2021-21017`,`CVE-2021-21148`,`CVE-2021-21166`,`CVE-2021-21193`,`CVE-2021-21206`,`CVE-2021-21220`,`CVE-2021-21224`,`CVE-2021-22204`,`CVE-2021-22893`,`CVE-2021-22894`,`CVE-2021-22899`,`CVE-2021-22900`,`CVE-2021-26411`,`CVE-2021-26855`,`CVE-2021-26857`,`CVE-2021-26858`,`CVE-2021-27059`,`CVE-2021-27065`,`CVE-2021-27085`,`CVE-2021-28310`,`CVE-2021-28550`,`CVE-2021-30116`,`CVE-2021-30551`,`CVE-2021-30554`,`CVE-2021-30563`,`CVE-2021-30632`,`CVE-2021-30633`,`CVE-2021-31199`,`CVE-2021-31201`,`CVE-2021-31207`,`CVE-2021-31955`,`CVE-2021-31956`,`CVE-2021-31979`,`CVE-2021-33739`,`CVE-2021-33742`,`CVE-2021-33766`,`CVE-2021-33771`,`CVE-2021-34448`,`CVE-2021-34473`,`CVE-2021-34523`,`CVE-2021-34527`,`CVE-2021-35211`,`CVE-2021-35247`,`CVE-2021-36741`,`CVE-2021-36742`,`CVE-2021-36934`,`CVE-2021-36942`,`CVE-2021-36948`,`CVE-2021-36955`,`CVE-2021-37415`,`CVE-2021-37973`,`CVE-2021-37975`,`CVE-2021-37976`,`CVE-2021-38000`,`CVE-2021-38003`,`CVE-2021-38645`,`CVE-2021-38647`,`CVE-2021-38648`,`CVE-2021-38649`,`CVE-2021-40438`,`CVE-2021-40444`,`CVE-2021-40449`,`CVE-2021-40539`,`CVE-2021-4102`,`CVE-2021-41773`,`CVE-2021-42013`,`CVE-2021-42292`,`CVE-2021-42321`,`CVE-2021-43890`,`CVE-2021-44077`,`CVE-2021-44228`,`CVE-2021-44515`,`CVE-2022-0609`,`CVE-2022-21882`,`CVE-2022-24086`,`CVE-2010-1871`,`CVE-2017-12149`,`CVE-2019-13272` ]\n\n\n\nVulnerabilities can be validated through VMDR and a Patch Job can be configured for vulnerable assets.\n\n\n\n### Federal Enterprises and Agencies Can Act Now\n\nFor federal agencies and enterprises, it\u2019s a race against time to remediate these vulnerabilities across their respective environments and achieve compliance with this binding directive. Qualys solutions can help your organization to achieve compliance with this binding directive. Qualys Cloud Platform is FedRAMP authorized, with [107 FedRAMP authorizations](<https://marketplace.fedramp.gov/#!/product/qualys-cloud-platform?sort=-authorizations>) to our credit.\n\nHere are a few steps Federal entities can take immediately:\n\n * Run vulnerability assessments against all of your assets by leveraging our various sensors such as Qualys agent, scanners, and more\n * Prioritize remediation by due dates\n * Identify all vulnerable assets automatically mapped into the threat feed\n * Use Qualys Patch Management to apply patches and other configuration changes\n * Track remediation progress through our Unified Dashboards\n\n### Summary\n\nUnderstanding just which vulnerabilities exist in your environment is a critical but small part of threat mitigation. Qualys VMDR helps customers discover their exposure, assess threats, assign risk, and remediate threats \u2013 all in a single unified solution. Qualys customers rely on the accuracy of Qualys\u2019 threat intelligence to protect their digital environments and stay current with patch guidance. Using Qualys VMDR can help any size organization efficiently respond to CISA Binding Operational Directive 22-01.\n\n#### Getting Started\n\nLearn how [Qualys VMDR](<https://www.qualys.com/subscriptions/vmdr/>) provides actionable vulnerability guidance and automates remediation in one solution. Ready to get started? Sign up for a 30-day, no-cost [VMDR trial](<https://www.qualys.com/forms/vmdr/>).", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 10.0, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 6.0}, "published": "2022-02-23T05:39:00", "type": "qualysblog", "title": "Managing CISA Known Exploited Vulnerabilities with Qualys VMDR", "bulletinFamily": "blog", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1871", "CVE-2010-5326", "CVE-2012-0158", "CVE-2012-0391", "CVE-2012-3152", "CVE-2013-3900", "CVE-2013-3906", "CVE-2014-1761", "CVE-2014-1776", "CVE-2014-1812", "CVE-2015-1635", "CVE-2015-1641", "CVE-2015-4852", "CVE-2016-0167", "CVE-2016-0185", "CVE-2016-3088", "CVE-2016-3235", "CVE-2016-3643", "CVE-2016-3976", "CVE-2016-7255", "CVE-2016-9563", "CVE-2017-0143", "CVE-2017-0144", "CVE-2017-0145", "CVE-2017-0199", "CVE-2017-0262", "CVE-2017-0263", "CVE-2017-10271", "CVE-2017-11774", "CVE-2017-11882", "CVE-2017-12149", "CVE-2017-5638", "CVE-2017-5689", "CVE-2017-6327", "CVE-2017-7269", "CVE-2017-8464", "CVE-2017-8759", "CVE-2017-9791", "CVE-2017-9805", "CVE-2017-9841", "CVE-2018-0798", "CVE-2018-0802", "CVE-2018-1000861", "CVE-2018-11776", "CVE-2018-15961", "CVE-2018-15982", "CVE-2018-2380", "CVE-2018-4878", "CVE-2018-4939", "CVE-2018-6789", "CVE-2018-7600", "CVE-2018-8174", "CVE-2018-8453", "CVE-2018-8653", "CVE-2019-0193", "CVE-2019-0211", "CVE-2019-0541", "CVE-2019-0604", "CVE-2019-0708", "CVE-2019-0752", "CVE-2019-0797", "CVE-2019-0803", "CVE-2019-0808", "CVE-2019-0859", "CVE-2019-0863", "CVE-2019-10149", "CVE-2019-10758", "CVE-2019-11510", "CVE-2019-11539", "CVE-2019-1214", "CVE-2019-1215", "CVE-2019-13272", "CVE-2019-1367", "CVE-2019-1429", "CVE-2019-1458", "CVE-2019-16759", "CVE-2019-17026", "CVE-2019-17558", "CVE-2019-18187", "CVE-2019-18988", "CVE-2019-2725", "CVE-2019-8394", "CVE-2019-9978", "CVE-2020-0601", "CVE-2020-0646", "CVE-2020-0674", "CVE-2020-0683", "CVE-2020-0688", "CVE-2020-0787", "CVE-2020-0796", "CVE-2020-0878", "CVE-2020-0938", "CVE-2020-0968", "CVE-2020-0986", "CVE-2020-10148", "CVE-2020-10189", "CVE-2020-1020", "CVE-2020-1040", "CVE-2020-1054", "CVE-2020-1147", "CVE-2020-11738", "CVE-2020-11978", "CVE-2020-1350", "CVE-2020-13671", "CVE-2020-1380", "CVE-2020-13927", "CVE-2020-1464", "CVE-2020-1472", "CVE-2020-14750", "CVE-2020-14871", "CVE-2020-14882", "CVE-2020-14883", "CVE-2020-15505", "CVE-2020-15999", "CVE-2020-16009", "CVE-2020-16010", "CVE-2020-16013", "CVE-2020-16017", "CVE-2020-17087", "CVE-2020-17144", "CVE-2020-17496", "CVE-2020-17530", "CVE-2020-24557", "CVE-2020-25213", "CVE-2020-2555", "CVE-2020-6207", "CVE-2020-6287", "CVE-2020-6418", "CVE-2020-6572", "CVE-2020-6819", "CVE-2020-6820", "CVE-2020-8243", "CVE-2020-8260", "CVE-2020-8467", "CVE-2020-8468", "CVE-2020-8599", "CVE-2021-1647", "CVE-2021-1675", "CVE-2021-1732", "CVE-2021-21017", "CVE-2021-21148", "CVE-2021-21166", "CVE-2021-21193", "CVE-2021-21206", "CVE-2021-21220", "CVE-2021-21224", "CVE-2021-22204", "CVE-2021-22893", "CVE-2021-22894", "CVE-2021-22899", "CVE-2021-22900", "CVE-2021-26411", "CVE-2021-26855", "CVE-2021-26857", "CVE-2021-26858", "CVE-2021-27059", "CVE-2021-27065", "CVE-2021-27085", "CVE-2021-28310", "CVE-2021-28550", "CVE-2021-30116", "CVE-2021-30551", "CVE-2021-30554", "CVE-2021-30563", "CVE-2021-30632", "CVE-2021-30633", "CVE-2021-31199", "CVE-2021-31201", "CVE-2021-31207", "CVE-2021-31955", "CVE-2021-31956", "CVE-2021-31979", "CVE-2021-33739", "CVE-2021-33742", "CVE-2021-33766", "CVE-2021-33771", "CVE-2021-34448", "CVE-2021-34473", "CVE-2021-34523", "CVE-2021-34527", "CVE-2021-35211", "CVE-2021-35247", "CVE-2021-36741", "CVE-2021-36742", "CVE-2021-36934", "CVE-2021-36942", "CVE-2021-36948", "CVE-2021-36955", "CVE-2021-37415", "CVE-2021-37973", "CVE-2021-37975", "CVE-2021-37976", "CVE-2021-38000", "CVE-2021-38003", "CVE-2021-38645", "CVE-2021-38647", "CVE-2021-38648", "CVE-2021-38649", "CVE-2021-40438", "CVE-2021-40444", "CVE-2021-40449", "CVE-2021-40539", "CVE-2021-4102", "CVE-2021-41773", "CVE-2021-42013", "CVE-2021-42292", "CVE-2021-42321", "CVE-2021-43890", "CVE-2021-44077", "CVE-2021-44228", "CVE-2021-44515", "CVE-2022-0609", "CVE-2022-21882", "CVE-2022-24086"], "modified": "2022-02-23T05:39:00", "id": "QUALYSBLOG:0082A77BD8EFFF48B406D107FEFD0DD3", "href": "https://blog.qualys.com/category/product-tech", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2023-05-27T14:59:05", "description": "### *Detect date*:\n07/13/2021\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Exchange Server. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nMicrosoft Exchange Server 2019 Cumulative Update 10 \nMicrosoft Exchange Server 2019 Cumulative Update 9 \nMicrosoft Exchange Server 2013 Cumulative Update 23 \nMicrosoft Exchange Server 2016 Cumulative Update 20 \nMicrosoft Exchange Server 2019 Cumulative Update 8 \nMicrosoft Exchange Server 2016 Cumulative Update 19 \nMicrosoft Exchange Server 2016 Cumulative Update 21\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-31196](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31196>) \n[CVE-2021-34470](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34470>) \n[CVE-2021-31206](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31206>) \n[CVE-2021-34473](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34473>) \n[CVE-2021-34523](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34523>) \n[CVE-2021-33766](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33766>) \n[CVE-2021-33768](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33768>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Exchange Server](<https://threats.kaspersky.com/en/product/Microsoft-Exchange-Server/>)\n\n### *CVE-IDS*:\n[CVE-2021-31196](<https://vulners.com/cve/CVE-2021-31196>)6.5High \n[CVE-2021-34470](<https://vulners.com/cve/CVE-2021-34470>)5.2High \n[CVE-2021-31206](<https://vulners.com/cve/CVE-2021-31206>)7.5Critical \n[CVE-2021-34523](<https://vulners.com/cve/CVE-2021-34523>)7.5Critical \n[CVE-2021-33766](<https://vulners.com/cve/CVE-2021-33766>)5.0Critical \n[CVE-2021-33768](<https://vulners.com/cve/CVE-2021-33768>)5.2High\n\n### *KB list*:\n[5001779](<http://support.microsoft.com/kb/5001779>) \n[5004780](<http://support.microsoft.com/kb/5004780>) \n[5004778](<http://support.microsoft.com/kb/5004778>) \n[5004779](<http://support.microsoft.com/kb/5004779>) \n[5003611](<http://support.microsoft.com/kb/5003611>) \n[5003612](<http://support.microsoft.com/kb/5003612>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T00:00:00", "type": "kaspersky", "title": "KLA12224 Multiple vulnerabilities in Microsoft Exchange Server", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-33766", "CVE-2021-33768", "CVE-2021-34470", "CVE-2021-34473", "CVE-2021-34523"], "modified": "2021-07-30T00:00:00", "id": "KLA12224", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12224/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "checkpoint_advisories": [{"lastseen": "2022-10-04T10:05:38", "description": "A remote code execution vulnerability exists in Microsoft Exchange. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-14T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft Exchange Server Remote Code Execution (CVE-2021-34473; CVE-2021-34523)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-34473", "CVE-2021-34523"], "modified": "2022-09-30T00:00:00", "id": "CPAI-2021-0476", "href": "", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "mskb": [{"lastseen": "2023-06-23T19:38:35", "description": "None\nSecurity Update 1 for Exchange Server 2016 Cumulative Update 21 resolves vulnerabilities in Microsoft Exchange Server. To learn more about these vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE):\n\n * [CVE-2021-31196 | Microsoft Exchange Server Remote Code Execution Vulnerability](< https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-31196 >)\n * [CVE-2021-31206 | Microsoft Exchange Server Remote Code Execution Vulnerability](< https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-31206 >)\n * [CVE-2021-33768 | Microsoft Exchange Server Elevation of Privilege Vulnerability](< https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-33768 >)\nSecurity Update 3 for Exchange Server 2016 Cumulative Update 20 resolves vulnerabilities in Microsoft Exchange Server. To learn more about these vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE):\n * [CVE-2021-31196 | Microsoft Exchange Server Remote Code Execution Vulnerability](< https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-31196 >)\n * [CVE-2021-31206 | Microsoft Exchange Server Remote Code Execution Vulnerability](< https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-31206 >)\n\n## Improvements in this update\n\n * The Exchange Server version number is now added to the HTTP response reply header. You can use this information to validate the security update status of Exchange-based servers in your network.\n\n**Important: **To be able to successfully install this security update, you must first follow the steps [in this article](<https://docs.microsoft.com/en-us/exchange/troubleshoot/administration/cannot-access-owa-or-ecp-if-oauth-expired>) to make sure that the server authentication certificate is present and is not expired. If the OAuth certificate is not present or is expired, republish the certificate before you install this update.\n\n## Known issues in this update\n\n * **Issue 1 ** \n \nWhen you try to manually install this security update by double-clicking the update file (.msp) to run it in Normal mode (that is, not as an administrator), some files are not correctly updated.When this issue occurs, you don\u2019t receive an error message or any indication that the security update was not correctly installed. However, Outlook Web Access (OWA) and the Exchange Control Panel (ECP) might stop working. \n \nThis issue occurs on servers that are using User Account Control (UAC). The issue occurs because the security update doesn\u2019t correctly stop certain Exchange-related services.\n\n**Note: **This issue does not occur if you install the update through Microsoft Update.\n\nTo avoid this issue, follow these steps to manually install this security update:\n 1. Select ** Start ** , and type ** cmd ** .\n 2. In the results, right-click ** Command Prompt ** , and then select ** Run as administrator ** .\n 3. If the ** User Account Control ** dialog box appears, verify that the default action is the action that you want, and then select ** Continue ** .\n 4. Type the full path of the .msp file, and then press Enter.\n * **Issue 2 ** \n \nExchange services might remain in a disabled state after you install this security update. This condition does not indicate that the update is not installed correctly. This condition might occur if the service control scripts experience a problem when they try to return Exchange services to their usual state. \n \nTo fix this issue, use Services Manager to restore the startup type to ** Automatic ** , and then start the affected Exchange services manually. To avoid this issue, run the security update at an elevated command prompt. For more information about how to open an elevated Command Prompt window, see [Start a Command Prompt as an Administrator](< https://technet.microsoft.com/en-us/library/cc947813\\(v=ws.10\\).aspx >) .\n * **Issue 3 ** \n \nWhen you block third-party cookies in a web browser, you might be continually prompted to trust a particular add-in even though you keep selecting the option to trust it. This issue occurs also in privacy window modes (such as InPrivate mode in Microsoft Edge). This issue occurs because browser restrictions prevent the response from being recorded. To record the response and enable the add-in, you must enable third-party cookies for the domain that's hosting OWA or Office Online Server in the browser settings. To enable this setting, refer to the specific support documentation for the browser.\n * **Issue 4 ** \n \nWhen you try to request free/busy information for a user in a different forest in a trusted cross-forest topology, the request fails and generates a \"(400) Bad Request\" error message. For more information and workarounds to this issue, see [\"(400) Bad Request\" error during Autodiscover for per-user free/busy in a trusted cross-forest topology](< https://support.microsoft.com/help/5003623 >) .\n * **Issue 5 ** \n \nAfter you install Microsoft Exchange Server 2019, 2016, or 2013, you can't access Outlook Web App (OWA) or Exchange Control Panel (ECP). For more information, see [Can't sign in to Outlook on the web or EAC if Exchange Server OAuth certificate is expired](<https://docs.microsoft.com/en-us/exchange/troubleshoot/administration/cannot-access-owa-or-ecp-if-oauth-expired>).\n * **Issue 6** \n \nAfter you install the July 2021 security update for Microsoft Exchange Server 2019, 2016, or 2013, you can't log in to Outlook Web App (OWA) or Exchange Control Panel (ECP). For more information, see the following Exchange Team Blog article: [Released: July 2021 Exchange Server Security Updates](<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fexchange-team-blog%2Freleased-july-2021-exchange-server-security-updates%2Fba-p%2F2523421&data=04%7C01%7Cv-jesits%40microsoft.com%7C7ecb4109acd04763e8d508d96ca01c32%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637660257201444514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=01e7CnE8mV4FRgpq8BCYWcGTBJAqQ5eo22hawCuI86g%3D&reserved=0>).\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see [Windows Update: FAQ](< https://support.microsoft.com/help/12373/windows-update-faq >) .\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](< https://www.catalog.update.microsoft.com/Search.aspx?q=KB5004779 >) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center.\n\n * [Download Security Update 1 for Exchange Server 2016 Cumulative Update 21 (KB5003435)](< https://www.microsoft.com/download/details.aspx?familyid=ccf40c19-2653-4b5c-b922-d6d09bbf1c3e >)\n * [Download Security Update 3 for Exchange Server 2016 Cumulative Update 20 (KB5003435)](< https://www.microsoft.com/download/details.aspx?familyid=61d75c2f-8b98-4971-b22c-ebd114772d3d >)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: July 13, 2021](< https://support.microsoft.com/topic/24aa34b8-b210-41cf-adbb-44b8a9ae84dc >) .\n\n### Security update replacement information\n\nThis security update replaces the following previously released updates:\n\n * [Description of the security update for Microsoft Exchange Server 2019, 2016, and 2013: May 11, 2021 (KB5003435)](< https://support.microsoft.com/help/5003435 >)\n\n## File information\n\n### File hash information\n\nUpdate name| File name| | SHA256 hash \n---|---|---|--- \nExchange Server 2016 Cumulative Update 21| Exchange2016-KB5004779-x64-en.msp| | 02762E746E366C0C3884B6B822566D24B092DB858048BB6E853BBF0C634AB3D6 \nExchange Server 2016 Cumulative Update 20| Exchange2016-KB5004779-x64-en.msp| | A374A920744CF9A0F240546D56AC7BD3D5F1198AED5DFBECC01DA1487ED03D50 \n \n### Exchange Server file information\n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n### \n\n__\n\nMicrosoft Exchange Server 2016 Cumulative Update 21\n\nFile name| File version| File size| Date| Time| Platform \n---|---|---|---|---|--- \nActivemonitoringeventmsg.dll| 15.1.2308.14| 71,032| 07-Jul-2021| 09:10| x64 \nActivemonitoringexecutionlibrary.ps1| Not applicable| 29,518| 07-Jul-2021| 09:09| Not applicable \nAdduserstopfrecursive.ps1| Not applicable| 14,941| 07-Jul-2021| 09:15| Not applicable \nAdemodule.dll| 15.1.2308.14| 106,384| 07-Jul-2021| 09:11| x64 \nAirfilter.dll| 15.1.2308.14| 42,896| 07-Jul-2021| 09:11| x64 \nAjaxcontroltoolkit.dll| 15.1.2308.14| 92,560| 07-Jul-2021| 09:17| x86 \nAntispamcommon.ps1| Not applicable| 13,481| 07-Jul-2021| 09:13| Not applicable \nAsdat.msi| Not applicable| 5,087,232| 07-Jul-2021| 09:11| Not applicable \nAsentirs.msi| Not applicable| 77,824| 07-Jul-2021| 09:11| Not applicable \nAsentsig.msi| Not applicable| 73,728| 07-Jul-2021| 09:09| Not applicable \nBigfunnel.bondtypes.dll| 15.1.2308.14| 43,912| 07-Jul-2021| 09:15| x86 \nBigfunnel.common.dll| 15.1.2308.14| 63,864| 07-Jul-2021| 09:05| x86 \nBigfunnel.configuration.dll| 15.1.2308.14| 99,216| 07-Jul-2021| 09:31| x86 \nBigfunnel.entropy.dll| 15.1.2308.14| 44,408| 07-Jul-2021| 09:13| x86 \nBigfunnel.filter.dll| 15.1.2308.14| 54,152| 07-Jul-2021| 09:16| x86 \nBigfunnel.indexstream.dll| 15.1.2308.14| 54,160| 07-Jul-2021| 09:17| x86 \nBigfunnel.poi.dll| 15.1.2308.14| 203,640| 07-Jul-2021| 09:13| x86 \nBigfunnel.postinglist.dll| 15.1.2308.14| 122,232| 07-Jul-2021| 09:19| x86 \nBigfunnel.query.dll| 15.1.2308.14| 99,728| 07-Jul-2021| 09:09| x86 \nBigfunnel.ranking.dll| 15.1.2308.14| 79,248| 07-Jul-2021| 09:23| x86 \nBigfunnel.syntheticdatalib.dll| 15.1.2308.14| 3,634,552| 07-Jul-2021| 09:20| x86 \nBigfunnel.wordbreakers.dll| 15.1.2308.14| 46,472| 07-Jul-2021| 09:17| x86 \nCafe_airfilter_dll| 15.1.2308.14| 42,896| 07-Jul-2021| 09:11| x64 \nCafe_exppw_dll| 15.1.2308.14| 83,344| 07-Jul-2021| 09:13| x64 \nCafe_owaauth_dll| 15.1.2308.14| 92,040| 07-Jul-2021| 09:13| x64 \nCalcalculation.ps1| Not applicable| 42,129| 07-Jul-2021| 09:25| Not applicable \nCheckdatabaseredundancy.ps1| Not applicable| 94,618| 07-Jul-2021| 09:19| Not applicable \nChksgfiles.dll| 15.1.2308.14| 57,232| 07-Jul-2021| 09:18| x64 \nCitsconstants.ps1| Not applicable| 15,817| 07-Jul-2021| 09:18| Not applicable \nCitslibrary.ps1| Not applicable| 82,676| 07-Jul-2021| 09:18| Not applicable \nCitstypes.ps1| Not applicable| 14,472| 07-Jul-2021| 09:18| Not applicable \nClassificationengine_mce| 15.1.2308.14| 1,693,072| 07-Jul-2021| 09:13| Not applicable \nClusmsg.dll| 15.1.2308.14| 134,032| 07-Jul-2021| 09:09| x64 \nCoconet.dll| 15.1.2308.14| 48,016| 07-Jul-2021| 09:11| x64 \nCollectovermetrics.ps1| Not applicable| 81,656| 07-Jul-2021| 09:19| Not applicable \nCollectreplicationmetrics.ps1| Not applicable| 41,882| 07-Jul-2021| 09:19| Not applicable \nCommonconnectfunctions.ps1| Not applicable| 29,963| 07-Jul-2021| 11:24| Not applicable \nComplianceauditservice.exe| 15.1.2308.14| 39,824| 07-Jul-2021| 11:27| x86 \nConfigureadam.ps1| Not applicable| 22,776| 07-Jul-2021| 09:16| Not applicable \nConfigurecaferesponseheaders.ps1| Not applicable| 20,320| 07-Jul-2021| 09:15| Not applicable \nConfigurenetworkprotocolparameters.ps1| Not applicable| 19,782| 07-Jul-2021| 09:15| Not applicable \nConfiguresmbipsec.ps1| Not applicable| 39,840| 07-Jul-2021| 09:16| Not applicable \nConfigure_enterprisepartnerapplication.ps1| Not applicable| 22,295| 07-Jul-2021| 09:16| Not applicable \nConnectfunctions.ps1| Not applicable| 37,157| 07-Jul-2021| 11:24| Not applicable \nConnect_exchangeserver_help.xml| Not applicable| 30,432| 07-Jul-2021| 11:24| Not applicable \nConsoleinitialize.ps1| Not applicable| 24,224| 07-Jul-2021| 11:12| Not applicable \nConvertoabvdir.ps1| Not applicable| 20,065| 07-Jul-2021| 09:15| Not applicable \nConverttomessagelatency.ps1| Not applicable| 14,544| 07-Jul-2021| 09:16| Not applicable \nConvert_distributiongrouptounifiedgroup.ps1| Not applicable| 34,777| 07-Jul-2021| 09:16| Not applicable \nCreate_publicfoldermailboxesformigration.ps1| Not applicable| 27,924| 07-Jul-2021| 09:15| Not applicable \nCts.14.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts.14.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts.14.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts.14.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts.14.4.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts.15.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts.15.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts.15.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts.15.20.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts.8.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts.8.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts.8.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts_exsmime.dll| 15.1.2308.14| 380,808| 07-Jul-2021| 09:09| x64 \nCts_microsoft.exchange.data.common.dll| 15.1.2308.14| 1,686,896| 07-Jul-2021| 09:13| x86 \nCts_microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 511| 07-Jul-2021| 09:05| Not applicable \nCts_policy.14.0.microsoft.exchange.data.common.dll| 15.1.2308.14| 13,176| 07-Jul-2021| 09:13| x86 \nCts_policy.14.1.microsoft.exchange.data.common.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:11| x86 \nCts_policy.14.2.microsoft.exchange.data.common.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:13| x86 \nCts_policy.14.3.microsoft.exchange.data.common.dll| 15.1.2308.14| 13,192| 07-Jul-2021| 09:11| x86 \nCts_policy.14.4.microsoft.exchange.data.common.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:11| x86 \nCts_policy.15.0.microsoft.exchange.data.common.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:13| x86 \nCts_policy.15.1.microsoft.exchange.data.common.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:11| x86 \nCts_policy.15.2.microsoft.exchange.data.common.dll| 15.1.2308.14| 13,176| 07-Jul-2021| 09:05| x86 \nCts_policy.15.20.microsoft.exchange.data.common.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:13| x86 \nCts_policy.8.0.microsoft.exchange.data.common.dll| 15.1.2308.14| 12,664| 07-Jul-2021| 09:09| x86 \nCts_policy.8.1.microsoft.exchange.data.common.dll| 15.1.2308.14| 12,664| 07-Jul-2021| 09:10| x86 \nCts_policy.8.2.microsoft.exchange.data.common.dll| 15.1.2308.14| 12,688| 07-Jul-2021| 09:09| x86 \nCts_policy.8.3.microsoft.exchange.data.common.dll| 15.1.2308.14| 12,664| 07-Jul-2021| 09:11| x86 \nDagcommonlibrary.ps1| Not applicable| 60,238| 07-Jul-2021| 09:19| Not applicable \nDependentassemblygenerator.exe| 15.1.2308.14| 22,416| 07-Jul-2021| 09:13| x86 \nDiaghelper.dll| 15.1.2308.14| 66,944| 07-Jul-2021| 09:13| x86 \nDiagnosticscriptcommonlibrary.ps1| Not applicable| 16,346| 07-Jul-2021| 09:18| Not applicable \nDisableinmemorytracing.ps1| Not applicable| 13,374| 07-Jul-2021| 09:15| Not applicable \nDisable_antimalwarescanning.ps1| Not applicable| 15,201| 07-Jul-2021| 09:15| Not applicable \nDisable_outsidein.ps1| Not applicable| 13,666| 07-Jul-2021| 09:15| Not applicable \nDisklockerapi.dll| Not applicable| 22,392| 07-Jul-2021| 09:11| x64 \nDlmigrationmodule.psm1| Not applicable| 39,592| 07-Jul-2021| 09:15| Not applicable \nDsaccessperf.dll| 15.1.2308.14| 45,968| 07-Jul-2021| 09:10| x64 \nDscperf.dll| 15.1.2308.14| 32,656| 07-Jul-2021| 09:11| x64 \nDup_cts_microsoft.exchange.data.common.dll| 15.1.2308.14| 1,686,896| 07-Jul-2021| 09:13| x86 \nDup_ext_microsoft.exchange.data.transport.dll| 15.1.2308.14| 601,480| 07-Jul-2021| 09:39| x86 \nEcpperfcounters.xml| Not applicable| 31,132| 07-Jul-2021| 09:13| Not applicable \nEdgeextensibility_microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEdgeextensibility_policy.8.0.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:11| x86 \nEdgetransport.exe| 15.1.2308.14| 49,552| 07-Jul-2021| 10:40| x86 \nEext.14.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext.14.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext.14.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext.14.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext.14.4.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext.15.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext.15.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext.15.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext.15.20.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext.8.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext.8.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext.8.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 514| 07-Jul-2021| 09:07| Not applicable \nEext_policy.14.0.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,192| 07-Jul-2021| 09:11| x86 \nEext_policy.14.1.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,184| 07-Jul-2021| 09:09| x86 \nEext_policy.14.2.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,176| 07-Jul-2021| 09:11| x86 \nEext_policy.14.3.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:09| x86 \nEext_policy.14.4.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,176| 07-Jul-2021| 09:13| x86 \nEext_policy.15.0.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,192| 07-Jul-2021| 09:09| x86 \nEext_policy.15.1.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,176| 07-Jul-2021| 09:11| x86 \nEext_policy.15.2.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:09| x86 \nEext_policy.15.20.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,192| 07-Jul-2021| 09:09| x86 \nEext_policy.8.1.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,176| 07-Jul-2021| 09:09| x86 \nEext_policy.8.2.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,176| 07-Jul-2021| 09:13| x86 \nEext_policy.8.3.microsoft.exchange.data.transport.dll| 15.1.2308.14| 13,176| 07-Jul-2021| 09:10| x86 \nEnableinmemorytracing.ps1| Not applicable| 13,376| 07-Jul-2021| 09:15| Not applicable \nEnable_antimalwarescanning.ps1| Not applicable| 17,575| 07-Jul-2021| 09:16| Not applicable \nEnable_basicauthtooauthconverterhttpmodule.ps1| Not applicable| 18,600| 07-Jul-2021| 09:15| Not applicable \nEnable_crossforestconnector.ps1| Not applicable| 18,610| 07-Jul-2021| 09:15| Not applicable \nEnable_outlookcertificateauthentication.ps1| Not applicable| 22,928| 07-Jul-2021| 09:15| Not applicable \nEnable_outsidein.ps1| Not applicable| 13,659| 07-Jul-2021| 09:15| Not applicable \nEngineupdateserviceinterfaces.dll| 15.1.2308.14| 17,800| 07-Jul-2021| 09:25| x86 \nEscprint.dll| 15.1.2308.14| 20,368| 07-Jul-2021| 09:07| x64 \nEse.dll| 15.1.2308.14| 3,695,504| 07-Jul-2021| 09:15| x64 \nEseback2.dll| 15.1.2308.14| 325,000| 07-Jul-2021| 09:17| x64 \nEsebcli2.dll| 15.1.2308.14| 292,744| 07-Jul-2021| 09:13| x64 \nEseperf.dll| 15.1.2308.14| 116,088| 07-Jul-2021| 09:18| x64 \nEseutil.exe| 15.1.2308.14| 398,736| 07-Jul-2021| 09:17| x64 \nEsevss.dll| 15.1.2308.14| 44,408| 07-Jul-2021| 09:17| x64 \nEtweseproviderresources.dll| 15.1.2308.14| 82,296| 07-Jul-2021| 09:05| x64 \nEventperf.dll| 15.1.2308.14| 59,784| 07-Jul-2021| 09:07| x64 \nExchange.depthtwo.types.ps1xml| Not applicable| 40,132| 07-Jul-2021| 11:24| Not applicable \nExchange.format.ps1xml| Not applicable| 648,608| 07-Jul-2021| 11:24| Not applicable \nExchange.partial.types.ps1xml| Not applicable| 43,349| 07-Jul-2021| 11:24| Not applicable \nExchange.ps1| Not applicable| 20,783| 07-Jul-2021| 11:24| Not applicable \nExchange.support.format.ps1xml| Not applicable| 26,547| 07-Jul-2021| 11:14| Not applicable \nExchange.types.ps1xml| Not applicable| 365,145| 07-Jul-2021| 11:24| Not applicable \nExchangeudfcommon.dll| 15.1.2308.14| 121,736| 07-Jul-2021| 09:09| x86 \nExchangeudfs.dll| 15.1.2308.14| 269,712| 07-Jul-2021| 09:13| x86 \nExchmem.dll| 15.1.2308.14| 85,904| 07-Jul-2021| 09:09| x64 \nExchsetupmsg.dll| 15.1.2308.14| 19,344| 07-Jul-2021| 09:09| x64 \nExchucutil.ps1| Not applicable| 23,932| 07-Jul-2021| 09:15| Not applicable \nExdbfailureitemapi.dll| Not applicable| 27,016| 07-Jul-2021| 09:10| x64 \nExdbmsg.dll| 15.1.2308.14| 229,768| 07-Jul-2021| 09:09| x64 \nExeventperfplugin.dll| 15.1.2308.14| 25,488| 07-Jul-2021| 09:13| x64 \nExmime.dll| 15.1.2308.14| 364,944| 07-Jul-2021| 09:10| x64 \nExportedgeconfig.ps1| Not applicable| 27,403| 07-Jul-2021| 09:16| Not applicable \nExport_mailpublicfoldersformigration.ps1| Not applicable| 18,570| 07-Jul-2021| 09:15| Not applicable \nExport_modernpublicfolderstatistics.ps1| Not applicable| 28,866| 07-Jul-2021| 09:16| Not applicable \nExport_outlookclassification.ps1| Not applicable| 14,370| 07-Jul-2021| 09:11| Not applicable \nExport_publicfolderstatistics.ps1| Not applicable| 23,137| 07-Jul-2021| 09:15| Not applicable \nExport_retentiontags.ps1| Not applicable| 17,056| 07-Jul-2021| 09:15| Not applicable \nExppw.dll| 15.1.2308.14| 83,344| 07-Jul-2021| 09:13| x64 \nExprfdll.dll| 15.1.2308.14| 26,504| 07-Jul-2021| 09:13| x64 \nExrpc32.dll| 15.1.2308.14| 1,922,936| 07-Jul-2021| 09:19| x64 \nExrw.dll| 15.1.2308.14| 28,024| 07-Jul-2021| 09:09| x64 \nExsetdata.dll| 15.1.2308.14| 2,779,512| 07-Jul-2021| 09:25| x64 \nExsetup.exe| 15.1.2308.14| 35,192| 07-Jul-2021| 11:17| x86 \nExsetupui.exe| 15.1.2308.14| 193,424| 07-Jul-2021| 11:17| x86 \nExtrace.dll| 15.1.2308.14| 245,136| 07-Jul-2021| 09:07| x64 \nExt_microsoft.exchange.data.transport.dll| 15.1.2308.14| 601,480| 07-Jul-2021| 09:39| x86 \nExwatson.dll| 15.1.2308.14| 44,944| 07-Jul-2021| 09:10| x64 \nFastioext.dll| 15.1.2308.14| 60,280| 07-Jul-2021| 09:13| x64 \nFil06f84122c94c91a0458cad45c22cce20| Not applicable| 784,715| 07-Jul-2021| 12:43| Not applicable \nFil143a7a5d4894478a85eefc89a6539fc8| Not applicable| 1,909,229| 07-Jul-2021| 12:44| Not applicable \nFil19f527f284a0bb584915f9994f4885c3| Not applicable| 648,761| 07-Jul-2021| 12:43| Not applicable \nFil1a9540363a531e7fb18ffe600cffc3ce| Not applicable| 358,406| 07-Jul-2021| 12:44| Not applicable \nFil220d95210c8697448312eee6628c815c| Not applicable| 303,658| 07-Jul-2021| 12:44| Not applicable \nFil2cf5a31e239a45fabea48687373b547c| Not applicable| 652,727| 07-Jul-2021| 12:44| Not applicable \nFil397f0b1f1d7bd44d6e57e496decea2ec| Not applicable| 784,712| 07-Jul-2021| 12:43| Not applicable \nFil3ab126057b34eee68c4fd4b127ff7aee| Not applicable| 784,688| 07-Jul-2021| 12:44| Not applicable \nFil41bb2e5743e3bde4ecb1e07a76c5a7a8| Not applicable| 149,154| 07-Jul-2021| 12:44| Not applicable \nFil51669bfbda26e56e3a43791df94c1e9c| Not applicable| 9,346| 07-Jul-2021| 12:44| Not applicable \nFil558cb84302edfc96e553bcfce2b85286| Not applicable| 85,260| 07-Jul-2021| 12:43| Not applicable \nFil55ce217251b77b97a46e914579fc4c64| Not applicable| 648,755| 07-Jul-2021| 12:43| Not applicable \nFil5a9e78a51a18d05bc36b5e8b822d43a8| Not applicable| 1,597,359| 07-Jul-2021| 12:46| Not applicable \nFil5c7d10e5f1f9ada1e877c9aa087182a9| Not applicable| 1,597,359| 07-Jul-2021| 12:46| Not applicable \nFil6569a92c80a1e14949e4282ae2cc699c| Not applicable| 1,597,359| 07-Jul-2021| 12:46| Not applicable \nFil6a01daba551306a1e55f0bf6894f4d9f| Not applicable| 648,731| 07-Jul-2021| 12:43| Not applicable \nFil8863143ea7cd93a5f197c9fff13686bf| Not applicable| 648,761| 07-Jul-2021| 12:44| Not applicable \nFil8a8c76f225c7205db1000e8864c10038| Not applicable| 1,597,359| 07-Jul-2021| 12:46| Not applicable \nFil8cd999415d36ba78a3ac16a080c47458| Not applicable| 784,718| 07-Jul-2021| 12:43| Not applicable \nFil97913e630ff02079ce9889505a517ec0| Not applicable| 1,597,359| 07-Jul-2021| 12:46| Not applicable \nFilaa49badb2892075a28d58d06560f8da2| Not applicable| 785,742| 07-Jul-2021| 12:43| Not applicable \nFilae28aeed23ccb4b9b80accc2d43175b5| Not applicable| 648,758| 07-Jul-2021| 12:44| Not applicable \nFilb17f496f9d880a684b5c13f6b02d7203| Not applicable| 784,718| 07-Jul-2021| 12:44| Not applicable \nFilb94ca32f2654692263a5be009c0fe4ca| Not applicable| 2,564,949| 07-Jul-2021| 12:43| Not applicable \nFilbabdc4808eba0c4f18103f12ae955e5c| Not applicable| 342,779,309| 07-Jul-2021| 12:43| Not applicable \nFilc92cf2bf29bed21bd5555163330a3d07| Not applicable| 652,745| 07-Jul-2021| 12:44| Not applicable \nFilcc478d2a8346db20c4e2dc36f3400628| Not applicable| 784,718| 07-Jul-2021| 12:44| Not applicable \nFild26cd6b13cfe2ec2a16703819da6d043| Not applicable| 1,597,359| 07-Jul-2021| 12:46| Not applicable \nFilf2719f9dc8f7b74df78ad558ad3ee8a6| Not applicable| 785,724| 07-Jul-2021| 12:43| Not applicable \nFilfa5378dc76359a55ef20cc34f8a23fee| Not applicable| 1,427,187| 07-Jul-2021| 12:43| Not applicable \nFilteringconfigurationcommands.ps1| Not applicable| 18,243| 07-Jul-2021| 09:16| Not applicable \nFilteringpowershell.dll| 15.1.2308.14| 223,112| 07-Jul-2021| 09:27| x86 \nFilteringpowershell.format.ps1xml| Not applicable| 29,664| 07-Jul-2021| 09:27| Not applicable \nFiltermodule.dll| 15.1.2308.14| 180,088| 07-Jul-2021| 09:10| x64 \nFipexeuperfctrresource.dll| 15.1.2308.14| 15,248| 07-Jul-2021| 09:11| x64 \nFipexeventsresource.dll| 15.1.2308.14| 44,920| 07-Jul-2021| 09:09| x64 \nFipexperfctrresource.dll| 15.1.2308.14| 32,648| 07-Jul-2021| 09:13| x64 \nFirewallres.dll| 15.1.2308.14| 72,576| 07-Jul-2021| 09:07| x64 \nFms.exe| 15.1.2308.14| 1,350,024| 07-Jul-2021| 09:31| x64 \nForefrontactivedirectoryconnector.exe| 15.1.2308.14| 110,968| 07-Jul-2021| 09:09| x64 \nFpsdiag.exe| 15.1.2308.14| 18,824| 07-Jul-2021| 09:15| x86 \nFsccachedfilemanagedlocal.dll| 15.1.2308.14| 822,160| 07-Jul-2021| 09:09| x64 \nFscconfigsupport.dll| 15.1.2308.14| 56,696| 07-Jul-2021| 09:13| x86 \nFscconfigurationserver.exe| 15.1.2308.14| 430,984| 07-Jul-2021| 09:15| x64 \nFscconfigurationserverinterfaces.dll| 15.1.2308.14| 15,760| 07-Jul-2021| 09:18| x86 \nFsccrypto.dll| 15.1.2308.14| 208,784| 07-Jul-2021| 09:05| x64 \nFscipcinterfaceslocal.dll| 15.1.2308.14| 28,552| 07-Jul-2021| 09:05| x86 \nFscipclocal.dll| 15.1.2308.14| 38,288| 07-Jul-2021| 09:13| x86 \nFscsqmuploader.exe| 15.1.2308.14| 453,520| 07-Jul-2021| 09:18| x64 \nGetucpool.ps1| Not applicable| 19,787| 07-Jul-2021| 09:16| Not applicable \nGetvalidengines.ps1| Not applicable| 13,286| 07-Jul-2021| 09:18| Not applicable \nGet_antispamfilteringreport.ps1| Not applicable| 15,785| 07-Jul-2021| 09:13| Not applicable \nGet_antispamsclhistogram.ps1| Not applicable| 14,631| 07-Jul-2021| 09:13| Not applicable \nGet_antispamtopblockedsenderdomains.ps1| Not applicable| 15,703| 07-Jul-2021| 09:13| Not applicable \nGet_antispamtopblockedsenderips.ps1| Not applicable| 14,751| 07-Jul-2021| 09:13| Not applicable \nGet_antispamtopblockedsenders.ps1| Not applicable| 15,494| 07-Jul-2021| 09:13| Not applicable \nGet_antispamtoprblproviders.ps1| Not applicable| 14,681| 07-Jul-2021| 09:13| Not applicable \nGet_antispamtoprecipients.ps1| Not applicable| 14,786| 07-Jul-2021| 09:13| Not applicable \nGet_dleligibilitylist.ps1| Not applicable| 42,348| 07-Jul-2021| 09:15| Not applicable \nGet_exchangeetwtrace.ps1| Not applicable| 28,959| 07-Jul-2021| 09:16| Not applicable \nGet_publicfoldermailboxsize.ps1| Not applicable| 15,038| 07-Jul-2021| 09:15| Not applicable \nGet_storetrace.ps1| Not applicable| 50,607| 07-Jul-2021| 09:19| Not applicable \nHuffman_xpress.dll| 15.1.2308.14| 32,656| 07-Jul-2021| 09:10| x64 \nImportedgeconfig.ps1| Not applicable| 77,260| 07-Jul-2021| 09:16| Not applicable \nImport_mailpublicfoldersformigration.ps1| Not applicable| 29,492| 07-Jul-2021| 09:16| Not applicable \nImport_retentiontags.ps1| Not applicable| 28,830| 07-Jul-2021| 09:16| Not applicable \nInproxy.dll| 15.1.2308.14| 85,880| 07-Jul-2021| 09:10| x64 \nInstallwindowscomponent.ps1| Not applicable| 34,555| 07-Jul-2021| 09:25| Not applicable \nInstall_antispamagents.ps1| Not applicable| 17,905| 07-Jul-2021| 09:13| Not applicable \nInstall_odatavirtualdirectory.ps1| Not applicable| 17,959| 07-Jul-2021| 11:46| Not applicable \nInterop.activeds.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.1.2308.14| 107,408| 07-Jul-2021| 09:09| Not applicable \nInterop.adsiis.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.1.2308.14| 20,344| 07-Jul-2021| 09:09| Not applicable \nInterop.certenroll.dll| 15.1.2308.14| 142,736| 07-Jul-2021| 09:07| x86 \nInterop.licenseinfointerface.dll| 15.1.2308.14| 14,216| 07-Jul-2021| 09:19| x86 \nInterop.netfw.dll| 15.1.2308.14| 34,184| 07-Jul-2021| 09:05| x86 \nInterop.plalibrary.dll| 15.1.2308.14| 72,568| 07-Jul-2021| 09:05| x86 \nInterop.stdole2.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.1.2308.14| 27,000| 07-Jul-2021| 09:05| Not applicable \nInterop.taskscheduler.dll| 15.1.2308.14| 46,472| 07-Jul-2021| 09:07| x86 \nInterop.wuapilib.dll| 15.1.2308.14| 60,816| 07-Jul-2021| 09:07| x86 \nInterop.xenroll.dll| 15.1.2308.14| 39,800| 07-Jul-2021| 09:05| x86 \nKerbauth.dll| 15.1.2308.14| 62,840| 07-Jul-2021| 09:10| x64 \nLicenseinfointerface.dll| 15.1.2308.14| 643,448| 07-Jul-2021| 09:19| x64 \nLpversioning.xml| Not applicable| 20,446| 07-Jul-2021| 11:17| Not applicable \nMailboxdatabasereseedusingspares.ps1| Not applicable| 31,916| 07-Jul-2021| 09:19| Not applicable \nManagedavailabilitycrimsonmsg.dll| 15.1.2308.14| 138,632| 07-Jul-2021| 09:09| x64 \nManagedstorediagnosticfunctions.ps1| Not applicable| 125,853| 07-Jul-2021| 09:19| Not applicable \nManagescheduledtask.ps1| Not applicable| 36,332| 07-Jul-2021| 09:19| Not applicable \nMce.dll| 15.1.2308.14| 1,693,072| 07-Jul-2021| 09:13| x64 \nMeasure_storeusagestatistics.ps1| Not applicable| 29,499| 07-Jul-2021| 09:19| Not applicable \nMerge_publicfoldermailbox.ps1| Not applicable| 22,635| 07-Jul-2021| 09:16| Not applicable \nMicrosoft.database.isam.dll| 15.1.2308.14| 127,368| 07-Jul-2021| 09:19| x86 \nMicrosoft.dkm.proxy.dll| 15.1.2308.14| 26,000| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.activemonitoring.activemonitoringvariantconfig.dll| 15.1.2308.14| 68,472| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.activemonitoring.eventlog.dll| 15.1.2308.14| 17,808| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.addressbook.service.dll| 15.1.2308.14| 232,848| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.addressbook.service.eventlog.dll| 15.1.2308.14| 15,760| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.airsync.airsyncmsg.dll| 15.1.2308.14| 43,408| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.airsync.comon.dll| 15.1.2308.14| 1,775,504| 07-Jul-2021| 10:53| x86 \nMicrosoft.exchange.airsync.dll1| 15.1.2308.14| 505,736| 07-Jul-2021| 11:42| Not applicable \nMicrosoft.exchange.airsynchandler.dll| 15.1.2308.14| 76,168| 07-Jul-2021| 11:45| x86 \nMicrosoft.exchange.anchorservice.dll| 15.1.2308.14| 135,560| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.antispam.eventlog.dll| 15.1.2308.14| 23,416| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.antispamupdate.eventlog.dll| 15.1.2308.14| 15,736| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.antispamupdatesvc.exe| 15.1.2308.14| 27,016| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.approval.applications.dll| 15.1.2308.14| 53,640| 07-Jul-2021| 10:41| x86 \nMicrosoft.exchange.assistants.dll| 15.1.2308.14| 924,048| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.assistants.eventlog.dll| 15.1.2308.14| 25,976| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.assistants.interfaces.dll| 15.1.2308.14| 42,384| 07-Jul-2021| 10:24| x86 \nMicrosoft.exchange.audit.azureclient.dll| 15.1.2308.14| 15,248| 07-Jul-2021| 11:15| x86 \nMicrosoft.exchange.auditlogsearch.eventlog.dll| 15.1.2308.14| 14,712| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.auditlogsearchservicelet.dll| 15.1.2308.14| 70,536| 07-Jul-2021| 11:12| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.dll| 15.1.2308.14| 94,600| 07-Jul-2021| 11:24| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.eventlog.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.authadmin.eventlog.dll| 15.1.2308.14| 15,760| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.authadminservicelet.dll| 15.1.2308.14| 36,744| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.authservicehostservicelet.dll| 15.1.2308.14| 15,752| 07-Jul-2021| 10:24| x86 \nMicrosoft.exchange.autodiscover.configuration.dll| 15.1.2308.14| 79,736| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.autodiscover.dll| 15.1.2308.14| 396,152| 07-Jul-2021| 10:56| x86 \nMicrosoft.exchange.autodiscover.eventlogs.dll| 15.1.2308.14| 21,392| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.autodiscoverv2.dll| 15.1.2308.14| 57,232| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.bandwidthmonitorservicelet.dll| 15.1.2308.14| 14,712| 07-Jul-2021| 10:46| x86 \nMicrosoft.exchange.batchservice.dll| 15.1.2308.14| 35,728| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.cabutility.dll| 15.1.2308.14| 276,360| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.certificatedeployment.eventlog.dll| 15.1.2308.14| 16,272| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.certificatedeploymentservicelet.dll| 15.1.2308.14| 25,992| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.certificatenotification.eventlog.dll| 15.1.2308.14| 13,704| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.certificatenotificationservicelet.dll| 15.1.2308.14| 23,440| 07-Jul-2021| 11:12| x86 \nMicrosoft.exchange.clients.common.dll| 15.1.2308.14| 377,744| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.clients.eventlogs.dll| 15.1.2308.14| 83,832| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.clients.owa.dll| 15.1.2308.14| 2,970,488| 07-Jul-2021| 11:45| x86 \nMicrosoft.exchange.clients.owa2.server.dll| 15.1.2308.14| 5,028,736| 07-Jul-2021| 11:41| x86 \nMicrosoft.exchange.clients.owa2.servervariantconfiguration.dll| 15.1.2308.14| 894,328| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.clients.security.dll| 15.1.2308.14| 413,584| 07-Jul-2021| 11:20| x86 \nMicrosoft.exchange.clients.strings.dll| 15.1.2308.14| 924,560| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.cluster.bandwidthmonitor.dll| 15.1.2308.14| 31,608| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.cluster.common.dll| 15.1.2308.14| 52,088| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.cluster.common.extensions.dll| 15.1.2308.14| 21,896| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.cluster.diskmonitor.dll| 15.1.2308.14| 33,672| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.cluster.replay.dll| 15.1.2308.14| 3,521,912| 07-Jul-2021| 10:41| x86 \nMicrosoft.exchange.cluster.replicaseeder.dll| 15.1.2308.14| 108,424| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.cluster.replicavsswriter.dll| 15.1.2308.14| 288,632| 07-Jul-2021| 10:44| x64 \nMicrosoft.exchange.cluster.shared.dll| 15.1.2308.14| 624,528| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.common.agentconfig.transport.dll| 15.1.2308.14| 86,392| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.common.componentconfig.transport.dll| 15.1.2308.14| 1,827,720| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.directory.adagentservicevariantconfig.dll| 15.1.2308.14| 31,632| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.common.directory.directoryvariantconfig.dll| 15.1.2308.14| 466,312| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.directory.domtvariantconfig.dll| 15.1.2308.14| 26,000| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.common.directory.ismemberofresolverconfig.dll| 15.1.2308.14| 38,264| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.common.directory.tenantrelocationvariantconfig.dll| 15.1.2308.14| 102,776| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.common.directory.topologyservicevariantconfig.dll| 15.1.2308.14| 48,504| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.common.diskmanagement.dll| 15.1.2308.14| 67,440| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.common.dll| 15.1.2308.14| 172,936| 07-Jul-2021| 09:21| x86 \nMicrosoft.exchange.common.encryption.variantconfig.dll| 15.1.2308.14| 113,528| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.common.il.dll| 15.1.2308.14| 13,688| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.common.inference.dll| 15.1.2308.14| 130,448| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.common.optics.dll| 15.1.2308.14| 63,864| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.common.processmanagermsg.dll| 15.1.2308.14| 19,856| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.common.protocols.popimap.dll| 15.1.2308.14| 15,224| 07-Jul-2021| 09:05| x86 \nMicrosoft.exchange.common.search.dll| 15.1.2308.14| 107,912| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.common.search.eventlog.dll| 15.1.2308.14| 17,784| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.common.smtp.dll| 15.1.2308.14| 51,592| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.common.suiteservices.suiteservicesvariantconfig.dll| 15.1.2308.14| 36,728| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.common.transport.azure.dll| 15.1.2308.14| 27,512| 07-Jul-2021| 09:23| x86 \nMicrosoft.exchange.common.transport.monitoringconfig.dll| 15.1.2308.14| 1,042,320| 07-Jul-2021| 09:35| x86 \nMicrosoft.exchange.commonmsg.dll| 15.1.2308.14| 29,056| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.compliance.auditlogpumper.messages.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.compliance.auditservice.core.dll| 15.1.2308.14| 181,112| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.compliance.auditservice.messages.dll| 15.1.2308.14| 30,072| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.compliance.common.dll| 15.1.2308.14| 22,416| 07-Jul-2021| 10:06| x86 \nMicrosoft.exchange.compliance.crimsonevents.dll| 15.1.2308.14| 85,896| 07-Jul-2021| 09:05| x64 \nMicrosoft.exchange.compliance.dll| 15.1.2308.14| 41,352| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.compliance.recordreview.dll| 15.1.2308.14| 37,240| 07-Jul-2021| 09:21| x86 \nMicrosoft.exchange.compliance.supervision.dll| 15.1.2308.14| 50,576| 07-Jul-2021| 10:46| x86 \nMicrosoft.exchange.compliance.taskcreator.dll| 15.1.2308.14| 33,144| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.compliance.taskdistributioncommon.dll| 15.1.2308.14| 1,100,688| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.compliance.taskdistributionfabric.dll| 15.1.2308.14| 206,720| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.compliance.taskplugins.dll| 15.1.2308.14| 210,832| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.compression.dll| 15.1.2308.14| 17,288| 07-Jul-2021| 09:21| x86 \nMicrosoft.exchange.configuration.certificateauth.dll| 15.1.2308.14| 37,752| 07-Jul-2021| 10:30| x86 \nMicrosoft.exchange.configuration.certificateauth.eventlog.dll| 15.1.2308.14| 14,216| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.configuration.core.dll| 15.1.2308.14| 145,808| 07-Jul-2021| 10:25| x86 \nMicrosoft.exchange.configuration.core.eventlog.dll| 15.1.2308.14| 14,216| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.configuration.delegatedauth.dll| 15.1.2308.14| 53,112| 07-Jul-2021| 10:30| x86 \nMicrosoft.exchange.configuration.delegatedauth.eventlog.dll| 15.1.2308.14| 15,736| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.configuration.diagnosticsmodules.dll| 15.1.2308.14| 23,440| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.configuration.diagnosticsmodules.eventlog.dll| 15.1.2308.14| 13,192| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.configuration.failfast.dll| 15.1.2308.14| 54,672| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.configuration.failfast.eventlog.dll| 15.1.2308.14| 13,688| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.configuration.objectmodel.dll| 15.1.2308.14| 1,845,648| 07-Jul-2021| 10:31| x86 \nMicrosoft.exchange.configuration.objectmodel.eventlog.dll| 15.1.2308.14| 30,088| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.configuration.redirectionmodule.dll| 15.1.2308.14| 68,488| 07-Jul-2021| 10:27| x86 \nMicrosoft.exchange.configuration.redirectionmodule.eventlog.dll| 15.1.2308.14| 15,248| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.configuration.remotepowershellbackendcmdletproxymodule.dll| 15.1.2308.14| 21,392| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.configuration.remotepowershellbackendcmdletproxymodule.eventlog.dll| 15.1.2308.14| 13,184| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.connectiondatacollector.dll| 15.1.2308.14| 26,000| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.connections.common.dll| 15.1.2308.14| 169,848| 07-Jul-2021| 09:37| x86 \nMicrosoft.exchange.connections.eas.dll| 15.1.2308.14| 330,128| 07-Jul-2021| 09:39| x86 \nMicrosoft.exchange.connections.imap.dll| 15.1.2308.14| 173,968| 07-Jul-2021| 09:39| x86 \nMicrosoft.exchange.connections.pop.dll| 15.1.2308.14| 71,056| 07-Jul-2021| 09:39| x86 \nMicrosoft.exchange.contentfilter.wrapper.exe| 15.1.2308.14| 203,640| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.context.client.dll| 15.1.2308.14| 27,024| 07-Jul-2021| 10:24| x86 \nMicrosoft.exchange.context.configuration.dll| 15.1.2308.14| 51,600| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.context.core.dll| 15.1.2308.14| 51,064| 07-Jul-2021| 09:52| x86 \nMicrosoft.exchange.context.datamodel.dll| 15.1.2308.14| 46,992| 07-Jul-2021| 09:50| x86 \nMicrosoft.exchange.core.strings.dll| 15.1.2308.14| 1,092,472| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.core.timezone.dll| 15.1.2308.14| 57,224| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.data.applicationlogic.deep.dll| 15.1.2308.14| 326,520| 07-Jul-2021| 09:05| x86 \nMicrosoft.exchange.data.applicationlogic.dll| 15.1.2308.14| 3,357,584| 07-Jul-2021| 10:18| x86 \nMicrosoft.exchange.data.applicationlogic.eventlog.dll| 15.1.2308.14| 35,720| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.data.applicationlogic.monitoring.ifx.dll| 15.1.2308.14| 17,800| 07-Jul-2021| 10:20| x86 \nMicrosoft.exchange.data.connectors.dll| 15.1.2308.14| 165,264| 07-Jul-2021| 10:08| x86 \nMicrosoft.exchange.data.consumermailboxprovisioning.dll| 15.1.2308.14| 619,400| 07-Jul-2021| 10:10| x86 \nMicrosoft.exchange.data.directory.dll| 15.1.2308.14| 7,783,824| 07-Jul-2021| 09:53| x86 \nMicrosoft.exchange.data.directory.eventlog.dll| 15.1.2308.14| 80,264| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.data.dll| 15.1.2308.14| 1,786,768| 07-Jul-2021| 09:47| x86 \nMicrosoft.exchange.data.groupmailboxaccesslayer.dll| 15.1.2308.14| 1,626,512| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.data.ha.dll| 15.1.2308.14| 364,432| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.data.imageanalysis.dll| 15.1.2308.14| 105,336| 07-Jul-2021| 09:27| x86 \nMicrosoft.exchange.data.mailboxfeatures.dll| 15.1.2308.14| 15,760| 07-Jul-2021| 10:06| x86 \nMicrosoft.exchange.data.mailboxloadbalance.dll| 15.1.2308.14| 224,656| 07-Jul-2021| 10:07| x86 \nMicrosoft.exchange.data.mapi.dll| 15.1.2308.14| 186,768| 07-Jul-2021| 10:08| x86 \nMicrosoft.exchange.data.metering.contracts.dll| 15.1.2308.14| 39,800| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.data.metering.dll| 15.1.2308.14| 119,176| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.data.msosyncxsd.dll| 15.1.2308.14| 968,072| 07-Jul-2021| 09:23| x86 \nMicrosoft.exchange.data.notification.dll| 15.1.2308.14| 141,200| 07-Jul-2021| 10:08| x86 \nMicrosoft.exchange.data.personaldataplatform.dll| 15.1.2308.14| 769,416| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.data.providers.dll| 15.1.2308.14| 139,648| 07-Jul-2021| 10:06| x86 \nMicrosoft.exchange.data.provisioning.dll| 15.1.2308.14| 56,712| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.data.rightsmanagement.dll| 15.1.2308.14| 452,984| 07-Jul-2021| 09:57| x86 \nMicrosoft.exchange.data.scheduledtimers.dll| 15.1.2308.14| 32,656| 07-Jul-2021| 10:07| x86 \nMicrosoft.exchange.data.storage.clientstrings.dll| 15.1.2308.14| 256,376| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.data.storage.dll| 15.1.2308.14| 11,667,344| 07-Jul-2021| 10:04| x86 \nMicrosoft.exchange.data.storage.eventlog.dll| 15.1.2308.14| 37,768| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.data.storageconfigurationresources.dll| 15.1.2308.14| 655,760| 07-Jul-2021| 09:21| x86 \nMicrosoft.exchange.data.storeobjects.dll| 15.1.2308.14| 174,480| 07-Jul-2021| 09:57| x86 \nMicrosoft.exchange.data.throttlingservice.client.dll| 15.1.2308.14| 36,216| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.data.throttlingservice.client.eventlog.dll| 15.1.2308.14| 14,224| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.data.throttlingservice.eventlog.dll| 15.1.2308.14| 14,224| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.datacenter.management.activemonitoring.recoveryservice.eventlog.dll| 15.1.2308.14| 14,728| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.datacenterstrings.dll| 15.1.2308.14| 72,584| 07-Jul-2021| 11:14| x86 \nMicrosoft.exchange.delivery.eventlog.dll| 15.1.2308.14| 13,192| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.diagnostics.certificatelogger.dll| 15.1.2308.14| 22,928| 07-Jul-2021| 10:02| x86 \nMicrosoft.exchange.diagnostics.dll| 15.1.2308.14| 1,843,592| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.diagnostics.dll.deploy| 15.1.2308.14| 1,843,592| 07-Jul-2021| 09:15| Not applicable \nMicrosoft.exchange.diagnostics.performancelogger.dll| 15.1.2308.14| 23,944| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.diagnostics.service.common.dll| 15.1.2308.14| 546,680| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.diagnostics.service.eventlog.dll| 15.1.2308.14| 215,440| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.diagnostics.service.exchangejobs.dll| 15.1.2308.14| 193,424| 07-Jul-2021| 10:25| x86 \nMicrosoft.exchange.diagnostics.service.exe| 15.1.2308.14| 146,312| 07-Jul-2021| 10:00| x86 \nMicrosoft.exchange.diagnostics.service.fuseboxperfcounters.dll| 15.1.2308.14| 27,528| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.diagnosticsaggregation.eventlog.dll| 15.1.2308.14| 13,712| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.diagnosticsaggregationservicelet.dll| 15.1.2308.14| 49,544| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.directory.topologyservice.eventlog.dll| 15.1.2308.14| 28,040| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.directory.topologyservice.exe| 15.1.2308.14| 208,776| 07-Jul-2021| 10:20| x86 \nMicrosoft.exchange.disklocker.events.dll| 15.1.2308.14| 88,976| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.disklocker.interop.dll| 15.1.2308.14| 32,656| 07-Jul-2021| 09:18| x86 \nMicrosoft.exchange.drumtesting.calendarmigration.dll| 15.1.2308.14| 45,944| 07-Jul-2021| 10:50| x86 \nMicrosoft.exchange.drumtesting.common.dll| 15.1.2308.14| 18,832| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.dxstore.dll| 15.1.2308.14| 473,464| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.dxstore.ha.events.dll| 15.1.2308.14| 206,224| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.dxstore.ha.instance.exe| 15.1.2308.14| 36,744| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.eac.flighting.dll| 15.1.2308.14| 131,448| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.edgecredentialsvc.exe| 15.1.2308.14| 21,880| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.edgesync.common.dll| 15.1.2308.14| 148,360| 07-Jul-2021| 10:00| x86 \nMicrosoft.exchange.edgesync.datacenterproviders.dll| 15.1.2308.14| 220,048| 07-Jul-2021| 10:03| x86 \nMicrosoft.exchange.edgesync.eventlog.dll| 15.1.2308.14| 23,944| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.edgesyncsvc.exe| 15.1.2308.14| 97,680| 07-Jul-2021| 10:02| x86 \nMicrosoft.exchange.ediscovery.export.dll| 15.1.2308.14| 1,266,552| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.ediscovery.export.dll.deploy| 15.1.2308.14| 1,266,552| 07-Jul-2021| 09:19| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.application| Not applicable| 16,506| 07-Jul-2021| 09:25| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.exe.deploy| 15.1.2308.14| 87,432| 07-Jul-2021| 09:21| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.manifest| Not applicable| 67,491| 07-Jul-2021| 09:23| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.strings.dll.deploy| 15.1.2308.14| 52,112| 07-Jul-2021| 09:07| Not applicable \nMicrosoft.exchange.ediscovery.mailboxsearch.dll| 15.1.2308.14| 294,264| 07-Jul-2021| 10:42| x86 \nMicrosoft.exchange.entities.birthdaycalendar.dll| 15.1.2308.14| 73,080| 07-Jul-2021| 10:48| x86 \nMicrosoft.exchange.entities.booking.defaultservicesettings.dll| 15.1.2308.14| 45,968| 07-Jul-2021| 10:07| x86 \nMicrosoft.exchange.entities.booking.dll| 15.1.2308.14| 218,488| 07-Jul-2021| 10:50| x86 \nMicrosoft.exchange.entities.booking.management.dll| 15.1.2308.14| 78,224| 07-Jul-2021| 10:16| x86 \nMicrosoft.exchange.entities.bookings.dll| 15.1.2308.14| 35,728| 07-Jul-2021| 10:16| x86 \nMicrosoft.exchange.entities.calendaring.dll| 15.1.2308.14| 932,216| 07-Jul-2021| 10:46| x86 \nMicrosoft.exchange.entities.common.dll| 15.1.2308.14| 336,248| 07-Jul-2021| 10:13| x86 \nMicrosoft.exchange.entities.connectors.dll| 15.1.2308.14| 52,624| 07-Jul-2021| 10:15| x86 \nMicrosoft.exchange.entities.contentsubmissions.dll| 15.1.2308.14| 32,136| 07-Jul-2021| 10:24| x86 \nMicrosoft.exchange.entities.context.dll| 15.1.2308.14| 60,800| 07-Jul-2021| 10:20| x86 \nMicrosoft.exchange.entities.datamodel.dll| 15.1.2308.14| 854,416| 07-Jul-2021| 10:08| x86 \nMicrosoft.exchange.entities.fileproviders.dll| 15.1.2308.14| 291,712| 07-Jul-2021| 10:50| x86 \nMicrosoft.exchange.entities.foldersharing.dll| 15.1.2308.14| 39,312| 07-Jul-2021| 10:25| x86 \nMicrosoft.exchange.entities.holidaycalendars.dll| 15.1.2308.14| 76,152| 07-Jul-2021| 10:48| x86 \nMicrosoft.exchange.entities.insights.dll| 15.1.2308.14| 166,776| 07-Jul-2021| 10:54| x86 \nMicrosoft.exchange.entities.meetinglocation.dll| 15.1.2308.14| 1,486,728| 07-Jul-2021| 10:56| x86 \nMicrosoft.exchange.entities.meetingparticipants.dll| 15.1.2308.14| 122,232| 07-Jul-2021| 10:49| x86 \nMicrosoft.exchange.entities.meetingtimecandidates.dll| 15.1.2308.14| 12,327,288| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.entities.onlinemeetings.dll| 15.1.2308.14| 264,056| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.entities.people.dll| 15.1.2308.14| 37,768| 07-Jul-2021| 10:20| x86 \nMicrosoft.exchange.entities.peopleinsights.dll| 15.1.2308.14| 186,744| 07-Jul-2021| 10:48| x86 \nMicrosoft.exchange.entities.reminders.dll| 15.1.2308.14| 64,392| 07-Jul-2021| 10:50| x86 \nMicrosoft.exchange.entities.schedules.dll| 15.1.2308.14| 83,840| 07-Jul-2021| 10:50| x86 \nMicrosoft.exchange.entities.shellservice.dll| 15.1.2308.14| 63,864| 07-Jul-2021| 10:08| x86 \nMicrosoft.exchange.entities.tasks.dll| 15.1.2308.14| 100,232| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.entities.xrm.dll| 15.1.2308.14| 144,776| 07-Jul-2021| 10:17| x86 \nMicrosoft.exchange.entityextraction.calendar.dll| 15.1.2308.14| 270,216| 07-Jul-2021| 10:48| x86 \nMicrosoft.exchange.eserepl.common.dll| 15.1.2308.14| 15,224| 07-Jul-2021| 09:05| x86 \nMicrosoft.exchange.eserepl.configuration.dll| 15.1.2308.14| 15,760| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.eserepl.dll| 15.1.2308.14| 130,424| 07-Jul-2021| 09:50| x86 \nMicrosoft.exchange.ews.configuration.dll| 15.1.2308.14| 254,328| 07-Jul-2021| 10:06| x86 \nMicrosoft.exchange.exchangecertificate.eventlog.dll| 15.1.2308.14| 13,176| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.exchangecertificateservicelet.dll| 15.1.2308.14| 37,264| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.extensibility.internal.dll| 15.1.2308.14| 640,888| 07-Jul-2021| 09:44| x86 \nMicrosoft.exchange.extensibility.partner.dll| 15.1.2308.14| 37,256| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.federateddirectory.dll| 15.1.2308.14| 146,312| 07-Jul-2021| 11:24| x86 \nMicrosoft.exchange.ffosynclogmsg.dll| 15.1.2308.14| 13,184| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.frontendhttpproxy.dll| 15.1.2308.14| 594,312| 07-Jul-2021| 11:22| x86 \nMicrosoft.exchange.frontendhttpproxy.eventlogs.dll| 15.1.2308.14| 14,736| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.frontendtransport.monitoring.dll| 15.1.2308.14| 30,072| 07-Jul-2021| 12:01| x86 \nMicrosoft.exchange.griffin.variantconfiguration.dll| 15.1.2308.14| 99,728| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.hathirdpartyreplication.dll| 15.1.2308.14| 42,360| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.helpprovider.dll| 15.1.2308.14| 40,328| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.httpproxy.addressfinder.dll| 15.1.2308.14| 54,136| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.httpproxy.common.dll| 15.1.2308.14| 163,728| 07-Jul-2021| 10:23| x86 \nMicrosoft.exchange.httpproxy.diagnostics.dll| 15.1.2308.14| 58,768| 07-Jul-2021| 10:41| x86 \nMicrosoft.exchange.httpproxy.flighting.dll| 15.1.2308.14| 204,688| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.httpproxy.passivemonitor.dll| 15.1.2308.14| 17,800| 07-Jul-2021| 09:49| x86 \nMicrosoft.exchange.httpproxy.proxyassistant.dll| 15.1.2308.14| 30,600| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.httpproxy.routerefresher.dll| 15.1.2308.14| 38,784| 07-Jul-2021| 10:46| x86 \nMicrosoft.exchange.httpproxy.routeselector.dll| 15.1.2308.14| 48,504| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.httpproxy.routing.dll| 15.1.2308.14| 180,616| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.httpredirectmodules.dll| 15.1.2308.14| 36,744| 07-Jul-2021| 11:22| x86 \nMicrosoft.exchange.httprequestfiltering.dll| 15.1.2308.14| 28,040| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.httputilities.dll| 15.1.2308.14| 25,992| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.hygiene.data.dll| 15.1.2308.14| 1,868,168| 07-Jul-2021| 10:40| x86 \nMicrosoft.exchange.hygiene.diagnosisutil.dll| 15.1.2308.14| 54,664| 07-Jul-2021| 09:05| x86 \nMicrosoft.exchange.hygiene.eopinstantprovisioning.dll| 15.1.2308.14| 35,696| 07-Jul-2021| 11:14| x86 \nMicrosoft.exchange.idserialization.dll| 15.1.2308.14| 35,720| 07-Jul-2021| 09:05| x86 \nMicrosoft.exchange.imap4.eventlog.dll| 15.1.2308.14| 18,312| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.imap4.eventlog.dll.fe| 15.1.2308.14| 18,312| 07-Jul-2021| 09:09| Not applicable \nMicrosoft.exchange.imap4.exe| 15.1.2308.14| 263,048| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.imap4.exe.fe| 15.1.2308.14| 263,048| 07-Jul-2021| 10:28| Not applicable \nMicrosoft.exchange.imap4service.exe| 15.1.2308.14| 24,976| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.imap4service.exe.fe| 15.1.2308.14| 24,976| 07-Jul-2021| 10:26| Not applicable \nMicrosoft.exchange.imapconfiguration.dl1| 15.1.2308.14| 53,136| 07-Jul-2021| 09:31| Not applicable \nMicrosoft.exchange.inference.common.dll| 15.1.2308.14| 216,976| 07-Jul-2021| 10:07| x86 \nMicrosoft.exchange.inference.hashtagsrelevance.dll| 15.1.2308.14| 32,120| 07-Jul-2021| 10:56| x64 \nMicrosoft.exchange.inference.peoplerelevance.dll| 15.1.2308.14| 281,992| 07-Jul-2021| 10:54| x86 \nMicrosoft.exchange.inference.ranking.dll| 15.1.2308.14| 18,832| 07-Jul-2021| 10:06| x86 \nMicrosoft.exchange.inference.safetylibrary.dll| 15.1.2308.14| 83,848| 07-Jul-2021| 10:49| x86 \nMicrosoft.exchange.inference.service.eventlog.dll| 15.1.2308.14| 15,224| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.infoworker.assistantsclientresources.dll| 15.1.2308.14| 94,088| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.infoworker.common.dll| 15.1.2308.14| 1,840,528| 07-Jul-2021| 10:40| x86 \nMicrosoft.exchange.infoworker.eventlog.dll| 15.1.2308.14| 71,544| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.infoworker.meetingvalidator.dll| 15.1.2308.14| 175,480| 07-Jul-2021| 10:42| x86 \nMicrosoft.exchange.instantmessaging.dll| 15.1.2308.14| 45,944| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.irm.formprotector.dll| 15.1.2308.14| 159,632| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.irm.msoprotector.dll| 15.1.2308.14| 51,064| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.irm.ofcprotector.dll| 15.1.2308.14| 45,968| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.isam.databasemanager.dll| 15.1.2308.14| 30,584| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.isam.esebcli.dll| 15.1.2308.14| 100,232| 07-Jul-2021| 09:15| x64 \nMicrosoft.exchange.jobqueue.eventlog.dll| 15.1.2308.14| 13,192| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.jobqueueservicelet.dll| 15.1.2308.14| 271,248| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.killswitch.dll| 15.1.2308.14| 22,408| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.killswitchconfiguration.dll| 15.1.2308.14| 33,656| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.auditing.dll| 15.1.2308.14| 18,312| 07-Jul-2021| 09:16| x86 \nMicrosoft.exchange.loganalyzer.analyzers.certificatelog.dll| 15.1.2308.14| 15,248| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.analyzers.cmdletinfralog.dll| 15.1.2308.14| 27,512| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.loganalyzer.analyzers.easlog.dll| 15.1.2308.14| 30,600| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.loganalyzer.analyzers.ecplog.dll| 15.1.2308.14| 22,392| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.loganalyzer.analyzers.eventlog.dll| 15.1.2308.14| 66,440| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.loganalyzer.analyzers.ewslog.dll| 15.1.2308.14| 29,584| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.griffinperfcounter.dll| 15.1.2308.14| 19,848| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.loganalyzer.analyzers.groupescalationlog.dll| 15.1.2308.14| 20,344| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.analyzers.httpproxylog.dll| 15.1.2308.14| 19,336| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.loganalyzer.analyzers.hxservicelog.dll| 15.1.2308.14| 34,168| 07-Jul-2021| 10:00| x86 \nMicrosoft.exchange.loganalyzer.analyzers.iislog.dll| 15.1.2308.14| 103,816| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.analyzers.lameventlog.dll| 15.1.2308.14| 31,624| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.loganalyzer.analyzers.migrationlog.dll| 15.1.2308.14| 15,760| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.analyzers.oabdownloadlog.dll| 15.1.2308.14| 20,880| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.loganalyzer.analyzers.oauthcafelog.dll| 15.1.2308.14| 16,248| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.outlookservicelog.dll| 15.1.2308.14| 49,032| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.loganalyzer.analyzers.owaclientlog.dll| 15.1.2308.14| 44,416| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.loganalyzer.analyzers.owalog.dll| 15.1.2308.14| 38,280| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.perflog.dll| 15.1.2308.14| 10,375,032| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.loganalyzer.analyzers.pfassistantlog.dll| 15.1.2308.14| 29,072| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.analyzers.rca.dll| 15.1.2308.14| 21,392| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.loganalyzer.analyzers.restlog.dll| 15.1.2308.14| 24,456| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.loganalyzer.analyzers.store.dll| 15.1.2308.14| 15,232| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.loganalyzer.analyzers.transportsynchealthlog.dll| 15.1.2308.14| 21,896| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.core.dll| 15.1.2308.14| 89,464| 07-Jul-2021| 09:05| x86 \nMicrosoft.exchange.loganalyzer.extensions.auditing.dll| 15.1.2308.14| 20,872| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.extensions.certificatelog.dll| 15.1.2308.14| 26,488| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.loganalyzer.extensions.cmdletinfralog.dll| 15.1.2308.14| 21,368| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.extensions.common.dll| 15.1.2308.14| 28,024| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.easlog.dll| 15.1.2308.14| 28,552| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.extensions.errordetection.dll| 15.1.2308.14| 36,216| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.loganalyzer.extensions.ewslog.dll| 15.1.2308.14| 16,784| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.loganalyzer.extensions.griffinperfcounter.dll| 15.1.2308.14| 19,856| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.extensions.groupescalationlog.dll| 15.1.2308.14| 15,224| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.extensions.httpproxylog.dll| 15.1.2308.14| 17,288| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.extensions.hxservicelog.dll| 15.1.2308.14| 19,848| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.loganalyzer.extensions.iislog.dll| 15.1.2308.14| 57,208| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.migrationlog.dll| 15.1.2308.14| 17,784| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.loganalyzer.extensions.oabdownloadlog.dll| 15.1.2308.14| 18,832| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.loganalyzer.extensions.oauthcafelog.dll| 15.1.2308.14| 16,248| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.loganalyzer.extensions.outlookservicelog.dll| 15.1.2308.14| 17,808| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.loganalyzer.extensions.owaclientlog.dll| 15.1.2308.14| 15,240| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.loganalyzer.extensions.owalog.dll| 15.1.2308.14| 15,224| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loganalyzer.extensions.perflog.dll| 15.1.2308.14| 52,600| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.pfassistantlog.dll| 15.1.2308.14| 18,296| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.loganalyzer.extensions.rca.dll| 15.1.2308.14| 34,184| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.restlog.dll| 15.1.2308.14| 17,296| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.loganalyzer.extensions.store.dll| 15.1.2308.14| 18,808| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.loganalyzer.extensions.transportsynchealthlog.dll| 15.1.2308.14| 43,384| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.loguploader.dll| 15.1.2308.14| 165,256| 07-Jul-2021| 09:36| x86 \nMicrosoft.exchange.loguploaderproxy.dll| 15.1.2308.14| 54,664| 07-Jul-2021| 09:35| x86 \nMicrosoft.exchange.mailboxassistants.assistants.dll| 15.1.2308.14| 9,063,312| 07-Jul-2021| 11:52| x86 \nMicrosoft.exchange.mailboxassistants.attachmentthumbnail.dll| 15.1.2308.14| 33,160| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.mailboxassistants.common.dll| 15.1.2308.14| 124,304| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.mailboxassistants.crimsonevents.dll| 15.1.2308.14| 82,808| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.mailboxassistants.eventlog.dll| 15.1.2308.14| 14,224| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.mailboxassistants.rightsmanagement.dll| 15.1.2308.14| 30,072| 07-Jul-2021| 10:46| x86 \nMicrosoft.exchange.mailboxloadbalance.dll| 15.1.2308.14| 661,384| 07-Jul-2021| 10:56| x86 \nMicrosoft.exchange.mailboxloadbalance.serverstrings.dll| 15.1.2308.14| 63,352| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.mailboxreplicationservice.calendarsyncprovider.dll| 15.1.2308.14| 175,496| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.mailboxreplicationservice.common.dll| 15.1.2308.14| 2,784,144| 07-Jul-2021| 10:45| x86 \nMicrosoft.exchange.mailboxreplicationservice.complianceprovider.dll| 15.1.2308.14| 53,136| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.mailboxreplicationservice.contactsyncprovider.dll| 15.1.2308.14| 151,952| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.mailboxreplicationservice.dll| 15.1.2308.14| 966,536| 07-Jul-2021| 10:54| x86 \nMicrosoft.exchange.mailboxreplicationservice.easprovider.dll| 15.1.2308.14| 185,224| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.mailboxreplicationservice.eventlog.dll| 15.1.2308.14| 31,624| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.mailboxreplicationservice.googledocprovider.dll| 15.1.2308.14| 39,816| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.mailboxreplicationservice.imapprovider.dll| 15.1.2308.14| 105,872| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.mailboxreplicationservice.mapiprovider.dll| 15.1.2308.14| 94,608| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.mailboxreplicationservice.popprovider.dll| 15.1.2308.14| 43,408| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyclient.dll| 15.1.2308.14| 18,808| 07-Jul-2021| 09:23| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyservice.dll| 15.1.2308.14| 172,936| 07-Jul-2021| 10:54| x86 \nMicrosoft.exchange.mailboxreplicationservice.pstprovider.dll| 15.1.2308.14| 102,792| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.mailboxreplicationservice.remoteprovider.dll| 15.1.2308.14| 98,696| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.mailboxreplicationservice.storageprovider.dll| 15.1.2308.14| 188,816| 07-Jul-2021| 10:50| x86 \nMicrosoft.exchange.mailboxreplicationservice.syncprovider.dll| 15.1.2308.14| 43,408| 07-Jul-2021| 10:50| x86 \nMicrosoft.exchange.mailboxreplicationservice.xml.dll| 15.1.2308.14| 447,376| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.mailboxreplicationservice.xrmprovider.dll| 15.1.2308.14| 90,000| 07-Jul-2021| 10:52| x86 \nMicrosoft.exchange.mailboxtransport.monitoring.dll| 15.1.2308.14| 107,912| 07-Jul-2021| 12:01| x86 \nMicrosoft.exchange.mailboxtransport.storedriveragents.dll| 15.1.2308.14| 371,080| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxtransport.storedrivercommon.dll| 15.1.2308.14| 193,912| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.mailboxtransport.storedriverdelivery.dll| 15.1.2308.14| 551,816| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.mailboxtransport.storedriverdelivery.eventlog.dll| 15.1.2308.14| 16,256| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.mailboxtransport.submission.eventlog.dll| 15.1.2308.14| 15,752| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.mailboxtransport.submission.storedriversubmission.dll| 15.1.2308.14| 321,424| 07-Jul-2021| 10:52| x86 \nMicrosoft.exchange.mailboxtransport.submission.storedriversubmission.eventlog.dll| 15.1.2308.14| 17,784| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.mailboxtransport.syncdelivery.dll| 15.1.2308.14| 45,456| 07-Jul-2021| 10:41| x86 \nMicrosoft.exchange.mailboxtransportwatchdogservicelet.dll| 15.1.2308.14| 18,296| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.mailboxtransportwatchdogservicelet.eventlog.dll| 15.1.2308.14| 12,664| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.managedlexruntime.mppgruntime.dll| 15.1.2308.14| 20,872| 07-Jul-2021| 09:05| x86 \nMicrosoft.exchange.management.activedirectory.dll| 15.1.2308.14| 415,120| 07-Jul-2021| 10:22| x86 \nMicrosoft.exchange.management.classificationdefinitions.dll| 15.1.2308.14| 1,269,640| 07-Jul-2021| 09:38| x86 \nMicrosoft.exchange.management.compliancepolicy.dll| 15.1.2308.14| 41,864| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.management.controlpanel.basics.dll| 15.1.2308.14| 433,528| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.management.controlpanel.dll| 15.1.2308.14| 4,563,336| 07-Jul-2021| 12:54| x86 \nMicrosoft.exchange.management.controlpanel.owaoptionstrings.dll| 15.1.2308.14| 261,000| 07-Jul-2021| 09:25| x86 \nMicrosoft.exchange.management.controlpanelmsg.dll| 15.1.2308.14| 33,656| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.management.deployment.analysis.dll| 15.1.2308.14| 94,088| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.management.deployment.dll| 15.1.2308.14| 591,248| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.management.deployment.xml.dll| 15.1.2308.14| 3,560,848| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.management.detailstemplates.dll| 15.1.2308.14| 67,984| 07-Jul-2021| 11:26| x86 \nMicrosoft.exchange.management.dll| 15.1.2308.14| 16,481,656| 07-Jul-2021| 11:09| x86 \nMicrosoft.exchange.management.edge.systemmanager.dll| 15.1.2308.14| 58,744| 07-Jul-2021| 11:15| x86 \nMicrosoft.exchange.management.infrastructure.asynchronoustask.dll| 15.1.2308.14| 23,952| 07-Jul-2021| 11:15| x86 \nMicrosoft.exchange.management.jitprovisioning.dll| 15.1.2308.14| 101,768| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.management.migration.dll| 15.1.2308.14| 544,144| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.management.mobility.dll| 15.1.2308.14| 305,032| 07-Jul-2021| 11:13| x86 \nMicrosoft.exchange.management.nativeresources.dll| 15.1.2308.14| 131,984| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.management.powershell.support.dll| 15.1.2308.14| 418,680| 07-Jul-2021| 11:14| x86 \nMicrosoft.exchange.management.provisioning.dll| 15.1.2308.14| 275,848| 07-Jul-2021| 11:18| x86 \nMicrosoft.exchange.management.psdirectinvoke.dll| 15.1.2308.14| 70,544| 07-Jul-2021| 11:22| x86 \nMicrosoft.exchange.management.rbacdefinition.dll| 15.1.2308.14| 7,874,424| 07-Jul-2021| 10:01| x86 \nMicrosoft.exchange.management.recipient.dll| 15.1.2308.14| 1,500,536| 07-Jul-2021| 11:14| x86 \nMicrosoft.exchange.management.reportingwebservice.dll| 15.1.2308.14| 145,296| 07-Jul-2021| 11:27| x86 \nMicrosoft.exchange.management.reportingwebservice.eventlog.dll| 15.1.2308.14| 13,688| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.management.snapin.esm.dll| 15.1.2308.14| 71,544| 07-Jul-2021| 11:14| x86 \nMicrosoft.exchange.management.systemmanager.dll| 15.1.2308.14| 1,301,384| 07-Jul-2021| 11:12| x86 \nMicrosoft.exchange.management.transport.dll| 15.1.2308.14| 1,876,880| 07-Jul-2021| 11:19| x86 \nMicrosoft.exchange.managementgui.dll| 15.1.2308.14| 5,225,848| 07-Jul-2021| 09:50| x86 \nMicrosoft.exchange.managementmsg.dll| 15.1.2308.14| 36,232| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.mapihttpclient.dll| 15.1.2308.14| 117,624| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.mapihttphandler.dll| 15.1.2308.14| 209,784| 07-Jul-2021| 11:13| x86 \nMicrosoft.exchange.messagesecurity.dll| 15.1.2308.14| 79,760| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.messagesecurity.messagesecuritymsg.dll| 15.1.2308.14| 17,296| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.messagingpolicies.dlppolicyagent.dll| 15.1.2308.14| 156,024| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.messagingpolicies.edgeagents.dll| 15.1.2308.14| 65,928| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.messagingpolicies.eventlog.dll| 15.1.2308.14| 30,600| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.messagingpolicies.filtering.dll| 15.1.2308.14| 58,232| 07-Jul-2021| 10:41| x86 \nMicrosoft.exchange.messagingpolicies.hygienerules.dll| 15.1.2308.14| 29,560| 07-Jul-2021| 10:48| x86 \nMicrosoft.exchange.messagingpolicies.journalagent.dll| 15.1.2308.14| 175,496| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.messagingpolicies.redirectionagent.dll| 15.1.2308.14| 28,536| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.messagingpolicies.retentionpolicyagent.dll| 15.1.2308.14| 75,128| 07-Jul-2021| 10:48| x86 \nMicrosoft.exchange.messagingpolicies.rmsvcagent.dll| 15.1.2308.14| 207,248| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.messagingpolicies.rules.dll| 15.1.2308.14| 440,696| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.messagingpolicies.supervisoryreviewagent.dll| 15.1.2308.14| 83,320| 07-Jul-2021| 10:48| x86 \nMicrosoft.exchange.messagingpolicies.transportruleagent.dll| 15.1.2308.14| 35,208| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.messagingpolicies.unifiedpolicycommon.dll| 15.1.2308.14| 53,112| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.messagingpolicies.unjournalagent.dll| 15.1.2308.14| 96,632| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.migration.dll| 15.1.2308.14| 1,110,392| 07-Jul-2021| 10:53| x86 \nMicrosoft.exchange.migrationworkflowservice.eventlog.dll| 15.1.2308.14| 14,728| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.mobiledriver.dll| 15.1.2308.14| 135,568| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.monitoring.activemonitoring.local.components.dll| 15.1.2308.14| 5,158,288| 07-Jul-2021| 11:57| x86 \nMicrosoft.exchange.monitoring.servicecontextprovider.dll| 15.1.2308.14| 19,856| 07-Jul-2021| 09:50| x86 \nMicrosoft.exchange.mrsmlbconfiguration.dll| 15.1.2308.14| 68,488| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.net.dll| 15.1.2308.14| 5,084,048| 07-Jul-2021| 09:27| x86 \nMicrosoft.exchange.net.rightsmanagement.dll| 15.1.2308.14| 265,608| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.networksettings.dll| 15.1.2308.14| 37,776| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.notifications.broker.eventlog.dll| 15.1.2308.14| 14,224| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.notifications.broker.exe| 15.1.2308.14| 549,776| 07-Jul-2021| 11:48| x86 \nMicrosoft.exchange.oabauthmodule.dll| 15.1.2308.14| 22,928| 07-Jul-2021| 10:24| x86 \nMicrosoft.exchange.oabrequesthandler.dll| 15.1.2308.14| 106,376| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.oauth.core.dll| 15.1.2308.14| 291,704| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.objectstoreclient.dll| 15.1.2308.14| 17,296| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.odata.configuration.dll| 15.1.2308.14| 277,880| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.odata.dll| 15.1.2308.14| 2,992,520| 07-Jul-2021| 11:46| x86 \nMicrosoft.exchange.officegraph.common.dll| 15.1.2308.14| 88,976| 07-Jul-2021| 10:08| x86 \nMicrosoft.exchange.officegraph.grain.dll| 15.1.2308.14| 101,776| 07-Jul-2021| 10:33| x86 \nMicrosoft.exchange.officegraph.graincow.dll| 15.1.2308.14| 38,280| 07-Jul-2021| 10:33| x86 \nMicrosoft.exchange.officegraph.graineventbasedassistants.dll| 15.1.2308.14| 45,448| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.officegraph.grainpropagationengine.dll| 15.1.2308.14| 58,248| 07-Jul-2021| 10:30| x86 \nMicrosoft.exchange.officegraph.graintransactionstorage.dll| 15.1.2308.14| 147,320| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.officegraph.graintransportdeliveryagent.dll| 15.1.2308.14| 26,512| 07-Jul-2021| 10:33| x86 \nMicrosoft.exchange.officegraph.graphstore.dll| 15.1.2308.14| 184,184| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.officegraph.permailboxkeys.dll| 15.1.2308.14| 26,512| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.officegraph.secondarycopyquotamanagement.dll| 15.1.2308.14| 38,280| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.officegraph.secondaryshallowcopylocation.dll| 15.1.2308.14| 55,696| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.officegraph.security.dll| 15.1.2308.14| 147,320| 07-Jul-2021| 10:12| x86 \nMicrosoft.exchange.officegraph.semanticgraph.dll| 15.1.2308.14| 191,888| 07-Jul-2021| 10:33| x86 \nMicrosoft.exchange.officegraph.tasklogger.dll| 15.1.2308.14| 33,656| 07-Jul-2021| 10:29| x86 \nMicrosoft.exchange.partitioncache.dll| 15.1.2308.14| 28,048| 07-Jul-2021| 09:17| x86 \nMicrosoft.exchange.passivemonitoringsettings.dll| 15.1.2308.14| 32,632| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.photogarbagecollectionservicelet.dll| 15.1.2308.14| 15,224| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.pop3.eventlog.dll| 15.1.2308.14| 17,296| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.pop3.eventlog.dll.fe| 15.1.2308.14| 17,296| 07-Jul-2021| 09:11| Not applicable \nMicrosoft.exchange.pop3.exe| 15.1.2308.14| 106,888| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.pop3.exe.fe| 15.1.2308.14| 106,888| 07-Jul-2021| 10:28| Not applicable \nMicrosoft.exchange.pop3service.exe| 15.1.2308.14| 24,976| 07-Jul-2021| 10:25| x86 \nMicrosoft.exchange.pop3service.exe.fe| 15.1.2308.14| 24,976| 07-Jul-2021| 10:25| Not applicable \nMicrosoft.exchange.popconfiguration.dl1| 15.1.2308.14| 42,896| 07-Jul-2021| 09:31| Not applicable \nMicrosoft.exchange.popimap.core.dll| 15.1.2308.14| 264,080| 07-Jul-2021| 10:25| x86 \nMicrosoft.exchange.popimap.core.dll.fe| 15.1.2308.14| 264,080| 07-Jul-2021| 10:25| Not applicable \nMicrosoft.exchange.powersharp.dll| 15.1.2308.14| 358,264| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.powersharp.management.dll| 15.1.2308.14| 4,168,568| 07-Jul-2021| 11:22| x86 \nMicrosoft.exchange.powershell.configuration.dll| 15.1.2308.14| 326,024| 07-Jul-2021| 11:24| x64 \nMicrosoft.exchange.powershell.rbachostingtools.dll| 15.1.2308.14| 41,352| 07-Jul-2021| 11:24| x86 \nMicrosoft.exchange.protectedservicehost.exe| 15.1.2308.14| 30,584| 07-Jul-2021| 10:20| x86 \nMicrosoft.exchange.protocols.fasttransfer.dll| 15.1.2308.14| 135,048| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.protocols.mapi.dll| 15.1.2308.14| 436,616| 07-Jul-2021| 10:40| x86 \nMicrosoft.exchange.provisioning.eventlog.dll| 15.1.2308.14| 14,224| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.provisioningagent.dll| 15.1.2308.14| 224,136| 07-Jul-2021| 11:13| x86 \nMicrosoft.exchange.provisioningservicelet.dll| 15.1.2308.14| 105,872| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.pst.dll| 15.1.2308.14| 168,848| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.pst.dll.deploy| 15.1.2308.14| 168,848| 07-Jul-2021| 09:07| Not applicable \nMicrosoft.exchange.pswsclient.dll| 15.1.2308.14| 259,472| 07-Jul-2021| 09:17| x86 \nMicrosoft.exchange.publicfolders.dll| 15.1.2308.14| 72,056| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.pushnotifications.crimsonevents.dll| 15.1.2308.14| 215,928| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.pushnotifications.dll| 15.1.2308.14| 106,896| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.pushnotifications.publishers.dll| 15.1.2308.14| 425,872| 07-Jul-2021| 10:31| x86 \nMicrosoft.exchange.pushnotifications.server.dll| 15.1.2308.14| 70,520| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.query.analysis.dll| 15.1.2308.14| 46,480| 07-Jul-2021| 10:54| x86 \nMicrosoft.exchange.query.configuration.dll| 15.1.2308.14| 206,712| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.query.core.dll| 15.1.2308.14| 163,216| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.query.ranking.dll| 15.1.2308.14| 342,408| 07-Jul-2021| 10:54| x86 \nMicrosoft.exchange.query.retrieval.dll| 15.1.2308.14| 149,384| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.query.suggestions.dll| 15.1.2308.14| 95,096| 07-Jul-2021| 10:52| x86 \nMicrosoft.exchange.realtimeanalyticspublisherservicelet.dll| 15.1.2308.14| 127,368| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.relevance.core.dll| 15.1.2308.14| 63,376| 07-Jul-2021| 09:05| x86 \nMicrosoft.exchange.relevance.data.dll| 15.1.2308.14| 36,752| 07-Jul-2021| 10:06| x64 \nMicrosoft.exchange.relevance.mailtagger.dll| 15.1.2308.14| 17,784| 07-Jul-2021| 09:21| x64 \nMicrosoft.exchange.relevance.people.dll| 15.1.2308.14| 9,666,960| 07-Jul-2021| 10:50| x86 \nMicrosoft.exchange.relevance.peopleindex.dll| 15.1.2308.14| 20,788,112| 07-Jul-2021| 09:31| x64 \nMicrosoft.exchange.relevance.peopleranker.dll| 15.1.2308.14| 36,744| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.relevance.perm.dll| 15.1.2308.14| 97,656| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.relevance.sassuggest.dll| 15.1.2308.14| 28,536| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.relevance.upm.dll| 15.1.2308.14| 72,056| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.routing.client.dll| 15.1.2308.14| 15,736| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.routing.eventlog.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.routing.server.exe| 15.1.2308.14| 59,256| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.rpc.dll| 15.1.2308.14| 1,639,288| 07-Jul-2021| 09:31| x64 \nMicrosoft.exchange.rpcclientaccess.dll| 15.1.2308.14| 209,808| 07-Jul-2021| 10:24| x86 \nMicrosoft.exchange.rpcclientaccess.exmonhandler.dll| 15.1.2308.14| 60,304| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.rpcclientaccess.handler.dll| 15.1.2308.14| 517,504| 07-Jul-2021| 10:27| x86 \nMicrosoft.exchange.rpcclientaccess.monitoring.dll| 15.1.2308.14| 161,168| 07-Jul-2021| 09:50| x86 \nMicrosoft.exchange.rpcclientaccess.parser.dll| 15.1.2308.14| 721,800| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.rpcclientaccess.server.dll| 15.1.2308.14| 243,088| 07-Jul-2021| 10:29| x86 \nMicrosoft.exchange.rpcclientaccess.service.eventlog.dll| 15.1.2308.14| 20,872| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.rpcclientaccess.service.exe| 15.1.2308.14| 35,216| 07-Jul-2021| 11:13| x86 \nMicrosoft.exchange.rpchttpmodules.dll| 15.1.2308.14| 42,376| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.rpcoverhttpautoconfig.dll| 15.1.2308.14| 56,208| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.rpcoverhttpautoconfig.eventlog.dll| 15.1.2308.14| 27,536| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.rules.common.dll| 15.1.2308.14| 130,448| 07-Jul-2021| 09:41| x86 \nMicrosoft.exchange.saclwatcher.eventlog.dll| 15.1.2308.14| 14,736| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.saclwatcherservicelet.dll| 15.1.2308.14| 20,344| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.safehtml.dll| 15.1.2308.14| 21,384| 07-Jul-2021| 09:05| x86 \nMicrosoft.exchange.sandbox.activities.dll| 15.1.2308.14| 267,640| 07-Jul-2021| 09:13| x86 \nMicrosoft.exchange.sandbox.contacts.dll| 15.1.2308.14| 110,992| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.sandbox.core.dll| 15.1.2308.14| 112,528| 07-Jul-2021| 09:05| x86 \nMicrosoft.exchange.sandbox.services.dll| 15.1.2308.14| 622,456| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.search.bigfunnel.dll| 15.1.2308.14| 162,168| 07-Jul-2021| 10:54| x86 \nMicrosoft.exchange.search.bigfunnel.eventlog.dll| 15.1.2308.14| 12,176| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.search.blingwrapper.dll| 15.1.2308.14| 19,328| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.search.core.dll| 15.1.2308.14| 209,808| 07-Jul-2021| 10:24| x86 \nMicrosoft.exchange.search.ediscoveryquery.dll| 15.1.2308.14| 17,800| 07-Jul-2021| 10:56| x86 \nMicrosoft.exchange.search.engine.dll| 15.1.2308.14| 96,656| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.search.fast.configuration.dll| 15.1.2308.14| 16,776| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.search.fast.dll| 15.1.2308.14| 435,080| 07-Jul-2021| 10:29| x86 \nMicrosoft.exchange.search.files.dll| 15.1.2308.14| 274,832| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.search.flighting.dll| 15.1.2308.14| 24,952| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.search.mdb.dll| 15.1.2308.14| 219,000| 07-Jul-2021| 10:27| x86 \nMicrosoft.exchange.search.service.exe| 15.1.2308.14| 26,512| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.security.applicationencryption.dll| 15.1.2308.14| 162,184| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.security.dll| 15.1.2308.14| 1,555,848| 07-Jul-2021| 10:21| x86 \nMicrosoft.exchange.security.msarpsservice.exe| 15.1.2308.14| 19,848| 07-Jul-2021| 10:23| x86 \nMicrosoft.exchange.security.securitymsg.dll| 15.1.2308.14| 28,536| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.server.storage.admininterface.dll| 15.1.2308.14| 222,608| 07-Jul-2021| 10:52| x86 \nMicrosoft.exchange.server.storage.common.dll| 15.1.2308.14| 1,110,928| 07-Jul-2021| 09:50| x86 \nMicrosoft.exchange.server.storage.diagnostics.dll| 15.1.2308.14| 212,368| 07-Jul-2021| 10:50| x86 \nMicrosoft.exchange.server.storage.directoryservices.dll| 15.1.2308.14| 113,528| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.server.storage.esebackinterop.dll| 15.1.2308.14| 82,808| 07-Jul-2021| 09:52| x64 \nMicrosoft.exchange.server.storage.eventlog.dll| 15.1.2308.14| 80,776| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.server.storage.fulltextindex.dll| 15.1.2308.14| 66,440| 07-Jul-2021| 10:29| x86 \nMicrosoft.exchange.server.storage.ha.dll| 15.1.2308.14| 81,288| 07-Jul-2021| 10:45| x86 \nMicrosoft.exchange.server.storage.lazyindexing.dll| 15.1.2308.14| 207,752| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.server.storage.logicaldatamodel.dll| 15.1.2308.14| 1,163,152| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.server.storage.mapidisp.dll| 15.1.2308.14| 504,208| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.server.storage.multimailboxsearch.dll| 15.1.2308.14| 47,504| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.server.storage.physicalaccess.dll| 15.1.2308.14| 848,248| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.server.storage.propertydefinitions.dll| 15.1.2308.14| 1,219,960| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.server.storage.propertytag.dll| 15.1.2308.14| 30,584| 07-Jul-2021| 09:52| x86 \nMicrosoft.exchange.server.storage.rpcproxy.dll| 15.1.2308.14| 120,704| 07-Jul-2021| 10:54| x86 \nMicrosoft.exchange.server.storage.storecommonservices.dll| 15.1.2308.14| 1,009,528| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.server.storage.storeintegritycheck.dll| 15.1.2308.14| 110,992| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.server.storage.workermanager.dll| 15.1.2308.14| 34,704| 07-Jul-2021| 09:52| x86 \nMicrosoft.exchange.server.storage.xpress.dll| 15.1.2308.14| 19,344| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.servicehost.eventlog.dll| 15.1.2308.14| 14,712| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.servicehost.exe| 15.1.2308.14| 60,800| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.servicelets.globallocatorcache.dll| 15.1.2308.14| 50,568| 07-Jul-2021| 10:23| x86 \nMicrosoft.exchange.servicelets.globallocatorcache.eventlog.dll| 15.1.2308.14| 14,216| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.servicelets.unifiedpolicysyncservicelet.eventlog.dll| 15.1.2308.14| 14,216| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.services.common.dll| 15.1.2308.14| 74,104| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.services.dll| 15.1.2308.14| 8,477,048| 07-Jul-2021| 11:30| x86 \nMicrosoft.exchange.services.eventlogs.dll| 15.1.2308.14| 30,072| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.services.ewshandler.dll| 15.1.2308.14| 633,736| 07-Jul-2021| 11:43| x86 \nMicrosoft.exchange.services.ewsserialization.dll| 15.1.2308.14| 1,651,080| 07-Jul-2021| 11:33| x86 \nMicrosoft.exchange.services.json.dll| 15.1.2308.14| 296,336| 07-Jul-2021| 11:37| x86 \nMicrosoft.exchange.services.messaging.dll| 15.1.2308.14| 43,384| 07-Jul-2021| 11:31| x86 \nMicrosoft.exchange.services.onlinemeetings.dll| 15.1.2308.14| 233,352| 07-Jul-2021| 10:24| x86 \nMicrosoft.exchange.services.surface.dll| 15.1.2308.14| 178,576| 07-Jul-2021| 11:39| x86 \nMicrosoft.exchange.services.wcf.dll| 15.1.2308.14| 348,536| 07-Jul-2021| 11:35| x86 \nMicrosoft.exchange.setup.acquirelanguagepack.dll| 15.1.2308.14| 56,712| 07-Jul-2021| 09:25| x86 \nMicrosoft.exchange.setup.bootstrapper.common.dll| 15.1.2308.14| 94,600| 07-Jul-2021| 09:27| x86 \nMicrosoft.exchange.setup.common.dll| 15.1.2308.14| 297,352| 07-Jul-2021| 11:27| x86 \nMicrosoft.exchange.setup.commonbase.dll| 15.1.2308.14| 35,704| 07-Jul-2021| 11:13| x86 \nMicrosoft.exchange.setup.console.dll| 15.1.2308.14| 27,016| 07-Jul-2021| 11:30| x86 \nMicrosoft.exchange.setup.gui.dll| 15.1.2308.14| 115,080| 07-Jul-2021| 11:30| x86 \nMicrosoft.exchange.setup.parser.dll| 15.1.2308.14| 54,152| 07-Jul-2021| 11:12| x86 \nMicrosoft.exchange.setup.signverfwrapper.dll| 15.1.2308.14| 75,152| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.sharedcache.caches.dll| 15.1.2308.14| 142,728| 07-Jul-2021| 10:20| x86 \nMicrosoft.exchange.sharedcache.client.dll| 15.1.2308.14| 24,952| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.sharedcache.eventlog.dll| 15.1.2308.14| 15,224| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.sharedcache.exe| 15.1.2308.14| 58,768| 07-Jul-2021| 10:23| x86 \nMicrosoft.exchange.sharepointsignalstore.dll| 15.1.2308.14| 27,000| 07-Jul-2021| 09:17| x86 \nMicrosoft.exchange.slabmanifest.dll| 15.1.2308.14| 46,968| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.sqm.dll| 15.1.2308.14| 46,968| 07-Jul-2021| 09:23| x86 \nMicrosoft.exchange.store.service.exe| 15.1.2308.14| 28,040| 07-Jul-2021| 10:56| x86 \nMicrosoft.exchange.store.worker.exe| 15.1.2308.14| 26,496| 07-Jul-2021| 10:54| x86 \nMicrosoft.exchange.storeobjectsservice.eventlog.dll| 15.1.2308.14| 13,688| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.storeobjectsservice.exe| 15.1.2308.14| 31,632| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.storeprovider.dll| 15.1.2308.14| 1,166,736| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.structuredquery.dll| 15.1.2308.14| 158,608| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.symphonyhandler.dll| 15.1.2308.14| 628,088| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.syncmigration.eventlog.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.syncmigrationservicelet.dll| 15.1.2308.14| 16,248| 07-Jul-2021| 11:13| x86 \nMicrosoft.exchange.systemprobemsg.dll| 15.1.2308.14| 13,192| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.textprocessing.dll| 15.1.2308.14| 221,560| 07-Jul-2021| 09:38| x86 \nMicrosoft.exchange.textprocessing.eventlog.dll| 15.1.2308.14| 13,680| 07-Jul-2021| 09:05| x64 \nMicrosoft.exchange.transport.agent.addressbookpolicyroutingagent.dll| 15.1.2308.14| 29,056| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.transport.agent.antispam.common.dll| 15.1.2308.14| 138,632| 07-Jul-2021| 10:41| x86 \nMicrosoft.exchange.transport.agent.contentfilter.cominterop.dll| 15.1.2308.14| 21,880| 07-Jul-2021| 09:40| x86 \nMicrosoft.exchange.transport.agent.controlflow.dll| 15.1.2308.14| 40,328| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.transport.agent.faultinjectionagent.dll| 15.1.2308.14| 22,928| 07-Jul-2021| 10:46| x86 \nMicrosoft.exchange.transport.agent.frontendproxyagent.dll| 15.1.2308.14| 21,392| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.transport.agent.hygiene.dll| 15.1.2308.14| 212,872| 07-Jul-2021| 10:46| x86 \nMicrosoft.exchange.transport.agent.interceptoragent.dll| 15.1.2308.14| 98,704| 07-Jul-2021| 10:45| x86 \nMicrosoft.exchange.transport.agent.liveidauth.dll| 15.1.2308.14| 22,904| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.transport.agent.malware.dll| 15.1.2308.14| 169,336| 07-Jul-2021| 10:56| x86 \nMicrosoft.exchange.transport.agent.malware.eventlog.dll| 15.1.2308.14| 18,312| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.transport.agent.phishingdetection.dll| 15.1.2308.14| 20,856| 07-Jul-2021| 10:16| x86 \nMicrosoft.exchange.transport.agent.prioritization.dll| 15.1.2308.14| 31,616| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.transport.agent.protocolanalysis.dbaccess.dll| 15.1.2308.14| 46,984| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.transport.agent.search.dll| 15.1.2308.14| 30,088| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.transport.agent.senderid.core.dll| 15.1.2308.14| 53,112| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.transport.agent.sharedmailboxsentitemsroutingagent.dll| 15.1.2308.14| 44,920| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.transport.agent.systemprobedrop.dll| 15.1.2308.14| 18,320| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.transport.agent.transportfeatureoverrideagent.dll| 15.1.2308.14| 46,456| 07-Jul-2021| 10:48| x86 \nMicrosoft.exchange.transport.agent.trustedmailagents.dll| 15.1.2308.14| 46,472| 07-Jul-2021| 10:43| x86 \nMicrosoft.exchange.transport.cloudmonitor.common.dll| 15.1.2308.14| 28,048| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.transport.common.dll| 15.1.2308.14| 457,104| 07-Jul-2021| 10:08| x86 \nMicrosoft.exchange.transport.contracts.dll| 15.1.2308.14| 18,312| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.transport.decisionengine.dll| 15.1.2308.14| 30,608| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.transport.dll| 15.1.2308.14| 4,181,896| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.transport.dsapiclient.dll| 15.1.2308.14| 182,136| 07-Jul-2021| 10:10| x86 \nMicrosoft.exchange.transport.eventlog.dll| 15.1.2308.14| 121,744| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.transport.extensibility.dll| 15.1.2308.14| 403,320| 07-Jul-2021| 10:12| x86 \nMicrosoft.exchange.transport.extensibilityeventlog.dll| 15.1.2308.14| 14,736| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.transport.flighting.dll| 15.1.2308.14| 86,928| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.transport.logging.dll| 15.1.2308.14| 88,968| 07-Jul-2021| 10:11| x86 \nMicrosoft.exchange.transport.logging.search.dll| 15.1.2308.14| 68,496| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.transport.loggingcommon.dll| 15.1.2308.14| 63,376| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.transport.monitoring.dll| 15.1.2308.14| 430,456| 07-Jul-2021| 12:00| x86 \nMicrosoft.exchange.transport.net.dll| 15.1.2308.14| 122,256| 07-Jul-2021| 10:25| x86 \nMicrosoft.exchange.transport.protocols.contracts.dll| 15.1.2308.14| 17,800| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.transport.protocols.dll| 15.1.2308.14| 29,056| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.transport.protocols.httpsubmission.dll| 15.1.2308.14| 60,800| 07-Jul-2021| 10:31| x86 \nMicrosoft.exchange.transport.requestbroker.dll| 15.1.2308.14| 50,040| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.transport.scheduler.contracts.dll| 15.1.2308.14| 33,160| 07-Jul-2021| 10:28| x86 \nMicrosoft.exchange.transport.scheduler.dll| 15.1.2308.14| 113,032| 07-Jul-2021| 10:31| x86 \nMicrosoft.exchange.transport.smtpshared.dll| 15.1.2308.14| 18,296| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.transport.storage.contracts.dll| 15.1.2308.14| 52,112| 07-Jul-2021| 10:27| x86 \nMicrosoft.exchange.transport.storage.dll| 15.1.2308.14| 675,208| 07-Jul-2021| 10:29| x86 \nMicrosoft.exchange.transport.storage.management.dll| 15.1.2308.14| 21,904| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.transport.sync.agents.dll| 15.1.2308.14| 17,800| 07-Jul-2021| 10:50| x86 \nMicrosoft.exchange.transport.sync.common.dll| 15.1.2308.14| 487,304| 07-Jul-2021| 10:48| x86 \nMicrosoft.exchange.transport.sync.common.eventlog.dll| 15.1.2308.14| 12,680| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.transport.sync.manager.dll| 15.1.2308.14| 306,040| 07-Jul-2021| 10:52| x86 \nMicrosoft.exchange.transport.sync.manager.eventlog.dll| 15.1.2308.14| 15,736| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.transport.sync.migrationrpc.dll| 15.1.2308.14| 46,472| 07-Jul-2021| 10:50| x86 \nMicrosoft.exchange.transport.sync.worker.dll| 15.1.2308.14| 1,044,360| 07-Jul-2021| 10:54| x86 \nMicrosoft.exchange.transport.sync.worker.eventlog.dll| 15.1.2308.14| 15,248| 07-Jul-2021| 09:13| x64 \nMicrosoft.exchange.transportlogsearch.eventlog.dll| 15.1.2308.14| 18,824| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.transportsyncmanagersvc.exe| 15.1.2308.14| 18,808| 07-Jul-2021| 10:52| x86 \nMicrosoft.exchange.um.callrouter.exe| 15.1.2308.14| 22,392| 07-Jul-2021| 10:52| x86 \nMicrosoft.exchange.um.clientstrings.dll| 15.1.2308.14| 60,296| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.um.grammars.dll| 15.1.2308.14| 211,856| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.um.lad.dll| 15.1.2308.14| 120,720| 07-Jul-2021| 09:07| x64 \nMicrosoft.exchange.um.prompts.dll| 15.1.2308.14| 214,920| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.um.troubleshootingtool.shared.dll| 15.1.2308.14| 118,664| 07-Jul-2021| 09:21| x86 \nMicrosoft.exchange.um.ucmaplatform.dll| 15.1.2308.14| 239,480| 07-Jul-2021| 10:49| x86 \nMicrosoft.exchange.um.umcommon.dll| 15.1.2308.14| 925,064| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.um.umcore.dll| 15.1.2308.14| 1,471,880| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.um.umvariantconfiguration.dll| 15.1.2308.14| 32,632| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.unifiedcontent.dll| 15.1.2308.14| 41,848| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.unifiedcontent.exchange.dll| 15.1.2308.14| 24,976| 07-Jul-2021| 10:06| x86 \nMicrosoft.exchange.unifiedmessaging.eventlog.dll| 15.1.2308.14| 130,440| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.unifiedpolicyfilesync.eventlog.dll| 15.1.2308.14| 15,248| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.unifiedpolicyfilesyncservicelet.dll| 15.1.2308.14| 83,344| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.unifiedpolicysyncservicelet.dll| 15.1.2308.14| 50,064| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.variantconfiguration.antispam.dll| 15.1.2308.14| 658,808| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.variantconfiguration.core.dll| 15.1.2308.14| 186,232| 07-Jul-2021| 09:07| x86 \nMicrosoft.exchange.variantconfiguration.dll| 15.1.2308.14| 67,472| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.variantconfiguration.eventlog.dll| 15.1.2308.14| 12,688| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.variantconfiguration.excore.dll| 15.1.2308.14| 56,696| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.variantconfiguration.globalsettings.dll| 15.1.2308.14| 28,024| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.variantconfiguration.hygiene.dll| 15.1.2308.14| 120,720| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.variantconfiguration.protectionservice.dll| 15.1.2308.14| 31,632| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.variantconfiguration.threatintel.dll| 15.1.2308.14| 57,208| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.webservices.auth.dll| 15.1.2308.14| 35,728| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.webservices.dll| 15.1.2308.14| 1,054,072| 07-Jul-2021| 09:05| x86 \nMicrosoft.exchange.webservices.xrm.dll| 15.1.2308.14| 67,960| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.wlmservicelet.dll| 15.1.2308.14| 23,440| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.wopiclient.dll| 15.1.2308.14| 77,192| 07-Jul-2021| 09:23| x86 \nMicrosoft.exchange.workingset.signalapi.dll| 15.1.2308.14| 17,288| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.workingsetabstraction.signalapiabstraction.dll| 15.1.2308.14| 29,072| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.workloadmanagement.dll| 15.1.2308.14| 505,232| 07-Jul-2021| 10:21| x86 \nMicrosoft.exchange.workloadmanagement.eventlogs.dll| 15.1.2308.14| 14,728| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.workloadmanagement.throttling.configuration.dll| 15.1.2308.14| 36,752| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.workloadmanagement.throttling.dll| 15.1.2308.14| 66,448| 07-Jul-2021| 10:25| x86 \nMicrosoft.fast.contextlogger.json.dll| 15.1.2308.14| 19,344| 07-Jul-2021| 09:07| x86 \nMicrosoft.filtering.dll| 15.1.2308.14| 113,032| 07-Jul-2021| 09:36| x86 \nMicrosoft.filtering.exchange.dll| 15.1.2308.14| 57,208| 07-Jul-2021| 10:39| x86 \nMicrosoft.filtering.interop.dll| 15.1.2308.14| 15,248| 07-Jul-2021| 09:34| x86 \nMicrosoft.forefront.activedirectoryconnector.dll| 15.1.2308.14| 46,992| 07-Jul-2021| 09:56| x86 \nMicrosoft.forefront.activedirectoryconnector.eventlog.dll| 15.1.2308.14| 15,760| 07-Jul-2021| 09:13| x64 \nMicrosoft.forefront.filtering.common.dll| 15.1.2308.14| 23,952| 07-Jul-2021| 09:07| x86 \nMicrosoft.forefront.filtering.diagnostics.dll| 15.1.2308.14| 22,392| 07-Jul-2021| 09:05| x86 \nMicrosoft.forefront.filtering.eventpublisher.dll| 15.1.2308.14| 34,680| 07-Jul-2021| 09:13| x86 \nMicrosoft.forefront.management.powershell.format.ps1xml| Not applicable| 48,941| 07-Jul-2021| 11:25| Not applicable \nMicrosoft.forefront.management.powershell.types.ps1xml| Not applicable| 16,290| 07-Jul-2021| 11:25| Not applicable \nMicrosoft.forefront.monitoring.activemonitoring.local.components.dll| 15.1.2308.14| 1,518,992| 07-Jul-2021| 12:00| x86 \nMicrosoft.forefront.monitoring.activemonitoring.local.components.messages.dll| 15.1.2308.14| 13,200| 07-Jul-2021| 09:10| x64 \nMicrosoft.forefront.monitoring.management.outsidein.dll| 15.1.2308.14| 33,160| 07-Jul-2021| 11:45| x86 \nMicrosoft.forefront.recoveryactionarbiter.contract.dll| 15.1.2308.14| 18,320| 07-Jul-2021| 09:07| x86 \nMicrosoft.forefront.reporting.common.dll| 15.1.2308.14| 46,456| 07-Jul-2021| 10:41| x86 \nMicrosoft.forefront.reporting.ondemandquery.dll| 15.1.2308.14| 50,568| 07-Jul-2021| 10:44| x86 \nMicrosoft.isam.esent.collections.dll| 15.1.2308.14| 72,592| 07-Jul-2021| 09:23| x86 \nMicrosoft.isam.esent.interop.dll| 15.1.2308.14| 533,904| 07-Jul-2021| 09:17| x86 \nMicrosoft.managementgui.dll| 15.1.2308.14| 133,520| 07-Jul-2021| 09:07| x86 \nMicrosoft.mce.interop.dll| 15.1.2308.14| 24,440| 07-Jul-2021| 09:07| x86 \nMicrosoft.office.audit.dll| 15.1.2308.14| 123,784| 07-Jul-2021| 09:11| x86 \nMicrosoft.office.client.discovery.unifiedexport.dll| 15.1.2308.14| 593,272| 07-Jul-2021| 09:37| x86 \nMicrosoft.office.common.ipcommonlogger.dll| 15.1.2308.14| 42,360| 07-Jul-2021| 09:29| x86 \nMicrosoft.office.compliance.console.core.dll| 15.1.2308.14| 218,000| 07-Jul-2021| 12:55| x86 \nMicrosoft.office.compliance.console.dll| 15.1.2308.14| 854,904| 07-Jul-2021| 13:28| x86 \nMicrosoft.office.compliance.console.extensions.dll| 15.1.2308.14| 485,752| 07-Jul-2021| 13:00| x86 \nMicrosoft.office.compliance.core.dll| 15.1.2308.14| 413,064| 07-Jul-2021| 09:33| x86 \nMicrosoft.office.compliance.ingestion.dll| 15.1.2308.14| 36,216| 07-Jul-2021| 09:29| x86 \nMicrosoft.office.compliancepolicy.exchange.dar.dll| 15.1.2308.14| 85,392| 07-Jul-2021| 10:38| x86 \nMicrosoft.office.compliancepolicy.platform.dll| 15.1.2308.14| 1,782,160| 07-Jul-2021| 09:19| x86 \nMicrosoft.office.datacenter.activemonitoring.management.common.dll| 15.1.2308.14| 49,552| 07-Jul-2021| 10:36| x86 \nMicrosoft.office.datacenter.activemonitoring.management.dll| 15.1.2308.14| 27,528| 07-Jul-2021| 10:40| x86 \nMicrosoft.office.datacenter.activemonitoringlocal.dll| 15.1.2308.14| 174,984| 07-Jul-2021| 09:33| x86 \nMicrosoft.office.datacenter.monitoring.activemonitoring.recovery.dll| 15.1.2308.14| 166,288| 07-Jul-2021| 10:07| x86 \nMicrosoft.office365.datainsights.uploader.dll| 15.1.2308.14| 40,336| 07-Jul-2021| 09:05| x86 \nMicrosoft.online.box.shell.dll| 15.1.2308.14| 46,456| 07-Jul-2021| 09:07| x86 \nMicrosoft.powershell.hostingtools.dll| 15.1.2308.14| 67,976| 07-Jul-2021| 09:07| x86 \nMicrosoft.powershell.hostingtools_2.dll| 15.1.2308.14| 67,976| 07-Jul-2021| 09:07| x86 \nMicrosoft.tailoredexperiences.core.dll| 15.1.2308.14| 120,200| 07-Jul-2021| 09:31| x86 \nMigrateumcustomprompts.ps1| Not applicable| 19,122| 07-Jul-2021| 09:16| Not applicable \nModernpublicfoldertomailboxmapgenerator.ps1| Not applicable| 29,064| 07-Jul-2021| 09:15| Not applicable \nMovemailbox.ps1| Not applicable| 61,140| 07-Jul-2021| 09:15| Not applicable \nMovetransportdatabase.ps1| Not applicable| 30,602| 07-Jul-2021| 09:15| Not applicable \nMove_publicfolderbranch.ps1| Not applicable| 17,532| 07-Jul-2021| 09:15| Not applicable \nMpgearparser.dll| 15.1.2308.14| 99,728| 07-Jul-2021| 09:09| x64 \nMsclassificationadapter.dll| 15.1.2308.14| 248,704| 07-Jul-2021| 09:11| x64 \nMsexchangecompliance.exe| 15.1.2308.14| 78,728| 07-Jul-2021| 11:02| x86 \nMsexchangedagmgmt.exe| 15.1.2308.14| 25,464| 07-Jul-2021| 10:47| x86 \nMsexchangedelivery.exe| 15.1.2308.14| 38,800| 07-Jul-2021| 10:47| x86 \nMsexchangefrontendtransport.exe| 15.1.2308.14| 31,632| 07-Jul-2021| 10:39| x86 \nMsexchangehmhost.exe| 15.1.2308.14| 27,008| 07-Jul-2021| 12:01| x86 \nMsexchangehmrecovery.exe| 15.1.2308.14| 29,584| 07-Jul-2021| 10:07| x86 \nMsexchangemailboxassistants.exe| 15.1.2308.14| 72,568| 07-Jul-2021| 10:46| x86 \nMsexchangemailboxreplication.exe| 15.1.2308.14| 20,864| 07-Jul-2021| 10:56| x86 \nMsexchangemigrationworkflow.exe| 15.1.2308.14| 68,984| 07-Jul-2021| 11:02| x86 \nMsexchangerepl.exe| 15.1.2308.14| 71,048| 07-Jul-2021| 10:46| x86 \nMsexchangesubmission.exe| 15.1.2308.14| 123,264| 07-Jul-2021| 10:54| x86 \nMsexchangethrottling.exe| 15.1.2308.14| 39,824| 07-Jul-2021| 09:56| x86 \nMsexchangetransport.exe| 15.1.2308.14| 74,104| 07-Jul-2021| 09:56| x86 \nMsexchangetransportlogsearch.exe| 15.1.2308.14| 139,144| 07-Jul-2021| 10:40| x86 \nMsexchangewatchdog.exe| 15.1.2308.14| 55,696| 07-Jul-2021| 09:11| x64 \nMspatchlinterop.dll| 15.1.2308.14| 53,640| 07-Jul-2021| 09:19| x64 \nNativehttpproxy.dll| 15.1.2308.14| 91,512| 07-Jul-2021| 09:13| x64 \nNavigatorparser.dll| 15.1.2308.14| 636,808| 07-Jul-2021| 09:09| x64 \nNego2nativeinterface.dll| 15.1.2308.14| 19,320| 07-Jul-2021| 09:09| x64 \nNegotiateclientcertificatemodule.dll| 15.1.2308.14| 30,088| 07-Jul-2021| 09:09| x64 \nNewtestcasconnectivityuser.ps1| Not applicable| 22,264| 07-Jul-2021| 09:15| Not applicable \nNewtestcasconnectivityuserhosting.ps1| Not applicable| 24,579| 07-Jul-2021| 09:15| Not applicable \nNtspxgen.dll| 15.1.2308.14| 80,760| 07-Jul-2021| 09:11| x64 \nOleconverter.exe| 15.1.2308.14| 173,944| 07-Jul-2021| 09:13| x64 \nOutsideinmodule.dll| 15.1.2308.14| 87,952| 07-Jul-2021| 09:13| x64 \nOwaauth.dll| 15.1.2308.14| 92,040| 07-Jul-2021| 09:13| x64 \nOwasmime.msi| Not applicable| 720,896| 07-Jul-2021| 09:13| Not applicable \nPerf_common_extrace.dll| 15.1.2308.14| 245,136| 07-Jul-2021| 09:07| x64 \nPerf_exchmem.dll| 15.1.2308.14| 85,904| 07-Jul-2021| 09:09| x64 \nPipeline2.dll| 15.1.2308.14| 1,454,472| 07-Jul-2021| 09:25| x64 \nPowershell.rbachostingtools.dll_1bf4f3e363ef418781685d1a60da11c1| 15.1.2308.14| 41,352| 07-Jul-2021| 11:24| Not applicable \nPreparemoverequesthosting.ps1| Not applicable| 70,995| 07-Jul-2021| 09:15| Not applicable \nPrepare_moverequest.ps1| Not applicable| 73,229| 07-Jul-2021| 09:15| Not applicable \nProductinfo.managed.dll| 15.1.2308.14| 27,016| 07-Jul-2021| 09:09| x86 \nProxybinclientsstringsdll| 15.1.2308.14| 924,560| 07-Jul-2021| 09:13| x86 \nPublicfoldertomailboxmapgenerator.ps1| Not applicable| 23,238| 07-Jul-2021| 09:16| Not applicable \nQuietexe.exe| 15.1.2308.14| 14,736| 07-Jul-2021| 09:09| x86 \nRedistributeactivedatabases.ps1| Not applicable| 250,564| 07-Jul-2021| 09:19| Not applicable \nReinstalldefaulttransportagents.ps1| Not applicable| 21,655| 07-Jul-2021| 11:19| Not applicable \nRemoteexchange.ps1| Not applicable| 23,553| 07-Jul-2021| 11:24| Not applicable \nRemoveuserfrompfrecursive.ps1| Not applicable| 14,684| 07-Jul-2021| 09:16| Not applicable \nReplaceuserpermissiononpfrecursive.ps1| Not applicable| 15,002| 07-Jul-2021| 09:16| Not applicable \nReplaceuserwithuseronpfrecursive.ps1| Not applicable| 15,012| 07-Jul-2021| 09:15| Not applicable \nReplaycrimsonmsg.dll| 15.1.2308.14| 1,099,144| 07-Jul-2021| 09:07| x64 \nResetattachmentfilterentry.ps1| Not applicable| 15,496| 07-Jul-2021| 11:19| Not applicable \nResetcasservice.ps1| Not applicable| 21,707| 07-Jul-2021| 09:15| Not applicable \nReset_antispamupdates.ps1| Not applicable| 14,081| 07-Jul-2021| 09:13| Not applicable \nRestoreserveronprereqfailure.ps1| Not applicable| 15,161| 07-Jul-2021| 09:25| Not applicable \nResumemailboxdatabasecopy.ps1| Not applicable| 17,210| 07-Jul-2021| 09:19| Not applicable \nRightsmanagementwrapper.dll| 15.1.2308.14| 86,400| 07-Jul-2021| 09:18| x64 \nRollalternateserviceaccountpassword.ps1| Not applicable| 55,790| 07-Jul-2021| 09:16| Not applicable \nRpcperf.dll| 15.1.2308.14| 23,416| 07-Jul-2021| 09:09| x64 \nRpcproxyshim.dll| 15.1.2308.14| 39,304| 07-Jul-2021| 09:18| x64 \nRulesauditmsg.dll| 15.1.2308.14| 12,688| 07-Jul-2021| 09:09| x64 \nRwsperfcounters.xml| Not applicable| 22,996| 07-Jul-2021| 11:27| Not applicable \nSafehtmlnativewrapper.dll| 15.1.2308.14| 34,704| 07-Jul-2021| 09:10| x64 \nScanenginetest.exe| 15.1.2308.14| 956,280| 07-Jul-2021| 09:17| x64 \nScanningprocess.exe| 15.1.2308.14| 739,192| 07-Jul-2021| 09:29| x64 \nSearchdiagnosticinfo.ps1| Not applicable| 16,812| 07-Jul-2021| 09:16| Not applicable \nServicecontrol.ps1| Not applicable| 52,349| 07-Jul-2021| 09:25| Not applicable \nSetmailpublicfolderexternaladdress.ps1| Not applicable| 20,754| 07-Jul-2021| 09:15| Not applicable \nSettingsadapter.dll| 15.1.2308.14| 116,112| 07-Jul-2021| 09:13| x64 \nSetup.exe| 15.1.2308.14| 20,856| 07-Jul-2021| 09:29| x86 \nSetupui.exe| 15.1.2308.14| 49,040| 07-Jul-2021| 11:16| x86 \nSplit_publicfoldermailbox.ps1| Not applicable| 52,189| 07-Jul-2021| 09:15| Not applicable \nStartdagservermaintenance.ps1| Not applicable| 27,847| 07-Jul-2021| 09:19| Not applicable \nStatisticsutil.dll| 15.1.2308.14| 142,224| 07-Jul-2021| 09:19| x64 \nStopdagservermaintenance.ps1| Not applicable| 21,113| 07-Jul-2021| 09:19| Not applicable \nStoretsconstants.ps1| Not applicable| 15,830| 07-Jul-2021| 09:17| Not applicable \nStoretslibrary.ps1| Not applicable| 28,003| 07-Jul-2021| 09:18| Not applicable \nStore_mapi_net_bin_perf_x64_exrpcperf.dll| 15.1.2308.14| 28,536| 07-Jul-2021| 09:09| x64 \nSync_mailpublicfolders.ps1| Not applicable| 43,927| 07-Jul-2021| 09:15| Not applicable \nSync_modernmailpublicfolders.ps1| Not applicable| 43,973| 07-Jul-2021| 09:15| Not applicable \nTextconversionmodule.dll| 15.1.2308.14| 86,416| 07-Jul-2021| 09:10| x64 \nTroubleshoot_ci.ps1| Not applicable| 22,727| 07-Jul-2021| 09:17| Not applicable \nTroubleshoot_databaselatency.ps1| Not applicable| 33,433| 07-Jul-2021| 09:17| Not applicable \nTroubleshoot_databasespace.ps1| Not applicable| 30,029| 07-Jul-2021| 09:18| Not applicable \nUmservice.exe| 15.1.2308.14| 100,216| 07-Jul-2021| 10:50| x86 \nUmworkerprocess.exe| 15.1.2308.14| 38,264| 07-Jul-2021| 10:49| x86 \nUninstall_antispamagents.ps1| Not applicable| 15,453| 07-Jul-2021| 09:13| Not applicable \nUpdateapppoolmanagedframeworkversion.ps1| Not applicable| 14,030| 07-Jul-2021| 09:15| Not applicable \nUpdatecas.ps1| Not applicable| 35,363| 07-Jul-2021| 09:25| Not applicable \nUpdateconfigfiles.ps1| Not applicable| 19,762| 07-Jul-2021| 09:25| Not applicable \nUpdateserver.exe| 15.1.2308.14| 3,014,544| 07-Jul-2021| 09:23| x64 \nUpdate_malwarefilteringserver.ps1| Not applicable| 18,156| 07-Jul-2021| 09:16| Not applicable \nWeb.config_053c31bdd6824e95b35d61b0a5e7b62d| Not applicable| 32,048| 07-Jul-2021| 12:54| Not applicable \nWsbexchange.exe| 15.1.2308.14| 125,328| 07-Jul-2021| 09:21| x64 \nX400prox.dll| 15.1.2308.14| 103,312| 07-Jul-2021| 09:11| x64 \n_search.lingoperators.a| 15.1.2308.14| 34,680| 07-Jul-2021| 10:28| Not applicable \n_search.lingoperators.b| 15.1.2308.14| 34,680| 07-Jul-2021| 10:28| Not applicable \n_search.mailboxoperators.a| 15.1.2308.14| 289,144| 07-Jul-2021| 10:52| Not applicable \n_search.mailboxoperators.b| 15.1.2308.14| 289,144| 07-Jul-2021| 10:52| Not applicable \n_search.operatorschema.a| 15.1.2308.14| 483,192| 07-Jul-2021| 10:11| Not applicable \n_search.operatorschema.b| 15.1.2308.14| 483,192| 07-Jul-2021| 10:11| Not applicable \n_search.tokenoperators.a| 15.1.2308.14| 106,888| 07-Jul-2021| 10:26| Not applicable \n_search.tokenoperators.b| 15.1.2308.14| 106,888| 07-Jul-2021| 10:26| Not applicable \n_search.transportoperators.a| 15.1.2308.14| 64,904| 07-Jul-2021| 10:56| Not applicable \n_search.transportoperators.b| 15.1.2308.14| 64,904| 07-Jul-2021| 10:56| Not applicable \n \n### \n\n__\n\nMicrosoft Exchange Server 2016 Cumulative Update 20\n\nFile name| File version| File size| Date| Time| Platform \n---|---|---|---|---|--- \nActivemonitoringeventmsg.dll| 15.1.2242.12| 71,048| 07-Jul-2021| 09:29| x64 \nActivemonitoringexecutionlibrary.ps1| Not applicable| 29,518| 07-Jul-2021| 09:29| Not applicable \nAdduserstopfrecursive.ps1| Not applicable| 14,941| 07-Jul-2021| 09:29| Not applicable \nAdemodule.dll| 15.1.2242.12| 106,352| 07-Jul-2021| 09:20| x64 \nAirfilter.dll| 15.1.2242.12| 42,888| 07-Jul-2021| 09:29| x64 \nAjaxcontroltoolkit.dll| 15.1.2242.12| 92,552| 07-Jul-2021| 09:29| x86 \nAntispamcommon.ps1| Not applicable| 13,521| 07-Jul-2021| 09:29| Not applicable \nAsdat.msi| Not applicable| 5,087,232| 07-Jul-2021| 09:29| Not applicable \nAsentirs.msi| Not applicable| 77,824| 07-Jul-2021| 09:29| Not applicable \nAsentsig.msi| Not applicable| 73,728| 07-Jul-2021| 09:29| Not applicable \nBigfunnel.bondtypes.dll| 15.1.2242.12| 43,896| 07-Jul-2021| 09:29| x86 \nBigfunnel.common.dll| 15.1.2242.12| 63,880| 07-Jul-2021| 09:16| x86 \nBigfunnel.configuration.dll| 15.1.2242.12| 99,192| 07-Jul-2021| 10:57| x86 \nBigfunnel.entropy.dll| 15.1.2242.12| 44,416| 07-Jul-2021| 09:29| x86 \nBigfunnel.filter.dll| 15.1.2242.12| 54,152| 07-Jul-2021| 09:29| x86 \nBigfunnel.indexstream.dll| 15.1.2242.12| 54,152| 07-Jul-2021| 09:29| x86 \nBigfunnel.poi.dll| 15.1.2242.12| 203,656| 07-Jul-2021| 09:29| x86 \nBigfunnel.postinglist.dll| 15.1.2242.12| 122,232| 07-Jul-2021| 09:31| x86 \nBigfunnel.query.dll| 15.1.2242.12| 99,704| 07-Jul-2021| 09:18| x86 \nBigfunnel.ranking.dll| 15.1.2242.12| 79,240| 07-Jul-2021| 09:31| x86 \nBigfunnel.syntheticdatalib.dll| 15.1.2242.12| 3,634,552| 07-Jul-2021| 09:31| x86 \nBigfunnel.wordbreakers.dll| 15.1.2242.12| 46,456| 07-Jul-2021| 09:29| x86 \nCafe_airfilter_dll| 15.1.2242.12| 42,888| 07-Jul-2021| 09:29| x64 \nCafe_exppw_dll| 15.1.2242.12| 83,336| 07-Jul-2021| 09:29| x64 \nCafe_owaauth_dll| 15.1.2242.12| 92,040| 07-Jul-2021| 09:29| x64 \nCalcalculation.ps1| Not applicable| 42,129| 07-Jul-2021| 10:57| Not applicable \nCheckdatabaseredundancy.ps1| Not applicable| 94,618| 07-Jul-2021| 09:29| Not applicable \nChksgfiles.dll| 15.1.2242.12| 57,224| 07-Jul-2021| 09:29| x64 \nCitsconstants.ps1| Not applicable| 15,817| 07-Jul-2021| 09:29| Not applicable \nCitslibrary.ps1| Not applicable| 82,676| 07-Jul-2021| 09:29| Not applicable \nCitstypes.ps1| Not applicable| 14,456| 07-Jul-2021| 09:29| Not applicable \nClassificationengine_mce| 15.1.2242.12| 1,693,072| 07-Jul-2021| 09:29| Not applicable \nClusmsg.dll| 15.1.2242.12| 134,024| 07-Jul-2021| 09:20| x64 \nCoconet.dll| 15.1.2242.12| 48,008| 07-Jul-2021| 09:20| x64 \nCollectovermetrics.ps1| Not applicable| 81,656| 07-Jul-2021| 09:29| Not applicable \nCollectreplicationmetrics.ps1| Not applicable| 41,902| 07-Jul-2021| 09:29| Not applicable \nCommonconnectfunctions.ps1| Not applicable| 29,943| 07-Jul-2021| 11:35| Not applicable \nComplianceauditservice.exe| 15.1.2242.12| 39,808| 07-Jul-2021| 11:40| x86 \nConfigureadam.ps1| Not applicable| 22,796| 07-Jul-2021| 09:29| Not applicable \nConfigurecaferesponseheaders.ps1| Not applicable| 20,340| 07-Jul-2021| 09:29| Not applicable \nConfigurenetworkprotocolparameters.ps1| Not applicable| 19,782| 07-Jul-2021| 09:29| Not applicable \nConfiguresmbipsec.ps1| Not applicable| 39,840| 07-Jul-2021| 09:29| Not applicable \nConfigure_enterprisepartnerapplication.ps1| Not applicable| 22,295| 07-Jul-2021| 09:29| Not applicable \nConnectfunctions.ps1| Not applicable| 37,137| 07-Jul-2021| 11:35| Not applicable \nConnect_exchangeserver_help.xml| Not applicable| 30,412| 07-Jul-2021| 11:35| Not applicable \nConsoleinitialize.ps1| Not applicable| 24,244| 07-Jul-2021| 11:25| Not applicable \nConvertoabvdir.ps1| Not applicable| 20,065| 07-Jul-2021| 09:29| Not applicable \nConverttomessagelatency.ps1| Not applicable| 14,544| 07-Jul-2021| 09:29| Not applicable \nConvert_distributiongrouptounifiedgroup.ps1| Not applicable| 34,797| 07-Jul-2021| 09:29| Not applicable \nCreate_publicfoldermailboxesformigration.ps1| Not applicable| 27,924| 07-Jul-2021| 09:29| Not applicable \nCts.14.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts.14.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts.14.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts.14.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts.14.4.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts.15.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts.15.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts.15.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts.15.20.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts.8.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts.8.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts.8.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts_exsmime.dll| 15.1.2242.12| 380,816| 07-Jul-2021| 09:20| x64 \nCts_microsoft.exchange.data.common.dll| 15.1.2242.12| 1,686,928| 07-Jul-2021| 09:19| x86 \nCts_microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 07-Jul-2021| 09:16| Not applicable \nCts_policy.14.0.microsoft.exchange.data.common.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:29| x86 \nCts_policy.14.1.microsoft.exchange.data.common.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:29| x86 \nCts_policy.14.2.microsoft.exchange.data.common.dll| 15.1.2242.12| 13,200| 07-Jul-2021| 09:29| x86 \nCts_policy.14.3.microsoft.exchange.data.common.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:29| x86 \nCts_policy.14.4.microsoft.exchange.data.common.dll| 15.1.2242.12| 13,184| 07-Jul-2021| 09:29| x86 \nCts_policy.15.0.microsoft.exchange.data.common.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:29| x86 \nCts_policy.15.1.microsoft.exchange.data.common.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:20| x86 \nCts_policy.15.2.microsoft.exchange.data.common.dll| 15.1.2242.12| 13,184| 07-Jul-2021| 09:18| x86 \nCts_policy.15.20.microsoft.exchange.data.common.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:20| x86 \nCts_policy.8.0.microsoft.exchange.data.common.dll| 15.1.2242.12| 12,672| 07-Jul-2021| 09:19| x86 \nCts_policy.8.1.microsoft.exchange.data.common.dll| 15.1.2242.12| 12,680| 07-Jul-2021| 09:29| x86 \nCts_policy.8.2.microsoft.exchange.data.common.dll| 15.1.2242.12| 12,680| 07-Jul-2021| 09:29| x86 \nCts_policy.8.3.microsoft.exchange.data.common.dll| 15.1.2242.12| 12,680| 07-Jul-2021| 09:20| x86 \nDagcommonlibrary.ps1| Not applicable| 60,258| 07-Jul-2021| 09:29| Not applicable \nDependentassemblygenerator.exe| 15.1.2242.12| 22,416| 07-Jul-2021| 09:18| x86 \nDiaghelper.dll| 15.1.2242.12| 66,960| 07-Jul-2021| 09:19| x86 \nDiagnosticscriptcommonlibrary.ps1| Not applicable| 16,326| 07-Jul-2021| 09:29| Not applicable \nDisableinmemorytracing.ps1| Not applicable| 13,374| 07-Jul-2021| 09:29| Not applicable \nDisable_antimalwarescanning.ps1| Not applicable| 15,221| 07-Jul-2021| 09:29| Not applicable \nDisable_outsidein.ps1| Not applicable| 13,666| 07-Jul-2021| 09:29| Not applicable \nDisklockerapi.dll| Not applicable| 22,408| 07-Jul-2021| 09:29| x64 \nDlmigrationmodule.psm1| Not applicable| 39,592| 07-Jul-2021| 09:29| Not applicable \nDsaccessperf.dll| 15.1.2242.12| 45,944| 07-Jul-2021| 09:19| x64 \nDscperf.dll| 15.1.2242.12| 32,632| 07-Jul-2021| 09:29| x64 \nDup_cts_microsoft.exchange.data.common.dll| 15.1.2242.12| 1,686,928| 07-Jul-2021| 09:19| x86 \nDup_ext_microsoft.exchange.data.transport.dll| 15.1.2242.12| 601,464| 07-Jul-2021| 10:57| x86 \nEcpperfcounters.xml| Not applicable| 31,132| 07-Jul-2021| 09:29| Not applicable \nEdgeextensibility_microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEdgeextensibility_policy.8.0.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:19| x86 \nEdgetransport.exe| 15.1.2242.12| 49,528| 07-Jul-2021| 10:57| x86 \nEext.14.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext.14.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext.14.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext.14.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext.14.4.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext.15.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext.15.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext.15.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext.15.20.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext.8.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext.8.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext.8.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 07-Jul-2021| 09:16| Not applicable \nEext_policy.14.0.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:29| x86 \nEext_policy.14.1.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:18| x86 \nEext_policy.14.2.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:19| x86 \nEext_policy.14.3.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,200| 07-Jul-2021| 09:19| x86 \nEext_policy.14.4.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:20| x86 \nEext_policy.15.0.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:29| x86 \nEext_policy.15.1.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:19| x86 \nEext_policy.15.2.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:20| x86 \nEext_policy.15.20.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:16| x86 \nEext_policy.8.1.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:20| x86 \nEext_policy.8.2.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:29| x86 \nEext_policy.8.3.microsoft.exchange.data.transport.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:29| x86 \nEnableinmemorytracing.ps1| Not applicable| 13,376| 07-Jul-2021| 09:29| Not applicable \nEnable_antimalwarescanning.ps1| Not applicable| 17,595| 07-Jul-2021| 09:29| Not applicable \nEnable_basicauthtooauthconverterhttpmodule.ps1| Not applicable| 18,620| 07-Jul-2021| 09:29| Not applicable \nEnable_crossforestconnector.ps1| Not applicable| 18,610| 07-Jul-2021| 09:29| Not applicable \nEnable_outlookcertificateauthentication.ps1| Not applicable| 22,948| 07-Jul-2021| 09:29| Not applicable \nEnable_outsidein.ps1| Not applicable| 13,659| 07-Jul-2021| 09:29| Not applicable \nEngineupdateserviceinterfaces.dll| 15.1.2242.12| 17,784| 07-Jul-2021| 10:57| x86 \nEscprint.dll| 15.1.2242.12| 20,368| 07-Jul-2021| 09:18| x64 \nEse.dll| 15.1.2242.12| 3,695,504| 07-Jul-2021| 09:29| x64 \nEseback2.dll| 15.1.2242.12| 325,000| 07-Jul-2021| 09:31| x64 \nEsebcli2.dll| 15.1.2242.12| 292,752| 07-Jul-2021| 09:29| x64 \nEseperf.dll| 15.1.2242.12| 116,104| 07-Jul-2021| 09:29| x64 \nEseutil.exe| 15.1.2242.12| 398,728| 07-Jul-2021| 09:29| x64 \nEsevss.dll| 15.1.2242.12| 44,424| 07-Jul-2021| 09:29| x64 \nEtweseproviderresources.dll| 15.1.2242.12| 82,312| 07-Jul-2021| 09:16| x64 \nEventperf.dll| 15.1.2242.12| 59,792| 07-Jul-2021| 09:18| x64 \nExchange.depthtwo.types.ps1xml| Not applicable| 40,105| 07-Jul-2021| 11:35| Not applicable \nExchange.format.ps1xml| Not applicable| 648,608| 07-Jul-2021| 11:35| Not applicable \nExchange.partial.types.ps1xml| Not applicable| 43,322| 07-Jul-2021| 11:35| Not applicable \nExchange.ps1| Not applicable| 20,803| 07-Jul-2021| 11:35| Not applicable \nExchange.support.format.ps1xml| Not applicable| 26,574| 07-Jul-2021| 11:26| Not applicable \nExchange.types.ps1xml| Not applicable| 365,145| 07-Jul-2021| 11:35| Not applicable \nExchangeudfcommon.dll| 15.1.2242.12| 121,744| 07-Jul-2021| 09:19| x86 \nExchangeudfs.dll| 15.1.2242.12| 269,688| 07-Jul-2021| 09:29| x86 \nExchmem.dll| 15.1.2242.12| 85,904| 07-Jul-2021| 09:19| x64 \nExchsetupmsg.dll| 15.1.2242.12| 19,320| 07-Jul-2021| 09:19| x64 \nExchucutil.ps1| Not applicable| 23,932| 07-Jul-2021| 09:29| Not applicable \nExdbfailureitemapi.dll| Not applicable| 27,000| 07-Jul-2021| 09:19| x64 \nExdbmsg.dll| 15.1.2242.12| 229,752| 07-Jul-2021| 09:19| x64 \nExeventperfplugin.dll| 15.1.2242.12| 25,488| 07-Jul-2021| 09:29| x64 \nExmime.dll| 15.1.2242.12| 364,936| 07-Jul-2021| 09:29| x64 \nExportedgeconfig.ps1| Not applicable| 27,403| 07-Jul-2021| 09:29| Not applicable \nExport_mailpublicfoldersformigration.ps1| Not applicable| 18,570| 07-Jul-2021| 09:29| Not applicable \nExport_modernpublicfolderstatistics.ps1| Not applicable| 28,866| 07-Jul-2021| 09:29| Not applicable \nExport_outlookclassification.ps1| Not applicable| 14,410| 07-Jul-2021| 09:20| Not applicable \nExport_publicfolderstatistics.ps1| Not applicable| 23,137| 07-Jul-2021| 09:29| Not applicable \nExport_retentiontags.ps1| Not applicable| 17,056| 07-Jul-2021| 09:29| Not applicable \nExppw.dll| 15.1.2242.12| 83,336| 07-Jul-2021| 09:29| x64 \nExprfdll.dll| 15.1.2242.12| 26,504| 07-Jul-2021| 09:29| x64 \nExrpc32.dll| 15.1.2242.12| 1,922,960| 07-Jul-2021| 09:31| x64 \nExrw.dll| 15.1.2242.12| 28,040| 07-Jul-2021| 09:19| x64 \nExsetdata.dll| 15.1.2242.12| 2,779,536| 07-Jul-2021| 10:57| x64 \nExsetup.exe| 15.1.2242.12| 35,192| 07-Jul-2021| 11:30| x86 \nExsetupui.exe| 15.1.2242.12| 193,400| 07-Jul-2021| 11:30| x86 \nExtrace.dll| 15.1.2242.12| 245,112| 07-Jul-2021| 09:16| x64 \nExt_microsoft.exchange.data.transport.dll| 15.1.2242.12| 601,464| 07-Jul-2021| 10:57| x86 \nExwatson.dll| 15.1.2242.12| 44,936| 07-Jul-2021| 09:20| x64 \nFastioext.dll| 15.1.2242.12| 60,280| 07-Jul-2021| 09:29| x64 \nFil06f84122c94c91a0458cad45c22cce20| Not applicable| 784,715| 07-Jul-2021| 13:08| Not applicable \nFil143a7a5d4894478a85eefc89a6539fc8| Not applicable| 1,909,229| 07-Jul-2021| 13:07| Not applicable \nFil19f527f284a0bb584915f9994f4885c3| Not applicable| 648,761| 07-Jul-2021| 13:08| Not applicable \nFil1a9540363a531e7fb18ffe600cffc3ce| Not applicable| 358,406| 07-Jul-2021| 13:08| Not applicable \nFil220d95210c8697448312eee6628c815c| Not applicable| 303,658| 07-Jul-2021| 13:08| Not applicable \nFil2cf5a31e239a45fabea48687373b547c| Not applicable| 652,727| 07-Jul-2021| 13:08| Not applicable \nFil397f0b1f1d7bd44d6e57e496decea2ec| Not applicable| 784,712| 07-Jul-2021| 13:08| Not applicable \nFil3ab126057b34eee68c4fd4b127ff7aee| Not applicable| 784,688| 07-Jul-2021| 13:08| Not applicable \nFil41bb2e5743e3bde4ecb1e07a76c5a7a8| Not applicable| 149,154| 07-Jul-2021| 13:07| Not applicable \nFil51669bfbda26e56e3a43791df94c1e9c| Not applicable| 9,346| 07-Jul-2021| 13:07| Not applicable \nFil558cb84302edfc96e553bcfce2b85286| Not applicable| 85,260| 07-Jul-2021| 13:07| Not applicable \nFil55ce217251b77b97a46e914579fc4c64| Not applicable| 648,755| 07-Jul-2021| 13:08| Not applicable \nFil5a9e78a51a18d05bc36b5e8b822d43a8| Not applicable| 1,597,359| 07-Jul-2021| 13:08| Not applicable \nFil5c7d10e5f1f9ada1e877c9aa087182a9| Not applicable| 1,597,359| 07-Jul-2021| 13:08| Not applicable \nFil6569a92c80a1e14949e4282ae2cc699c| Not applicable| 1,597,359| 07-Jul-2021| 13:08| Not applicable \nFil6a01daba551306a1e55f0bf6894f4d9f| Not applicable| 648,731| 07-Jul-2021| 13:08| Not applicable \nFil8863143ea7cd93a5f197c9fff13686bf| Not applicable| 648,761| 07-Jul-2021| 13:08| Not applicable \nFil8a8c76f225c7205db1000e8864c10038| Not applicable| 1,597,359| 07-Jul-2021| 13:08| Not applicable \nFil8cd999415d36ba78a3ac16a080c47458| Not applicable| 784,718| 07-Jul-2021| 13:08| Not applicable \nFil97913e630ff02079ce9889505a517ec0| Not applicable| 1,597,359| 07-Jul-2021| 13:08| Not applicable \nFilaa49badb2892075a28d58d06560f8da2| Not applicable| 785,742| 07-Jul-2021| 13:07| Not applicable \nFilae28aeed23ccb4b9b80accc2d43175b5| Not applicable| 648,758| 07-Jul-2021| 13:08| Not applicable \nFilb17f496f9d880a684b5c13f6b02d7203| Not applicable| 784,718| 07-Jul-2021| 13:08| Not applicable \nFilb94ca32f2654692263a5be009c0fe4ca| Not applicable| 2,564,949| 07-Jul-2021| 13:07| Not applicable \nFilbabdc4808eba0c4f18103f12ae955e5c| Not applicable| 341,904,608| 07-Jul-2021| 13:08| Not applicable \nFilc92cf2bf29bed21bd5555163330a3d07| Not applicable| 652,745| 07-Jul-2021| 13:07| Not applicable \nFilcc478d2a8346db20c4e2dc36f3400628| Not applicable| 784,718| 07-Jul-2021| 13:08| Not applicable \nFild26cd6b13cfe2ec2a16703819da6d043| Not applicable| 1,597,359| 07-Jul-2021| 13:08| Not applicable \nFilf2719f9dc8f7b74df78ad558ad3ee8a6| Not applicable| 785,724| 07-Jul-2021| 13:07| Not applicable \nFilfa5378dc76359a55ef20cc34f8a23fee| Not applicable| 1,427,187| 07-Jul-2021| 13:08| Not applicable \nFilteringconfigurationcommands.ps1| Not applicable| 18,263| 07-Jul-2021| 09:29| Not applicable \nFilteringpowershell.dll| 15.1.2242.12| 223,096| 07-Jul-2021| 10:57| x86 \nFilteringpowershell.format.ps1xml| Not applicable| 29,664| 07-Jul-2021| 10:57| Not applicable \nFiltermodule.dll| 15.1.2242.12| 180,104| 07-Jul-2021| 09:29| x64 \nFipexeuperfctrresource.dll| 15.1.2242.12| 15,224| 07-Jul-2021| 09:29| x64 \nFipexeventsresource.dll| 15.1.2242.12| 44,944| 07-Jul-2021| 09:29| x64 \nFipexperfctrresource.dll| 15.1.2242.12| 32,632| 07-Jul-2021| 09:29| x64 \nFirewallres.dll| 15.1.2242.12| 72,584| 07-Jul-2021| 09:16| x64 \nFms.exe| 15.1.2242.12| 1,350,032| 07-Jul-2021| 10:57| x64 \nForefrontactivedirectoryconnector.exe| 15.1.2242.12| 110,984| 07-Jul-2021| 09:19| x64 \nFpsdiag.exe| 15.1.2242.12| 18,824| 07-Jul-2021| 09:29| x86 \nFsccachedfilemanagedlocal.dll| 15.1.2242.12| 822,152| 07-Jul-2021| 09:19| x64 \nFscconfigsupport.dll| 15.1.2242.12| 56,720| 07-Jul-2021| 09:19| x86 \nFscconfigurationserver.exe| 15.1.2242.12| 430,968| 07-Jul-2021| 09:29| x64 \nFscconfigurationserverinterfaces.dll| 15.1.2242.12| 15,752| 07-Jul-2021| 09:29| x86 \nFsccrypto.dll| 15.1.2242.12| 208,776| 07-Jul-2021| 09:18| x64 \nFscipcinterfaceslocal.dll| 15.1.2242.12| 28,552| 07-Jul-2021| 09:15| x86 \nFscipclocal.dll| 15.1.2242.12| 38,288| 07-Jul-2021| 09:29| x86 \nFscsqmuploader.exe| 15.1.2242.12| 453,496| 07-Jul-2021| 09:29| x64 \nGetucpool.ps1| Not applicable| 19,807| 07-Jul-2021| 09:29| Not applicable \nGetvalidengines.ps1| Not applicable| 13,266| 07-Jul-2021| 09:29| Not applicable \nGet_antispamfilteringreport.ps1| Not applicable| 15,825| 07-Jul-2021| 09:29| Not applicable \nGet_antispamsclhistogram.ps1| Not applicable| 14,671| 07-Jul-2021| 09:29| Not applicable \nGet_antispamtopblockedsenderdomains.ps1| Not applicable| 15,743| 07-Jul-2021| 09:29| Not applicable \nGet_antispamtopblockedsenderips.ps1| Not applicable| 14,791| 07-Jul-2021| 09:29| Not applicable \nGet_antispamtopblockedsenders.ps1| Not applicable| 15,474| 07-Jul-2021| 09:29| Not applicable \nGet_antispamtoprblproviders.ps1| Not applicable| 14,701| 07-Jul-2021| 09:29| Not applicable \nGet_antispamtoprecipients.ps1| Not applicable| 14,826| 07-Jul-2021| 09:29| Not applicable \nGet_dleligibilitylist.ps1| Not applicable| 42,348| 07-Jul-2021| 09:29| Not applicable \nGet_exchangeetwtrace.ps1| Not applicable| 28,959| 07-Jul-2021| 09:29| Not applicable \nGet_publicfoldermailboxsize.ps1| Not applicable| 15,038| 07-Jul-2021| 09:29| Not applicable \nGet_storetrace.ps1| Not applicable| 50,627| 07-Jul-2021| 09:29| Not applicable \nHuffman_xpress.dll| 15.1.2242.12| 32,648| 07-Jul-2021| 09:29| x64 \nImportedgeconfig.ps1| Not applicable| 77,280| 07-Jul-2021| 09:29| Not applicable \nImport_mailpublicfoldersformigration.ps1| Not applicable| 29,492| 07-Jul-2021| 09:29| Not applicable \nImport_retentiontags.ps1| Not applicable| 28,830| 07-Jul-2021| 09:29| Not applicable \nInproxy.dll| 15.1.2242.12| 85,904| 07-Jul-2021| 09:20| x64 \nInstallwindowscomponent.ps1| Not applicable| 34,515| 07-Jul-2021| 10:57| Not applicable \nInstall_antispamagents.ps1| Not applicable| 17,945| 07-Jul-2021| 09:29| Not applicable \nInstall_odatavirtualdirectory.ps1| Not applicable| 17,999| 07-Jul-2021| 11:58| Not applicable \nInterop.activeds.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.1.2242.12| 107,408| 07-Jul-2021| 09:18| Not applicable \nInterop.adsiis.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.1.2242.12| 20,352| 07-Jul-2021| 09:19| Not applicable \nInterop.certenroll.dll| 15.1.2242.12| 142,720| 07-Jul-2021| 09:15| x86 \nInterop.licenseinfointerface.dll| 15.1.2242.12| 14,224| 07-Jul-2021| 09:31| x86 \nInterop.netfw.dll| 15.1.2242.12| 34,192| 07-Jul-2021| 09:15| x86 \nInterop.plalibrary.dll| 15.1.2242.12| 72,584| 07-Jul-2021| 09:16| x86 \nInterop.stdole2.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.1.2242.12| 27,016| 07-Jul-2021| 09:15| Not applicable \nInterop.taskscheduler.dll| 15.1.2242.12| 46,472| 07-Jul-2021| 09:15| x86 \nInterop.wuapilib.dll| 15.1.2242.12| 60,792| 07-Jul-2021| 09:18| x86 \nInterop.xenroll.dll| 15.1.2242.12| 39,816| 07-Jul-2021| 09:15| x86 \nKerbauth.dll| 15.1.2242.12| 62,856| 07-Jul-2021| 09:29| x64 \nLicenseinfointerface.dll| 15.1.2242.12| 643,472| 07-Jul-2021| 09:29| x64 \nLpversioning.xml| Not applicable| 20,446| 07-Jul-2021| 11:30| Not applicable \nMailboxdatabasereseedusingspares.ps1| Not applicable| 31,916| 07-Jul-2021| 09:29| Not applicable \nManagedavailabilitycrimsonmsg.dll| 15.1.2242.12| 138,616| 07-Jul-2021| 09:19| x64 \nManagedstorediagnosticfunctions.ps1| Not applicable| 125,853| 07-Jul-2021| 09:29| Not applicable \nManagescheduledtask.ps1| Not applicable| 36,352| 07-Jul-2021| 09:29| Not applicable \nMce.dll| 15.1.2242.12| 1,693,072| 07-Jul-2021| 09:29| x64 \nMeasure_storeusagestatistics.ps1| Not applicable| 29,519| 07-Jul-2021| 09:29| Not applicable \nMerge_publicfoldermailbox.ps1| Not applicable| 22,655| 07-Jul-2021| 09:29| Not applicable \nMicrosoft.database.isam.dll| 15.1.2242.12| 127,376| 07-Jul-2021| 09:31| x86 \nMicrosoft.dkm.proxy.dll| 15.1.2242.12| 25,976| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.activemonitoring.activemonitoringvariantconfig.dll| 15.1.2242.12| 68,496| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.activemonitoring.eventlog.dll| 15.1.2242.12| 17,800| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.addressbook.service.dll| 15.1.2242.12| 232,840| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.addressbook.service.eventlog.dll| 15.1.2242.12| 15,752| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.airsync.airsyncmsg.dll| 15.1.2242.12| 43,384| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.airsync.comon.dll| 15.1.2242.12| 1,775,480| 07-Jul-2021| 11:04| x86 \nMicrosoft.exchange.airsync.dll1| 15.1.2242.12| 505,720| 07-Jul-2021| 11:54| Not applicable \nMicrosoft.exchange.airsynchandler.dll| 15.1.2242.12| 76,152| 07-Jul-2021| 11:57| x86 \nMicrosoft.exchange.anchorservice.dll| 15.1.2242.12| 135,560| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.antispam.eventlog.dll| 15.1.2242.12| 23,424| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.antispamupdate.eventlog.dll| 15.1.2242.12| 15,752| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.antispamupdatesvc.exe| 15.1.2242.12| 27,016| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.approval.applications.dll| 15.1.2242.12| 53,624| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.assistants.dll| 15.1.2242.12| 924,024| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.assistants.eventlog.dll| 15.1.2242.12| 25,976| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.assistants.interfaces.dll| 15.1.2242.12| 42,384| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.audit.azureclient.dll| 15.1.2242.12| 15,240| 07-Jul-2021| 11:27| x86 \nMicrosoft.exchange.auditlogsearch.eventlog.dll| 15.1.2242.12| 14,728| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.auditlogsearchservicelet.dll| 15.1.2242.12| 70,536| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.dll| 15.1.2242.12| 94,608| 07-Jul-2021| 11:36| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.eventlog.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.authadmin.eventlog.dll| 15.1.2242.12| 15,752| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.authadminservicelet.dll| 15.1.2242.12| 36,744| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.authservicehostservicelet.dll| 15.1.2242.12| 15,752| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.autodiscover.configuration.dll| 15.1.2242.12| 79,760| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.autodiscover.dll| 15.1.2242.12| 396,152| 07-Jul-2021| 11:06| x86 \nMicrosoft.exchange.autodiscover.eventlogs.dll| 15.1.2242.12| 21,384| 07-Jul-2021| 09:20| x64 \nMicrosoft.exchange.autodiscoverv2.dll| 15.1.2242.12| 57,224| 07-Jul-2021| 11:09| x86 \nMicrosoft.exchange.bandwidthmonitorservicelet.dll| 15.1.2242.12| 14,728| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.batchservice.dll| 15.1.2242.12| 35,720| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.cabutility.dll| 15.1.2242.12| 276,368| 07-Jul-2021| 09:16| x64 \nMicrosoft.exchange.certificatedeployment.eventlog.dll| 15.1.2242.12| 16,264| 07-Jul-2021| 09:20| x64 \nMicrosoft.exchange.certificatedeploymentservicelet.dll| 15.1.2242.12| 25,976| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.certificatenotification.eventlog.dll| 15.1.2242.12| 13,712| 07-Jul-2021| 09:18| x64 \nMicrosoft.exchange.certificatenotificationservicelet.dll| 15.1.2242.12| 23,432| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.clients.common.dll| 15.1.2242.12| 377,744| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.clients.eventlogs.dll| 15.1.2242.12| 83,848| 07-Jul-2021| 09:15| x64 \nMicrosoft.exchange.clients.owa.dll| 15.1.2242.12| 2,970,488| 07-Jul-2021| 11:57| x86 \nMicrosoft.exchange.clients.owa2.server.dll| 15.1.2242.12| 5,028,744| 07-Jul-2021| 11:54| x86 \nMicrosoft.exchange.clients.owa2.servervariantconfiguration.dll| 15.1.2242.12| 894,328| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.clients.security.dll| 15.1.2242.12| 413,584| 07-Jul-2021| 11:35| x86 \nMicrosoft.exchange.clients.strings.dll| 15.1.2242.12| 924,560| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.cluster.bandwidthmonitor.dll| 15.1.2242.12| 31,624| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.cluster.common.dll| 15.1.2242.12| 52,096| 07-Jul-2021| 09:16| x86 \nMicrosoft.exchange.cluster.common.extensions.dll| 15.1.2242.12| 21,904| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.cluster.diskmonitor.dll| 15.1.2242.12| 33,672| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.cluster.replay.dll| 15.1.2242.12| 3,478,408| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.cluster.replicaseeder.dll| 15.1.2242.12| 108,424| 07-Jul-2021| 09:31| x64 \nMicrosoft.exchange.cluster.replicavsswriter.dll| 15.1.2242.12| 288,648| 07-Jul-2021| 10:57| x64 \nMicrosoft.exchange.cluster.shared.dll| 15.1.2242.12| 621,944| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.agentconfig.transport.dll| 15.1.2242.12| 86,392| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.componentconfig.transport.dll| 15.1.2242.12| 1,827,704| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.directory.adagentservicevariantconfig.dll| 15.1.2242.12| 31,624| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.directory.directoryvariantconfig.dll| 15.1.2242.12| 466,312| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.directory.domtvariantconfig.dll| 15.1.2242.12| 25,976| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.directory.ismemberofresolverconfig.dll| 15.1.2242.12| 38,264| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.directory.tenantrelocationvariantconfig.dll| 15.1.2242.12| 102,800| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.directory.topologyservicevariantconfig.dll| 15.1.2242.12| 48,528| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.diskmanagement.dll| 15.1.2242.12| 67,464| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.common.dll| 15.1.2242.12| 172,936| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.common.encryption.variantconfig.dll| 15.1.2242.12| 113,552| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.il.dll| 15.1.2242.12| 13,704| 07-Jul-2021| 09:16| x86 \nMicrosoft.exchange.common.inference.dll| 15.1.2242.12| 130,448| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.optics.dll| 15.1.2242.12| 63,880| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.common.processmanagermsg.dll| 15.1.2242.12| 19,848| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.common.protocols.popimap.dll| 15.1.2242.12| 15,248| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.common.search.dll| 15.1.2242.12| 107,912| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.search.eventlog.dll| 15.1.2242.12| 17,808| 07-Jul-2021| 09:20| x64 \nMicrosoft.exchange.common.smtp.dll| 15.1.2242.12| 51,592| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.suiteservices.suiteservicesvariantconfig.dll| 15.1.2242.12| 36,728| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.transport.azure.dll| 15.1.2242.12| 27,528| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.common.transport.monitoringconfig.dll| 15.1.2242.12| 1,042,320| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.commonmsg.dll| 15.1.2242.12| 29,064| 07-Jul-2021| 09:16| x64 \nMicrosoft.exchange.compliance.auditlogpumper.messages.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.compliance.auditservice.core.dll| 15.1.2242.12| 181,136| 07-Jul-2021| 11:38| x86 \nMicrosoft.exchange.compliance.auditservice.messages.dll| 15.1.2242.12| 30,096| 07-Jul-2021| 09:18| x64 \nMicrosoft.exchange.compliance.common.dll| 15.1.2242.12| 22,416| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.compliance.crimsonevents.dll| 15.1.2242.12| 85,880| 07-Jul-2021| 09:15| x64 \nMicrosoft.exchange.compliance.dll| 15.1.2242.12| 41,352| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.compliance.recordreview.dll| 15.1.2242.12| 37,264| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.compliance.supervision.dll| 15.1.2242.12| 50,552| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.compliance.taskcreator.dll| 15.1.2242.12| 33,144| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.compliance.taskdistributioncommon.dll| 15.1.2242.12| 1,100,152| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.compliance.taskdistributionfabric.dll| 15.1.2242.12| 206,712| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.compliance.taskplugins.dll| 15.1.2242.12| 210,832| 07-Jul-2021| 11:09| x86 \nMicrosoft.exchange.compression.dll| 15.1.2242.12| 17,272| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.configuration.certificateauth.dll| 15.1.2242.12| 37,752| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.configuration.certificateauth.eventlog.dll| 15.1.2242.12| 14,200| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.configuration.core.dll| 15.1.2242.12| 145,784| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.configuration.core.eventlog.dll| 15.1.2242.12| 14,224| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.configuration.delegatedauth.dll| 15.1.2242.12| 53,112| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.configuration.delegatedauth.eventlog.dll| 15.1.2242.12| 15,752| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.configuration.diagnosticsmodules.dll| 15.1.2242.12| 23,440| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.configuration.diagnosticsmodules.eventlog.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.configuration.failfast.dll| 15.1.2242.12| 54,672| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.configuration.failfast.eventlog.dll| 15.1.2242.12| 13,704| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.configuration.objectmodel.dll| 15.1.2242.12| 1,845,136| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.configuration.objectmodel.eventlog.dll| 15.1.2242.12| 30,088| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.configuration.redirectionmodule.dll| 15.1.2242.12| 68,496| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.configuration.redirectionmodule.eventlog.dll| 15.1.2242.12| 15,240| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.configuration.remotepowershellbackendcmdletproxymodule.dll| 15.1.2242.12| 21,368| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.configuration.remotepowershellbackendcmdletproxymodule.eventlog.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.connectiondatacollector.dll| 15.1.2242.12| 25,992| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.connections.common.dll| 15.1.2242.12| 169,872| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.connections.eas.dll| 15.1.2242.12| 330,120| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.connections.imap.dll| 15.1.2242.12| 173,960| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.connections.pop.dll| 15.1.2242.12| 71,048| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.contentfilter.wrapper.exe| 15.1.2242.12| 203,640| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.context.client.dll| 15.1.2242.12| 27,024| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.context.configuration.dll| 15.1.2242.12| 51,576| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.context.core.dll| 15.1.2242.12| 51,064| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.context.datamodel.dll| 15.1.2242.12| 46,992| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.core.strings.dll| 15.1.2242.12| 1,092,488| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.core.timezone.dll| 15.1.2242.12| 57,224| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.data.applicationlogic.deep.dll| 15.1.2242.12| 326,536| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.data.applicationlogic.dll| 15.1.2242.12| 3,356,528| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.applicationlogic.eventlog.dll| 15.1.2242.12| 35,704| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.data.applicationlogic.monitoring.ifx.dll| 15.1.2242.12| 17,808| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.connectors.dll| 15.1.2242.12| 165,264| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.consumermailboxprovisioning.dll| 15.1.2242.12| 619,408| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.directory.dll| 15.1.2242.12| 7,783,288| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.directory.eventlog.dll| 15.1.2242.12| 80,248| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.data.dll| 15.1.2242.12| 1,786,744| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.groupmailboxaccesslayer.dll| 15.1.2242.12| 1,626,488| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.ha.dll| 15.1.2242.12| 362,360| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.imageanalysis.dll| 15.1.2242.12| 105,872| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.mailboxfeatures.dll| 15.1.2242.12| 15,752| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.mailboxloadbalance.dll| 15.1.2242.12| 224,656| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.mapi.dll| 15.1.2242.12| 186,760| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.metering.contracts.dll| 15.1.2242.12| 39,816| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.data.metering.dll| 15.1.2242.12| 119,176| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.msosyncxsd.dll| 15.1.2242.12| 968,080| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.data.notification.dll| 15.1.2242.12| 141,200| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.personaldataplatform.dll| 15.1.2242.12| 769,408| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.providers.dll| 15.1.2242.12| 139,656| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.provisioning.dll| 15.1.2242.12| 56,696| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.rightsmanagement.dll| 15.1.2242.12| 453,000| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.scheduledtimers.dll| 15.1.2242.12| 32,656| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.storage.clientstrings.dll| 15.1.2242.12| 256,392| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.data.storage.dll| 15.1.2242.12| 11,641,720| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.storage.eventlog.dll| 15.1.2242.12| 37,768| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.data.storageconfigurationresources.dll| 15.1.2242.12| 655,752| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.data.storeobjects.dll| 15.1.2242.12| 174,456| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.throttlingservice.client.dll| 15.1.2242.12| 36,216| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.data.throttlingservice.client.eventlog.dll| 15.1.2242.12| 14,224| 07-Jul-2021| 09:18| x64 \nMicrosoft.exchange.data.throttlingservice.eventlog.dll| 15.1.2242.12| 14,216| 07-Jul-2021| 09:20| x64 \nMicrosoft.exchange.datacenter.management.activemonitoring.recoveryservice.eventlog.dll| 15.1.2242.12| 14,712| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.datacenterstrings.dll| 15.1.2242.12| 72,568| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.delivery.eventlog.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.diagnostics.certificatelogger.dll| 15.1.2242.12| 22,904| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.diagnostics.dll| 15.1.2242.12| 2,210,680| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.diagnostics.dll.deploy| 15.1.2242.12| 2,210,680| 07-Jul-2021| 09:29| Not applicable \nMicrosoft.exchange.diagnostics.performancelogger.dll| 15.1.2242.12| 23,944| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.diagnostics.service.common.dll| 15.1.2242.12| 546,696| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.diagnostics.service.eventlog.dll| 15.1.2242.12| 215,416| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.diagnostics.service.exchangejobs.dll| 15.1.2242.12| 193,424| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.diagnostics.service.exe| 15.1.2242.12| 146,312| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.diagnostics.service.fuseboxperfcounters.dll| 15.1.2242.12| 27,512| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.diagnosticsaggregation.eventlog.dll| 15.1.2242.12| 13,696| 07-Jul-2021| 09:20| x64 \nMicrosoft.exchange.diagnosticsaggregationservicelet.dll| 15.1.2242.12| 49,544| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.directory.topologyservice.eventlog.dll| 15.1.2242.12| 28,024| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.directory.topologyservice.exe| 15.1.2242.12| 208,776| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.disklocker.events.dll| 15.1.2242.12| 88,968| 07-Jul-2021| 09:16| x64 \nMicrosoft.exchange.disklocker.interop.dll| 15.1.2242.12| 32,648| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.drumtesting.calendarmigration.dll| 15.1.2242.12| 45,968| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.drumtesting.common.dll| 15.1.2242.12| 18,808| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.dxstore.dll| 15.1.2242.12| 473,464| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.dxstore.ha.events.dll| 15.1.2242.12| 206,216| 07-Jul-2021| 09:16| x64 \nMicrosoft.exchange.dxstore.ha.instance.exe| 15.1.2242.12| 36,752| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.eac.flighting.dll| 15.1.2242.12| 131,448| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.edgecredentialsvc.exe| 15.1.2242.12| 21,896| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.edgesync.common.dll| 15.1.2242.12| 148,368| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.edgesync.datacenterproviders.dll| 15.1.2242.12| 220,048| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.edgesync.eventlog.dll| 15.1.2242.12| 23,928| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.edgesyncsvc.exe| 15.1.2242.12| 97,656| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.ediscovery.export.dll| 15.1.2242.12| 1,266,056| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.ediscovery.export.dll.deploy| 15.1.2242.12| 1,266,056| 07-Jul-2021| 09:29| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.application| Not applicable| 16,486| 07-Jul-2021| 10:57| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.exe.deploy| 15.1.2242.12| 87,416| 07-Jul-2021| 09:31| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.manifest| Not applicable| 67,455| 07-Jul-2021| 10:57| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.strings.dll.deploy| 15.1.2242.12| 52,104| 07-Jul-2021| 09:18| Not applicable \nMicrosoft.exchange.ediscovery.mailboxsearch.dll| 15.1.2242.12| 294,264| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.birthdaycalendar.dll| 15.1.2242.12| 73,080| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.entities.booking.defaultservicesettings.dll| 15.1.2242.12| 45,968| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.booking.dll| 15.1.2242.12| 218,488| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.entities.booking.management.dll| 15.1.2242.12| 78,216| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.bookings.dll| 15.1.2242.12| 35,728| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.calendaring.dll| 15.1.2242.12| 932,240| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.common.dll| 15.1.2242.12| 336,240| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.connectors.dll| 15.1.2242.12| 52,624| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.contentsubmissions.dll| 15.1.2242.12| 32,120| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.context.dll| 15.1.2242.12| 60,816| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.datamodel.dll| 15.1.2242.12| 854,408| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.fileproviders.dll| 15.1.2242.12| 291,720| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.entities.foldersharing.dll| 15.1.2242.12| 39,312| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.holidaycalendars.dll| 15.1.2242.12| 76,152| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.entities.insights.dll| 15.1.2242.12| 166,776| 07-Jul-2021| 11:05| x86 \nMicrosoft.exchange.entities.meetinglocation.dll| 15.1.2242.12| 1,486,736| 07-Jul-2021| 11:05| x86 \nMicrosoft.exchange.entities.meetingparticipants.dll| 15.1.2242.12| 122,232| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.entities.meetingtimecandidates.dll| 15.1.2242.12| 12,327,304| 07-Jul-2021| 11:09| x86 \nMicrosoft.exchange.entities.onlinemeetings.dll| 15.1.2242.12| 264,056| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.people.dll| 15.1.2242.12| 37,752| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.peopleinsights.dll| 15.1.2242.12| 186,760| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.entities.reminders.dll| 15.1.2242.12| 64,376| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.entities.schedules.dll| 15.1.2242.12| 83,848| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.entities.shellservice.dll| 15.1.2242.12| 63,888| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.tasks.dll| 15.1.2242.12| 100,240| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entities.xrm.dll| 15.1.2242.12| 144,760| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.entityextraction.calendar.dll| 15.1.2242.12| 270,200| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.eserepl.common.dll| 15.1.2242.12| 15,240| 07-Jul-2021| 09:16| x86 \nMicrosoft.exchange.eserepl.configuration.dll| 15.1.2242.12| 15,760| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.eserepl.dll| 15.1.2242.12| 130,448| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.ews.configuration.dll| 15.1.2242.12| 254,352| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.exchangecertificate.eventlog.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:16| x64 \nMicrosoft.exchange.exchangecertificateservicelet.dll| 15.1.2242.12| 37,256| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.extensibility.internal.dll| 15.1.2242.12| 640,904| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.extensibility.partner.dll| 15.1.2242.12| 37,240| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.federateddirectory.dll| 15.1.2242.12| 146,320| 07-Jul-2021| 11:35| x86 \nMicrosoft.exchange.ffosynclogmsg.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.frontendhttpproxy.dll| 15.1.2242.12| 594,312| 07-Jul-2021| 11:35| x86 \nMicrosoft.exchange.frontendhttpproxy.eventlogs.dll| 15.1.2242.12| 14,712| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.frontendtransport.monitoring.dll| 15.1.2242.12| 30,072| 07-Jul-2021| 12:15| x86 \nMicrosoft.exchange.griffin.variantconfiguration.dll| 15.1.2242.12| 99,704| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.hathirdpartyreplication.dll| 15.1.2242.12| 42,376| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.helpprovider.dll| 15.1.2242.12| 40,336| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.httpproxy.addressfinder.dll| 15.1.2242.12| 54,152| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.httpproxy.common.dll| 15.1.2242.12| 163,704| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.httpproxy.diagnostics.dll| 15.1.2242.12| 58,760| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.httpproxy.flighting.dll| 15.1.2242.12| 204,176| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.httpproxy.passivemonitor.dll| 15.1.2242.12| 17,784| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.httpproxy.proxyassistant.dll| 15.1.2242.12| 30,600| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.httpproxy.routerefresher.dll| 15.1.2242.12| 38,792| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.httpproxy.routeselector.dll| 15.1.2242.12| 48,520| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.httpproxy.routing.dll| 15.1.2242.12| 180,608| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.httpredirectmodules.dll| 15.1.2242.12| 36,744| 07-Jul-2021| 11:36| x86 \nMicrosoft.exchange.httputilities.dll| 15.1.2242.12| 25,992| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.hygiene.data.dll| 15.1.2242.12| 1,868,152| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.hygiene.diagnosisutil.dll| 15.1.2242.12| 54,664| 07-Jul-2021| 09:16| x86 \nMicrosoft.exchange.hygiene.eopinstantprovisioning.dll| 15.1.2242.12| 35,704| 07-Jul-2021| 11:26| x86 \nMicrosoft.exchange.idserialization.dll| 15.1.2242.12| 35,720| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.imap4.eventlog.dll| 15.1.2242.12| 18,296| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.imap4.eventlog.dll.fe| 15.1.2242.12| 18,296| 07-Jul-2021| 09:29| Not applicable \nMicrosoft.exchange.imap4.exe| 15.1.2242.12| 263,056| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.imap4.exe.fe| 15.1.2242.12| 263,056| 07-Jul-2021| 10:57| Not applicable \nMicrosoft.exchange.imap4service.exe| 15.1.2242.12| 24,968| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.imap4service.exe.fe| 15.1.2242.12| 24,968| 07-Jul-2021| 10:57| Not applicable \nMicrosoft.exchange.imapconfiguration.dl1| 15.1.2242.12| 53,136| 07-Jul-2021| 10:57| Not applicable \nMicrosoft.exchange.inference.common.dll| 15.1.2242.12| 216,976| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.inference.hashtagsrelevance.dll| 15.1.2242.12| 32,136| 07-Jul-2021| 11:06| x64 \nMicrosoft.exchange.inference.peoplerelevance.dll| 15.1.2242.12| 281,992| 07-Jul-2021| 11:04| x86 \nMicrosoft.exchange.inference.ranking.dll| 15.1.2242.12| 18,824| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.inference.safetylibrary.dll| 15.1.2242.12| 83,848| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.inference.service.eventlog.dll| 15.1.2242.12| 15,224| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.infoworker.assistantsclientresources.dll| 15.1.2242.12| 94,072| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.infoworker.common.dll| 15.1.2242.12| 1,840,512| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.infoworker.eventlog.dll| 15.1.2242.12| 71,544| 07-Jul-2021| 09:18| x64 \nMicrosoft.exchange.infoworker.meetingvalidator.dll| 15.1.2242.12| 175,504| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.instantmessaging.dll| 15.1.2242.12| 45,960| 07-Jul-2021| 09:16| x86 \nMicrosoft.exchange.irm.formprotector.dll| 15.1.2242.12| 159,624| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.irm.msoprotector.dll| 15.1.2242.12| 51,080| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.irm.ofcprotector.dll| 15.1.2242.12| 45,968| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.isam.databasemanager.dll| 15.1.2242.12| 30,584| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.isam.esebcli.dll| 15.1.2242.12| 100,240| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.jobqueue.eventlog.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.jobqueueservicelet.dll| 15.1.2242.12| 271,248| 07-Jul-2021| 11:38| x86 \nMicrosoft.exchange.killswitch.dll| 15.1.2242.12| 22,408| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.killswitchconfiguration.dll| 15.1.2242.12| 33,656| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.auditing.dll| 15.1.2242.12| 18,320| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.analyzers.certificatelog.dll| 15.1.2242.12| 15,248| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.analyzers.cmdletinfralog.dll| 15.1.2242.12| 27,528| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.analyzers.easlog.dll| 15.1.2242.12| 30,600| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.ecplog.dll| 15.1.2242.12| 22,416| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.analyzers.eventlog.dll| 15.1.2242.12| 66,424| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.ewslog.dll| 15.1.2242.12| 29,576| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.analyzers.griffinperfcounter.dll| 15.1.2242.12| 19,848| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.groupescalationlog.dll| 15.1.2242.12| 20,360| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.analyzers.httpproxylog.dll| 15.1.2242.12| 19,336| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.hxservicelog.dll| 15.1.2242.12| 34,184| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.iislog.dll| 15.1.2242.12| 103,800| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.analyzers.lameventlog.dll| 15.1.2242.12| 31,624| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.migrationlog.dll| 15.1.2242.12| 15,760| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.analyzers.oabdownloadlog.dll| 15.1.2242.12| 20,856| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.oauthcafelog.dll| 15.1.2242.12| 16,272| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.outlookservicelog.dll| 15.1.2242.12| 49,032| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.owaclientlog.dll| 15.1.2242.12| 44,424| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.owalog.dll| 15.1.2242.12| 38,280| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.analyzers.perflog.dll| 15.1.2242.12| 10,375,032| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.pfassistantlog.dll| 15.1.2242.12| 29,064| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.analyzers.rca.dll| 15.1.2242.12| 21,384| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.analyzers.restlog.dll| 15.1.2242.12| 24,456| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.store.dll| 15.1.2242.12| 15,232| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.analyzers.transportsynchealthlog.dll| 15.1.2242.12| 21,872| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.core.dll| 15.1.2242.12| 89,488| 07-Jul-2021| 09:16| x86 \nMicrosoft.exchange.loganalyzer.extensions.auditing.dll| 15.1.2242.12| 20,872| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.certificatelog.dll| 15.1.2242.12| 26,504| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.cmdletinfralog.dll| 15.1.2242.12| 21,384| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.common.dll| 15.1.2242.12| 28,024| 07-Jul-2021| 09:18| x86 \nMicrosoft.exchange.loganalyzer.extensions.easlog.dll| 15.1.2242.12| 28,560| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.errordetection.dll| 15.1.2242.12| 36,232| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.ewslog.dll| 15.1.2242.12| 16,776| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.griffinperfcounter.dll| 15.1.2242.12| 19,856| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.groupescalationlog.dll| 15.1.2242.12| 15,240| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.httpproxylog.dll| 15.1.2242.12| 17,288| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.hxservicelog.dll| 15.1.2242.12| 19,848| 07-Jul-2021| 09:20| x86 \nMicrosoft.exchange.loganalyzer.extensions.iislog.dll| 15.1.2242.12| 57,224| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.migrationlog.dll| 15.1.2242.12| 17,800| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.oabdownloadlog.dll| 15.1.2242.12| 18,808| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.extensions.oauthcafelog.dll| 15.1.2242.12| 16,264| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.outlookservicelog.dll| 15.1.2242.12| 17,800| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.owaclientlog.dll| 15.1.2242.12| 15,240| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.owalog.dll| 15.1.2242.12| 15,224| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.perflog.dll| 15.1.2242.12| 52,616| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.loganalyzer.extensions.pfassistantlog.dll| 15.1.2242.12| 18,312| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.rca.dll| 15.1.2242.12| 34,168| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.loganalyzer.extensions.restlog.dll| 15.1.2242.12| 17,288| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loganalyzer.extensions.store.dll| 15.1.2242.12| 18,824| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.transportsynchealthlog.dll| 15.1.2242.12| 43,400| 07-Jul-2021| 09:20| x86 \nMicrosoft.exchange.loguploader.dll| 15.1.2242.12| 165,240| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.loguploaderproxy.dll| 15.1.2242.12| 54,672| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxassistants.assistants.dll| 15.1.2242.12| 9,060,744| 07-Jul-2021| 12:06| x86 \nMicrosoft.exchange.mailboxassistants.attachmentthumbnail.dll| 15.1.2242.12| 33,168| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxassistants.common.dll| 15.1.2242.12| 124,280| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxassistants.crimsonevents.dll| 15.1.2242.12| 82,832| 07-Jul-2021| 09:18| x64 \nMicrosoft.exchange.mailboxassistants.eventlog.dll| 15.1.2242.12| 14,216| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.mailboxassistants.rightsmanagement.dll| 15.1.2242.12| 30,096| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxloadbalance.dll| 15.1.2242.12| 661,384| 07-Jul-2021| 11:08| x86 \nMicrosoft.exchange.mailboxloadbalance.serverstrings.dll| 15.1.2242.12| 63,352| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxreplicationservice.calendarsyncprovider.dll| 15.1.2242.12| 175,480| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.common.dll| 15.1.2242.12| 2,784,144| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxreplicationservice.complianceprovider.dll| 15.1.2242.12| 53,112| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.contactsyncprovider.dll| 15.1.2242.12| 151,944| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.dll| 15.1.2242.12| 966,008| 07-Jul-2021| 11:06| x86 \nMicrosoft.exchange.mailboxreplicationservice.easprovider.dll| 15.1.2242.12| 185,208| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.eventlog.dll| 15.1.2242.12| 31,608| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.mailboxreplicationservice.googledocprovider.dll| 15.1.2242.12| 39,824| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.imapprovider.dll| 15.1.2242.12| 105,848| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.mapiprovider.dll| 15.1.2242.12| 94,600| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.popprovider.dll| 15.1.2242.12| 43,408| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyclient.dll| 15.1.2242.12| 18,824| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyservice.dll| 15.1.2242.12| 172,936| 07-Jul-2021| 11:06| x86 \nMicrosoft.exchange.mailboxreplicationservice.pstprovider.dll| 15.1.2242.12| 102,776| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.remoteprovider.dll| 15.1.2242.12| 98,680| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.storageprovider.dll| 15.1.2242.12| 188,304| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.mailboxreplicationservice.syncprovider.dll| 15.1.2242.12| 43,400| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.mailboxreplicationservice.xml.dll| 15.1.2242.12| 447,368| 07-Jul-2021| 09:16| x86 \nMicrosoft.exchange.mailboxreplicationservice.xrmprovider.dll| 15.1.2242.12| 89,976| 07-Jul-2021| 11:04| x86 \nMicrosoft.exchange.mailboxtransport.monitoring.dll| 15.1.2242.12| 107,896| 07-Jul-2021| 12:16| x86 \nMicrosoft.exchange.mailboxtransport.storedriveragents.dll| 15.1.2242.12| 371,080| 07-Jul-2021| 11:08| x86 \nMicrosoft.exchange.mailboxtransport.storedrivercommon.dll| 15.1.2242.12| 193,912| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxtransport.storedriverdelivery.dll| 15.1.2242.12| 551,816| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxtransport.storedriverdelivery.eventlog.dll| 15.1.2242.12| 16,248| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.mailboxtransport.submission.eventlog.dll| 15.1.2242.12| 15,736| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.mailboxtransport.submission.storedriversubmission.dll| 15.1.2242.12| 321,400| 07-Jul-2021| 11:04| x86 \nMicrosoft.exchange.mailboxtransport.submission.storedriversubmission.eventlog.dll| 15.1.2242.12| 17,800| 07-Jul-2021| 09:20| x64 \nMicrosoft.exchange.mailboxtransport.syncdelivery.dll| 15.1.2242.12| 45,432| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxtransportwatchdogservicelet.dll| 15.1.2242.12| 18,312| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mailboxtransportwatchdogservicelet.eventlog.dll| 15.1.2242.12| 12,672| 07-Jul-2021| 09:18| x64 \nMicrosoft.exchange.managedlexruntime.mppgruntime.dll| 15.1.2242.12| 20,872| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.management.activedirectory.dll| 15.1.2242.12| 415,120| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.management.classificationdefinitions.dll| 15.1.2242.12| 1,269,624| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.management.compliancepolicy.dll| 15.1.2242.12| 39,304| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.management.controlpanel.basics.dll| 15.1.2242.12| 433,552| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.management.controlpanel.dll| 15.1.2242.12| 4,563,336| 07-Jul-2021| 13:19| x86 \nMicrosoft.exchange.management.controlpanel.owaoptionstrings.dll| 15.1.2242.12| 261,000| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.management.controlpanelmsg.dll| 15.1.2242.12| 33,656| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.management.deployment.analysis.dll| 15.1.2242.12| 94,096| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.management.deployment.dll| 15.1.2242.12| 591,248| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.management.deployment.xml.dll| 15.1.2242.12| 3,560,848| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.management.detailstemplates.dll| 15.1.2242.12| 67,984| 07-Jul-2021| 11:38| x86 \nMicrosoft.exchange.management.dll| 15.1.2242.12| 16,477,072| 07-Jul-2021| 11:22| x86 \nMicrosoft.exchange.management.edge.systemmanager.dll| 15.1.2242.12| 58,744| 07-Jul-2021| 11:27| x86 \nMicrosoft.exchange.management.infrastructure.asynchronoustask.dll| 15.1.2242.12| 23,952| 07-Jul-2021| 11:27| x86 \nMicrosoft.exchange.management.jitprovisioning.dll| 15.1.2242.12| 101,760| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.management.migration.dll| 15.1.2242.12| 543,608| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.management.mobility.dll| 15.1.2242.12| 305,016| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.management.nativeresources.dll| 15.1.2242.12| 131,984| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.management.powershell.support.dll| 15.1.2242.12| 418,704| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.management.provisioning.dll| 15.1.2242.12| 275,856| 07-Jul-2021| 11:29| x86 \nMicrosoft.exchange.management.psdirectinvoke.dll| 15.1.2242.12| 70,536| 07-Jul-2021| 11:33| x86 \nMicrosoft.exchange.management.rbacdefinition.dll| 15.1.2242.12| 7,873,928| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.management.recipient.dll| 15.1.2242.12| 1,500,048| 07-Jul-2021| 11:26| x86 \nMicrosoft.exchange.management.reportingwebservice.dll| 15.1.2242.12| 145,296| 07-Jul-2021| 11:40| x86 \nMicrosoft.exchange.management.reportingwebservice.eventlog.dll| 15.1.2242.12| 13,688| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.management.snapin.esm.dll| 15.1.2242.12| 71,568| 07-Jul-2021| 11:27| x86 \nMicrosoft.exchange.management.systemmanager.dll| 15.1.2242.12| 1,249,160| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.management.transport.dll| 15.1.2242.12| 1,876,344| 07-Jul-2021| 11:31| x86 \nMicrosoft.exchange.managementgui.dll| 15.1.2242.12| 5,225,864| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.managementmsg.dll| 15.1.2242.12| 36,240| 07-Jul-2021| 09:20| x64 \nMicrosoft.exchange.mapihttpclient.dll| 15.1.2242.12| 117,624| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mapihttphandler.dll| 15.1.2242.12| 209,808| 07-Jul-2021| 11:27| x86 \nMicrosoft.exchange.messagesecurity.dll| 15.1.2242.12| 79,736| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.messagesecurity.messagesecuritymsg.dll| 15.1.2242.12| 17,272| 07-Jul-2021| 09:18| x64 \nMicrosoft.exchange.messagingpolicies.dlppolicyagent.dll| 15.1.2242.12| 156,024| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.messagingpolicies.edgeagents.dll| 15.1.2242.12| 65,936| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.messagingpolicies.eventlog.dll| 15.1.2242.12| 30,584| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.messagingpolicies.filtering.dll| 15.1.2242.12| 58,232| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.messagingpolicies.hygienerules.dll| 15.1.2242.12| 29,584| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.messagingpolicies.journalagent.dll| 15.1.2242.12| 175,480| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.messagingpolicies.redirectionagent.dll| 15.1.2242.12| 28,560| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.messagingpolicies.retentionpolicyagent.dll| 15.1.2242.12| 75,144| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.messagingpolicies.rmsvcagent.dll| 15.1.2242.12| 207,248| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.messagingpolicies.rules.dll| 15.1.2242.12| 440,712| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.messagingpolicies.supervisoryreviewagent.dll| 15.1.2242.12| 83,344| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.messagingpolicies.transportruleagent.dll| 15.1.2242.12| 35,216| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.messagingpolicies.unifiedpolicycommon.dll| 15.1.2242.12| 53,128| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.messagingpolicies.unjournalagent.dll| 15.1.2242.12| 96,632| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.migration.dll| 15.1.2242.12| 1,110,416| 07-Jul-2021| 11:05| x86 \nMicrosoft.exchange.migrationworkflowservice.eventlog.dll| 15.1.2242.12| 14,712| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.mobiledriver.dll| 15.1.2242.12| 135,544| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.monitoring.activemonitoring.local.components.dll| 15.1.2242.12| 5,155,704| 07-Jul-2021| 12:11| x86 \nMicrosoft.exchange.monitoring.servicecontextprovider.dll| 15.1.2242.12| 19,848| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.mrsmlbconfiguration.dll| 15.1.2242.12| 68,488| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.net.dll| 15.1.2242.12| 5,084,040| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.net.rightsmanagement.dll| 15.1.2242.12| 265,608| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.networksettings.dll| 15.1.2242.12| 37,752| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.notifications.broker.eventlog.dll| 15.1.2242.12| 14,216| 07-Jul-2021| 09:16| x64 \nMicrosoft.exchange.notifications.broker.exe| 15.1.2242.12| 549,752| 07-Jul-2021| 12:02| x86 \nMicrosoft.exchange.oabauthmodule.dll| 15.1.2242.12| 22,928| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.oabrequesthandler.dll| 15.1.2242.12| 106,384| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.oauth.core.dll| 15.1.2242.12| 291,728| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.objectstoreclient.dll| 15.1.2242.12| 17,288| 07-Jul-2021| 09:18| x86 \nMicrosoft.exchange.odata.configuration.dll| 15.1.2242.12| 277,880| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.odata.dll| 15.1.2242.12| 2,992,520| 07-Jul-2021| 11:58| x86 \nMicrosoft.exchange.officegraph.common.dll| 15.1.2242.12| 88,968| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.grain.dll| 15.1.2242.12| 101,768| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.graincow.dll| 15.1.2242.12| 38,264| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.graineventbasedassistants.dll| 15.1.2242.12| 45,432| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.grainpropagationengine.dll| 15.1.2242.12| 58,256| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.graintransactionstorage.dll| 15.1.2242.12| 147,344| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.graintransportdeliveryagent.dll| 15.1.2242.12| 26,488| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.graphstore.dll| 15.1.2242.12| 184,200| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.permailboxkeys.dll| 15.1.2242.12| 26,488| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.secondarycopyquotamanagement.dll| 15.1.2242.12| 38,280| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.secondaryshallowcopylocation.dll| 15.1.2242.12| 55,672| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.security.dll| 15.1.2242.12| 147,320| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.semanticgraph.dll| 15.1.2242.12| 191,864| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.officegraph.tasklogger.dll| 15.1.2242.12| 33,680| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.partitioncache.dll| 15.1.2242.12| 28,024| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.passivemonitoringsettings.dll| 15.1.2242.12| 32,656| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.photogarbagecollectionservicelet.dll| 15.1.2242.12| 15,248| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.pop3.eventlog.dll| 15.1.2242.12| 17,296| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.pop3.eventlog.dll.fe| 15.1.2242.12| 17,296| 07-Jul-2021| 09:19| Not applicable \nMicrosoft.exchange.pop3.exe| 15.1.2242.12| 106,896| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.pop3.exe.fe| 15.1.2242.12| 106,896| 07-Jul-2021| 10:57| Not applicable \nMicrosoft.exchange.pop3service.exe| 15.1.2242.12| 24,976| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.pop3service.exe.fe| 15.1.2242.12| 24,976| 07-Jul-2021| 10:57| Not applicable \nMicrosoft.exchange.popconfiguration.dl1| 15.1.2242.12| 42,896| 07-Jul-2021| 10:57| Not applicable \nMicrosoft.exchange.popimap.core.dll| 15.1.2242.12| 264,056| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.popimap.core.dll.fe| 15.1.2242.12| 264,056| 07-Jul-2021| 10:57| Not applicable \nMicrosoft.exchange.powersharp.dll| 15.1.2242.12| 358,264| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.powersharp.management.dll| 15.1.2242.12| 4,168,072| 07-Jul-2021| 11:33| x86 \nMicrosoft.exchange.powershell.configuration.dll| 15.1.2242.12| 326,024| 07-Jul-2021| 11:35| x64 \nMicrosoft.exchange.powershell.rbachostingtools.dll| 15.1.2242.12| 41,352| 07-Jul-2021| 11:35| x86 \nMicrosoft.exchange.protectedservicehost.exe| 15.1.2242.12| 30,608| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.protocols.fasttransfer.dll| 15.1.2242.12| 135,032| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.protocols.mapi.dll| 15.1.2242.12| 436,616| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.provisioning.eventlog.dll| 15.1.2242.12| 14,216| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.provisioningagent.dll| 15.1.2242.12| 224,120| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.provisioningservicelet.dll| 15.1.2242.12| 105,848| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.pst.dll| 15.1.2242.12| 168,840| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.pst.dll.deploy| 15.1.2242.12| 168,840| 07-Jul-2021| 09:15| Not applicable \nMicrosoft.exchange.pswsclient.dll| 15.1.2242.12| 259,464| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.publicfolders.dll| 15.1.2242.12| 72,080| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.pushnotifications.crimsonevents.dll| 15.1.2242.12| 215,944| 07-Jul-2021| 09:18| x64 \nMicrosoft.exchange.pushnotifications.dll| 15.1.2242.12| 106,896| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.pushnotifications.publishers.dll| 15.1.2242.12| 425,872| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.pushnotifications.server.dll| 15.1.2242.12| 70,536| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.query.analysis.dll| 15.1.2242.12| 46,456| 07-Jul-2021| 11:05| x86 \nMicrosoft.exchange.query.configuration.dll| 15.1.2242.12| 206,728| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.query.core.dll| 15.1.2242.12| 163,192| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.query.ranking.dll| 15.1.2242.12| 342,408| 07-Jul-2021| 11:05| x86 \nMicrosoft.exchange.query.retrieval.dll| 15.1.2242.12| 149,392| 07-Jul-2021| 11:07| x86 \nMicrosoft.exchange.query.suggestions.dll| 15.1.2242.12| 95,096| 07-Jul-2021| 11:03| x86 \nMicrosoft.exchange.realtimeanalyticspublisherservicelet.dll| 15.1.2242.12| 127,352| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.relevance.core.dll| 15.1.2242.12| 63,360| 07-Jul-2021| 09:16| x86 \nMicrosoft.exchange.relevance.data.dll| 15.1.2242.12| 36,752| 07-Jul-2021| 10:57| x64 \nMicrosoft.exchange.relevance.mailtagger.dll| 15.1.2242.12| 17,808| 07-Jul-2021| 09:31| x64 \nMicrosoft.exchange.relevance.people.dll| 15.1.2242.12| 9,666,952| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.relevance.peopleindex.dll| 15.1.2242.12| 20,788,088| 07-Jul-2021| 10:57| x64 \nMicrosoft.exchange.relevance.peopleranker.dll| 15.1.2242.12| 36,744| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.relevance.perm.dll| 15.1.2242.12| 97,672| 07-Jul-2021| 09:16| x64 \nMicrosoft.exchange.relevance.sassuggest.dll| 15.1.2242.12| 28,552| 07-Jul-2021| 10:57| x64 \nMicrosoft.exchange.relevance.upm.dll| 15.1.2242.12| 72,080| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.routing.client.dll| 15.1.2242.12| 15,736| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.routing.eventlog.dll| 15.1.2242.12| 13,176| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.routing.server.exe| 15.1.2242.12| 59,256| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.rpc.dll| 15.1.2242.12| 1,639,304| 07-Jul-2021| 10:57| x64 \nMicrosoft.exchange.rpcclientaccess.dll| 15.1.2242.12| 209,808| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.rpcclientaccess.exmonhandler.dll| 15.1.2242.12| 60,280| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.rpcclientaccess.handler.dll| 15.1.2242.12| 517,520| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.rpcclientaccess.monitoring.dll| 15.1.2242.12| 161,168| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.rpcclientaccess.parser.dll| 15.1.2242.12| 721,808| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.rpcclientaccess.server.dll| 15.1.2242.12| 243,088| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.rpcclientaccess.service.eventlog.dll| 15.1.2242.12| 20,856| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.rpcclientaccess.service.exe| 15.1.2242.12| 35,216| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.rpchttpmodules.dll| 15.1.2242.12| 42,384| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.rpcoverhttpautoconfig.dll| 15.1.2242.12| 56,200| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.rpcoverhttpautoconfig.eventlog.dll| 15.1.2242.12| 27,528| 07-Jul-2021| 09:16| x64 \nMicrosoft.exchange.rules.common.dll| 15.1.2242.12| 130,440| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.saclwatcher.eventlog.dll| 15.1.2242.12| 14,720| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.saclwatcherservicelet.dll| 15.1.2242.12| 20,368| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.safehtml.dll| 15.1.2242.12| 21,384| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.sandbox.activities.dll| 15.1.2242.12| 267,656| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.sandbox.contacts.dll| 15.1.2242.12| 110,976| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.sandbox.core.dll| 15.1.2242.12| 112,520| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.sandbox.services.dll| 15.1.2242.12| 622,472| 07-Jul-2021| 09:18| x86 \nMicrosoft.exchange.search.bigfunnel.dll| 15.1.2242.12| 162,184| 07-Jul-2021| 11:05| x86 \nMicrosoft.exchange.search.bigfunnel.eventlog.dll| 15.1.2242.12| 12,152| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.search.blingwrapper.dll| 15.1.2242.12| 19,336| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.search.core.dll| 15.1.2242.12| 209,808| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.search.ediscoveryquery.dll| 15.1.2242.12| 17,808| 07-Jul-2021| 11:07| x86 \nMicrosoft.exchange.search.engine.dll| 15.1.2242.12| 96,656| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.search.fast.configuration.dll| 15.1.2242.12| 16,776| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.search.fast.dll| 15.1.2242.12| 435,072| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.search.files.dll| 15.1.2242.12| 274,296| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.search.flighting.dll| 15.1.2242.12| 24,952| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.search.mdb.dll| 15.1.2242.12| 219,000| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.search.service.exe| 15.1.2242.12| 26,504| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.security.applicationencryption.dll| 15.1.2242.12| 162,168| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.security.dll| 15.1.2242.12| 1,555,848| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.security.msarpsservice.exe| 15.1.2242.12| 19,856| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.security.securitymsg.dll| 15.1.2242.12| 28,560| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.server.storage.admininterface.dll| 15.1.2242.12| 222,600| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.server.storage.common.dll| 15.1.2242.12| 1,110,928| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.diagnostics.dll| 15.1.2242.12| 212,368| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.directoryservices.dll| 15.1.2242.12| 113,528| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.esebackinterop.dll| 15.1.2242.12| 82,824| 07-Jul-2021| 10:57| x64 \nMicrosoft.exchange.server.storage.eventlog.dll| 15.1.2242.12| 80,776| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.server.storage.fulltextindex.dll| 15.1.2242.12| 66,424| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.ha.dll| 15.1.2242.12| 81,272| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.lazyindexing.dll| 15.1.2242.12| 208,264| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.logicaldatamodel.dll| 15.1.2242.12| 1,163,144| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.mapidisp.dll| 15.1.2242.12| 504,200| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.multimailboxsearch.dll| 15.1.2242.12| 47,496| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.physicalaccess.dll| 15.1.2242.12| 848,264| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.propertydefinitions.dll| 15.1.2242.12| 1,219,976| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.propertytag.dll| 15.1.2242.12| 30,584| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.rpcproxy.dll| 15.1.2242.12| 120,720| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.server.storage.storecommonservices.dll| 15.1.2242.12| 1,009,552| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.storeintegritycheck.dll| 15.1.2242.12| 110,968| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.workermanager.dll| 15.1.2242.12| 34,696| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.server.storage.xpress.dll| 15.1.2242.12| 19,344| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.servicehost.eventlog.dll| 15.1.2242.12| 14,712| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.servicehost.exe| 15.1.2242.12| 60,816| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.servicelets.globallocatorcache.dll| 15.1.2242.12| 50,568| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.servicelets.globallocatorcache.eventlog.dll| 15.1.2242.12| 14,216| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.servicelets.unifiedpolicysyncservicelet.eventlog.dll| 15.1.2242.12| 14,216| 07-Jul-2021| 09:18| x64 \nMicrosoft.exchange.services.common.dll| 15.1.2242.12| 74,104| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.services.dll| 15.1.2242.12| 8,476,536| 07-Jul-2021| 11:41| x86 \nMicrosoft.exchange.services.eventlogs.dll| 15.1.2242.12| 30,088| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.services.ewshandler.dll| 15.1.2242.12| 633,720| 07-Jul-2021| 11:55| x86 \nMicrosoft.exchange.services.ewsserialization.dll| 15.1.2242.12| 1,651,080| 07-Jul-2021| 11:46| x86 \nMicrosoft.exchange.services.json.dll| 15.1.2242.12| 296,336| 07-Jul-2021| 11:51| x86 \nMicrosoft.exchange.services.messaging.dll| 15.1.2242.12| 43,400| 07-Jul-2021| 11:44| x86 \nMicrosoft.exchange.services.onlinemeetings.dll| 15.1.2242.12| 233,336| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.services.surface.dll| 15.1.2242.12| 178,552| 07-Jul-2021| 11:52| x86 \nMicrosoft.exchange.services.wcf.dll| 15.1.2242.12| 348,552| 07-Jul-2021| 11:48| x86 \nMicrosoft.exchange.setup.acquirelanguagepack.dll| 15.1.2242.12| 56,720| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.setup.bootstrapper.common.dll| 15.1.2242.12| 94,584| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.setup.common.dll| 15.1.2242.12| 297,360| 07-Jul-2021| 11:39| x86 \nMicrosoft.exchange.setup.commonbase.dll| 15.1.2242.12| 35,704| 07-Jul-2021| 11:27| x86 \nMicrosoft.exchange.setup.console.dll| 15.1.2242.12| 27,016| 07-Jul-2021| 11:42| x86 \nMicrosoft.exchange.setup.gui.dll| 15.1.2242.12| 115,080| 07-Jul-2021| 11:41| x86 \nMicrosoft.exchange.setup.parser.dll| 15.1.2242.12| 54,136| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.setup.signverfwrapper.dll| 15.1.2242.12| 75,144| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.sharedcache.caches.dll| 15.1.2242.12| 142,712| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.sharedcache.client.dll| 15.1.2242.12| 24,952| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.sharedcache.eventlog.dll| 15.1.2242.12| 15,240| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.sharedcache.exe| 15.1.2242.12| 58,760| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.sharepointsignalstore.dll| 15.1.2242.12| 27,016| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.slabmanifest.dll| 15.1.2242.12| 46,984| 07-Jul-2021| 09:15| x86 \nMicrosoft.exchange.sqm.dll| 15.1.2242.12| 46,992| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.store.service.exe| 15.1.2242.12| 28,048| 07-Jul-2021| 11:03| x86 \nMicrosoft.exchange.store.worker.exe| 15.1.2242.12| 26,512| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.storeobjectsservice.eventlog.dll| 15.1.2242.12| 13,696| 07-Jul-2021| 09:15| x64 \nMicrosoft.exchange.storeobjectsservice.exe| 15.1.2242.12| 31,608| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.storeprovider.dll| 15.1.2242.12| 1,166,736| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.structuredquery.dll| 15.1.2242.12| 158,600| 07-Jul-2021| 09:16| x64 \nMicrosoft.exchange.symphonyhandler.dll| 15.1.2242.12| 628,112| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.syncmigration.eventlog.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.syncmigrationservicelet.dll| 15.1.2242.12| 16,248| 07-Jul-2021| 11:26| x86 \nMicrosoft.exchange.systemprobemsg.dll| 15.1.2242.12| 13,192| 07-Jul-2021| 09:18| x64 \nMicrosoft.exchange.textprocessing.dll| 15.1.2242.12| 221,584| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.textprocessing.eventlog.dll| 15.1.2242.12| 13,712| 07-Jul-2021| 09:16| x64 \nMicrosoft.exchange.transport.agent.addressbookpolicyroutingagent.dll| 15.1.2242.12| 29,064| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.antispam.common.dll| 15.1.2242.12| 138,616| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.contentfilter.cominterop.dll| 15.1.2242.12| 21,904| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.controlflow.dll| 15.1.2242.12| 40,328| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.faultinjectionagent.dll| 15.1.2242.12| 22,920| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.frontendproxyagent.dll| 15.1.2242.12| 21,392| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.hygiene.dll| 15.1.2242.12| 212,344| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.transport.agent.interceptoragent.dll| 15.1.2242.12| 98,696| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.transport.agent.liveidauth.dll| 15.1.2242.12| 22,920| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.malware.dll| 15.1.2242.12| 169,360| 07-Jul-2021| 11:08| x86 \nMicrosoft.exchange.transport.agent.malware.eventlog.dll| 15.1.2242.12| 18,312| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.transport.agent.phishingdetection.dll| 15.1.2242.12| 20,872| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.prioritization.dll| 15.1.2242.12| 31,608| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.protocolanalysis.dbaccess.dll| 15.1.2242.12| 46,984| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.search.dll| 15.1.2242.12| 30,096| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.senderid.core.dll| 15.1.2242.12| 53,136| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.sharedmailboxsentitemsroutingagent.dll| 15.1.2242.12| 44,920| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.systemprobedrop.dll| 15.1.2242.12| 18,296| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.agent.transportfeatureoverrideagent.dll| 15.1.2242.12| 46,472| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.transport.agent.trustedmailagents.dll| 15.1.2242.12| 46,472| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.cloudmonitor.common.dll| 15.1.2242.12| 28,040| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.transport.common.dll| 15.1.2242.12| 457,096| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.contracts.dll| 15.1.2242.12| 18,296| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.decisionengine.dll| 15.1.2242.12| 30,608| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.dll| 15.1.2242.12| 4,181,904| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.dsapiclient.dll| 15.1.2242.12| 182,144| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.eventlog.dll| 15.1.2242.12| 121,736| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.transport.extensibility.dll| 15.1.2242.12| 403,336| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.extensibilityeventlog.dll| 15.1.2242.12| 14,720| 07-Jul-2021| 09:18| x64 \nMicrosoft.exchange.transport.flighting.dll| 15.1.2242.12| 86,928| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.logging.dll| 15.1.2242.12| 88,968| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.logging.search.dll| 15.1.2242.12| 68,488| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.loggingcommon.dll| 15.1.2242.12| 63,352| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.monitoring.dll| 15.1.2242.12| 430,456| 07-Jul-2021| 12:13| x86 \nMicrosoft.exchange.transport.net.dll| 15.1.2242.12| 122,232| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.protocols.contracts.dll| 15.1.2242.12| 17,784| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.protocols.dll| 15.1.2242.12| 29,048| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.protocols.httpsubmission.dll| 15.1.2242.12| 60,792| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.requestbroker.dll| 15.1.2242.12| 50,056| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.transport.scheduler.contracts.dll| 15.1.2242.12| 33,144| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.scheduler.dll| 15.1.2242.12| 113,016| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.smtpshared.dll| 15.1.2242.12| 18,312| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.transport.storage.contracts.dll| 15.1.2242.12| 52,104| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.storage.dll| 15.1.2242.12| 675,192| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.storage.management.dll| 15.1.2242.12| 21,896| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.transport.sync.agents.dll| 15.1.2242.12| 17,800| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.transport.sync.common.dll| 15.1.2242.12| 487,288| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.transport.sync.common.eventlog.dll| 15.1.2242.12| 12,688| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.transport.sync.manager.dll| 15.1.2242.12| 306,048| 07-Jul-2021| 11:02| x86 \nMicrosoft.exchange.transport.sync.manager.eventlog.dll| 15.1.2242.12| 15,736| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.transport.sync.migrationrpc.dll| 15.1.2242.12| 46,472| 07-Jul-2021| 11:02| x86 \nMicrosoft.exchange.transport.sync.worker.dll| 15.1.2242.12| 1,044,368| 07-Jul-2021| 11:05| x86 \nMicrosoft.exchange.transport.sync.worker.eventlog.dll| 15.1.2242.12| 15,240| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.transportlogsearch.eventlog.dll| 15.1.2242.12| 18,808| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.transportsyncmanagersvc.exe| 15.1.2242.12| 18,808| 07-Jul-2021| 11:04| x86 \nMicrosoft.exchange.um.callrouter.exe| 15.1.2242.12| 22,416| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.um.clientstrings.dll| 15.1.2242.12| 60,304| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.um.grammars.dll| 15.1.2242.12| 211,832| 07-Jul-2021| 09:19| x86 \nMicrosoft.exchange.um.lad.dll| 15.1.2242.12| 120,720| 07-Jul-2021| 09:16| x64 \nMicrosoft.exchange.um.prompts.dll| 15.1.2242.12| 214,904| 07-Jul-2021| 09:18| x86 \nMicrosoft.exchange.um.troubleshootingtool.shared.dll| 15.1.2242.12| 118,672| 07-Jul-2021| 09:31| x86 \nMicrosoft.exchange.um.ucmaplatform.dll| 15.1.2242.12| 239,480| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.um.umcommon.dll| 15.1.2242.12| 925,048| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.um.umcore.dll| 15.1.2242.12| 1,471,888| 07-Jul-2021| 11:00| x86 \nMicrosoft.exchange.um.umvariantconfiguration.dll| 15.1.2242.12| 32,648| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.unifiedcontent.dll| 15.1.2242.12| 41,872| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.unifiedcontent.exchange.dll| 15.1.2242.12| 24,976| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.unifiedmessaging.eventlog.dll| 15.1.2242.12| 130,424| 07-Jul-2021| 09:29| x64 \nMicrosoft.exchange.unifiedpolicyfilesync.eventlog.dll| 15.1.2242.12| 15,224| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.unifiedpolicyfilesyncservicelet.dll| 15.1.2242.12| 83,320| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.unifiedpolicysyncservicelet.dll| 15.1.2242.12| 50,040| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.variantconfiguration.antispam.dll| 15.1.2242.12| 642,448| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.variantconfiguration.core.dll| 15.1.2242.12| 186,256| 07-Jul-2021| 09:16| x86 \nMicrosoft.exchange.variantconfiguration.dll| 15.1.2242.12| 67,472| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.variantconfiguration.eventlog.dll| 15.1.2242.12| 12,688| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.variantconfiguration.excore.dll| 15.1.2242.12| 56,712| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.variantconfiguration.globalsettings.dll| 15.1.2242.12| 27,536| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.variantconfiguration.hygiene.dll| 15.1.2242.12| 120,696| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.variantconfiguration.protectionservice.dll| 15.1.2242.12| 31,624| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.variantconfiguration.threatintel.dll| 15.1.2242.12| 57,208| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.webservices.auth.dll| 15.1.2242.12| 35,720| 07-Jul-2021| 09:18| x86 \nMicrosoft.exchange.webservices.dll| 15.1.2242.12| 1,054,088| 07-Jul-2021| 09:16| x86 \nMicrosoft.exchange.webservices.xrm.dll| 15.1.2242.12| 67,984| 07-Jul-2021| 09:18| x86 \nMicrosoft.exchange.wlmservicelet.dll| 15.1.2242.12| 23,440| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.wopiclient.dll| 15.1.2242.12| 77,192| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.workingset.signalapi.dll| 15.1.2242.12| 17,272| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.workingsetabstraction.signalapiabstraction.dll| 15.1.2242.12| 29,072| 07-Jul-2021| 09:29| x86 \nMicrosoft.exchange.workloadmanagement.dll| 15.1.2242.12| 505,224| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.workloadmanagement.eventlogs.dll| 15.1.2242.12| 14,736| 07-Jul-2021| 09:19| x64 \nMicrosoft.exchange.workloadmanagement.throttling.configuration.dll| 15.1.2242.12| 36,752| 07-Jul-2021| 10:57| x86 \nMicrosoft.exchange.workloadmanagement.throttling.dll| 15.1.2242.12| 66,448| 07-Jul-2021| 10:57| x86 \nMicrosoft.fast.contextlogger.json.dll| 15.1.2242.12| 19,328| 07-Jul-2021| 09:15| x86 \nMicrosoft.filtering.dll| 15.1.2242.12| 113,032| 07-Jul-2021| 10:57| x86 \nMicrosoft.filtering.exchange.dll| 15.1.2242.12| 57,232| 07-Jul-2021| 10:57| x86 \nMicrosoft.filtering.interop.dll| 15.1.2242.12| 15,224| 07-Jul-2021| 10:57| x86 \nMicrosoft.forefront.activedirectoryconnector.dll| 15.1.2242.12| 46,968| 07-Jul-2021| 10:57| x86 \nMicrosoft.forefront.activedirectoryconnector.eventlog.dll| 15.1.2242.12| 15,736| 07-Jul-2021| 09:29| x64 \nMicrosoft.forefront.filtering.common.dll| 15.1.2242.12| 23,944| 07-Jul-2021| 09:19| x86 \nMicrosoft.forefront.filtering.diagnostics.dll| 15.1.2242.12| 22,408| 07-Jul-2021| 09:15| x86 \nMicrosoft.forefront.filtering.eventpublisher.dll| 15.1.2242.12| 34,696| 07-Jul-2021| 09:20| x86 \nMicrosoft.forefront.management.powershell.format.ps1xml| Not applicable| 48,894| 07-Jul-2021| 11:37| Not applicable \nMicrosoft.forefront.management.powershell.types.ps1xml| Not applicable| 16,317| 07-Jul-2021| 11:37| Not applicable \nMicrosoft.forefront.monitoring.activemonitoring.local.components.dll| 15.1.2242.12| 1,517,960| 07-Jul-2021| 12:15| x86 \nMicrosoft.forefront.monitoring.activemonitoring.local.components.messages.dll| 15.1.2242.12| 13,200| 07-Jul-2021| 09:19| x64 \nMicrosoft.forefront.monitoring.management.outsidein.dll| 15.1.2242.12| 33,144| 07-Jul-2021| 11:58| x86 \nMicrosoft.forefront.recoveryactionarbiter.contract.dll| 15.1.2242.12| 18,312| 07-Jul-2021| 09:15| x86 \nMicrosoft.forefront.reporting.common.dll| 15.1.2242.12| 46,480| 07-Jul-2021| 10:57| x86 \nMicrosoft.forefront.reporting.ondemandquery.dll| 15.1.2242.12| 50,576| 07-Jul-2021| 10:57| x86 \nMicrosoft.isam.esent.collections.dll| 15.1.2242.12| 72,584| 07-Jul-2021| 10:57| x86 \nMicrosoft.isam.esent.interop.dll| 15.1.2242.12| 533,896| 07-Jul-2021| 09:29| x86 \nMicrosoft.managementgui.dll| 15.1.2242.12| 133,512| 07-Jul-2021| 09:15| x86 \nMicrosoft.mce.interop.dll| 15.1.2242.12| 24,448| 07-Jul-2021| 09:15| x86 \nMicrosoft.office.audit.dll| 15.1.2242.12| 123,792| 07-Jul-2021| 09:15| x86 \nMicrosoft.office.client.discovery.unifiedexport.dll| 15.1.2242.12| 593,296| 07-Jul-2021| 10:57| x86 \nMicrosoft.office.common.ipcommonlogger.dll| 15.1.2242.12| 42,376| 07-Jul-2021| 10:57| x86 \nMicrosoft.office.compliance.console.core.dll| 15.1.2242.12| 217,992| 07-Jul-2021| 13:21| x86 \nMicrosoft.office.compliance.console.dll| 15.1.2242.12| 854,904| 07-Jul-2021| 13:30| x86 \nMicrosoft.office.compliance.console.extensions.dll| 15.1.2242.12| 485,768| 07-Jul-2021| 13:25| x86 \nMicrosoft.office.compliance.core.dll| 15.1.2242.12| 413,064| 07-Jul-2021| 10:57| x86 \nMicrosoft.office.compliance.ingestion.dll| 15.1.2242.12| 36,232| 07-Jul-2021| 10:57| x86 \nMicrosoft.office.compliancepolicy.exchange.dar.dll| 15.1.2242.12| 84,864| 07-Jul-2021| 10:57| x86 \nMicrosoft.office.compliancepolicy.platform.dll| 15.1.2242.12| 1,782,152| 07-Jul-2021| 09:29| x86 \nMicrosoft.office.datacenter.activemonitoring.management.common.dll| 15.1.2242.12| 49,544| 07-Jul-2021| 10:57| x86 \nMicrosoft.office.datacenter.activemonitoring.management.dll| 15.1.2242.12| 27,536| 07-Jul-2021| 10:57| x86 \nMicrosoft.office.datacenter.activemonitoringlocal.dll| 15.1.2242.12| 174,984| 07-Jul-2021| 10:57| x86 \nMicrosoft.office.datacenter.monitoring.activemonitoring.recovery.dll| 15.1.2242.12| 165,776| 07-Jul-2021| 10:57| x86 \nMicrosoft.office365.datainsights.uploader.dll| 15.1.2242.12| 40,328| 07-Jul-2021| 09:15| x86 \nMicrosoft.online.box.shell.dll| 15.1.2242.12| 46,456| 07-Jul-2021| 09:16| x86 \nMicrosoft.powershell.hostingtools.dll| 15.1.2242.12| 67,984| 07-Jul-2021| 09:16| x86 \nMicrosoft.powershell.hostingtools_2.dll| 15.1.2242.12| 67,984| 07-Jul-2021| 09:16| x86 \nMicrosoft.tailoredexperiences.core.dll| 15.1.2242.12| 120,200| 07-Jul-2021| 10:57| x86 \nMigrateumcustomprompts.ps1| Not applicable| 19,122| 07-Jul-2021| 09:29| Not applicable \nModernpublicfoldertomailboxmapgenerator.ps1| Not applicable| 29,064| 07-Jul-2021| 09:29| Not applicable \nMovemailbox.ps1| Not applicable| 61,180| 07-Jul-2021| 09:29| Not applicable \nMovetransportdatabase.ps1| Not applicable| 30,602| 07-Jul-2021| 09:29| Not applicable \nMove_publicfolderbranch.ps1| Not applicable| 17,532| 07-Jul-2021| 09:29| Not applicable \nMpgearparser.dll| 15.1.2242.12| 99,704| 07-Jul-2021| 09:19| x64 \nMsclassificationadapter.dll| 15.1.2242.12| 248,712| 07-Jul-2021| 09:29| x64 \nMsexchangecompliance.exe| 15.1.2242.12| 78,728| 07-Jul-2021| 11:13| x86 \nMsexchangedagmgmt.exe| 15.1.2242.12| 25,464| 07-Jul-2021| 11:00| x86 \nMsexchangedelivery.exe| 15.1.2242.12| 38,776| 07-Jul-2021| 11:00| x86 \nMsexchangefrontendtransport.exe| 15.1.2242.12| 31,608| 07-Jul-2021| 10:57| x86 \nMsexchangehmhost.exe| 15.1.2242.12| 27,016| 07-Jul-2021| 12:14| x86 \nMsexchangehmrecovery.exe| 15.1.2242.12| 29,584| 07-Jul-2021| 10:57| x86 \nMsexchangemailboxassistants.exe| 15.1.2242.12| 72,592| 07-Jul-2021| 10:57| x86 \nMsexchangemailboxreplication.exe| 15.1.2242.12| 20,872| 07-Jul-2021| 11:07| x86 \nMsexchangemigrationworkflow.exe| 15.1.2242.12| 69,008| 07-Jul-2021| 11:14| x86 \nMsexchangerepl.exe| 15.1.2242.12| 71,040| 07-Jul-2021| 11:00| x86 \nMsexchangesubmission.exe| 15.1.2242.12| 123,280| 07-Jul-2021| 11:06| x86 \nMsexchangethrottling.exe| 15.1.2242.12| 39,800| 07-Jul-2021| 10:57| x86 \nMsexchangetransport.exe| 15.1.2242.12| 74,104| 07-Jul-2021| 10:57| x86 \nMsexchangetransportlogsearch.exe| 15.1.2242.12| 139,128| 07-Jul-2021| 10:57| x86 \nMsexchangewatchdog.exe| 15.1.2242.12| 55,688| 07-Jul-2021| 09:29| x64 \nMspatchlinterop.dll| 15.1.2242.12| 53,648| 07-Jul-2021| 09:31| x64 \nNativehttpproxy.dll| 15.1.2242.12| 91,528| 07-Jul-2021| 09:20| x64 \nNavigatorparser.dll| 15.1.2242.12| 636,808| 07-Jul-2021| 09:29| x64 \nNego2nativeinterface.dll| 15.1.2242.12| 19,344| 07-Jul-2021| 09:18| x64 \nNegotiateclientcertificatemodule.dll| 15.1.2242.12| 30,072| 07-Jul-2021| 09:18| x64 \nNewtestcasconnectivityuser.ps1| Not applicable| 22,284| 07-Jul-2021| 09:29| Not applicable \nNewtestcasconnectivityuserhosting.ps1| Not applicable| 24,579| 07-Jul-2021| 09:29| Not applicable \nNtspxgen.dll| 15.1.2242.12| 80,776| 07-Jul-2021| 09:20| x64 \nOleconverter.exe| 15.1.2242.12| 173,960| 07-Jul-2021| 09:20| x64 \nOutsideinmodule.dll| 15.1.2242.12| 87,928| 07-Jul-2021| 09:29| x64 \nOwaauth.dll| 15.1.2242.12| 92,040| 07-Jul-2021| 09:29| x64 \nOwasmime.msi| Not applicable| 716,800| 07-Jul-2021| 09:29| Not applicable \nPerf_common_extrace.dll| 15.1.2242.12| 245,112| 07-Jul-2021| 09:16| x64 \nPerf_exchmem.dll| 15.1.2242.12| 85,904| 07-Jul-2021| 09:19| x64 \nPipeline2.dll| 15.1.2242.12| 1,454,480| 07-Jul-2021| 10:57| x64 \nPowershell.rbachostingtools.dll_1bf4f3e363ef418781685d1a60da11c1| 15.1.2242.12| 41,352| 07-Jul-2021| 11:35| Not applicable \nPreparemoverequesthosting.ps1| Not applicable| 70,995| 07-Jul-2021| 09:29| Not applicable \nPrepare_moverequest.ps1| Not applicable| 73,229| 07-Jul-2021| 09:29| Not applicable \nProductinfo.managed.dll| 15.1.2242.12| 27,024| 07-Jul-2021| 09:16| x86 \nProxybinclientsstringsdll| 15.1.2242.12| 924,560| 07-Jul-2021| 09:29| x86 \nPublicfoldertomailboxmapgenerator.ps1| Not applicable| 23,238| 07-Jul-2021| 09:29| Not applicable \nQuietexe.exe| 15.1.2242.12| 14,728| 07-Jul-2021| 09:20| x86 \nRedistributeactivedatabases.ps1| Not applicable| 250,564| 07-Jul-2021| 09:29| Not applicable \nReinstalldefaulttransportagents.ps1| Not applicable| 21,675| 07-Jul-2021| 11:31| Not applicable \nRemoteexchange.ps1| Not applicable| 23,553| 07-Jul-2021| 11:35| Not applicable \nRemoveuserfrompfrecursive.ps1| Not applicable| 14,684| 07-Jul-2021| 09:29| Not applicable \nReplaceuserpermissiononpfrecursive.ps1| Not applicable| 15,002| 07-Jul-2021| 09:29| Not applicable \nReplaceuserwithuseronpfrecursive.ps1| Not applicable| 15,032| 07-Jul-2021| 09:29| Not applicable \nReplaycrimsonmsg.dll| 15.1.2242.12| 1,099,128| 07-Jul-2021| 09:16| x64 \nResetattachmentfilterentry.ps1| Not applicable| 15,496| 07-Jul-2021| 11:31| Not applicable \nResetcasservice.ps1| Not applicable| 21,727| 07-Jul-2021| 09:29| Not applicable \nReset_antispamupdates.ps1| Not applicable| 14,121| 07-Jul-2021| 09:29| Not applicable \nRestoreserveronprereqfailure.ps1| Not applicable| 15,121| 07-Jul-2021| 10:57| Not applicable \nResumemailboxdatabasecopy.ps1| Not applicable| 17,230| 07-Jul-2021| 09:29| Not applicable \nRightsmanagementwrapper.dll| 15.1.2242.12| 86,408| 07-Jul-2021| 09:29| x64 \nRollalternateserviceaccountpassword.ps1| Not applicable| 55,790| 07-Jul-2021| 09:29| Not applicable \nRpcperf.dll| 15.1.2242.12| 23,416| 07-Jul-2021| 09:20| x64 \nRpcproxyshim.dll| 15.1.2242.12| 39,304| 07-Jul-2021| 09:29| x64 \nRulesauditmsg.dll| 15.1.2242.12| 12,664| 07-Jul-2021| 09:29| x64 \nRwsperfcounters.xml| Not applicable| 23,024| 07-Jul-2021| 11:40| Not applicable \nSafehtmlnativewrapper.dll| 15.1.2242.12| 34,680| 07-Jul-2021| 09:19| x64 \nScanenginetest.exe| 15.1.2242.12| 956,296| 07-Jul-2021| 09:29| x64 \nScanningprocess.exe| 15.1.2242.12| 739,216| 07-Jul-2021| 10:57| x64 \nSearchdiagnosticinfo.ps1| Not applicable| 16,812| 07-Jul-2021| 09:29| Not applicable \nServicecontrol.ps1| Not applicable| 52,309| 07-Jul-2021| 10:57| Not applicable \nSetmailpublicfolderexternaladdress.ps1| Not applicable| 20,754| 07-Jul-2021| 09:29| Not applicable \nSettingsadapter.dll| 15.1.2242.12| 116,104| 07-Jul-2021| 09:29| x64 \nSetup.exe| 15.1.2242.12| 20,856| 07-Jul-2021| 10:57| x86 \nSetupui.exe| 15.1.2242.12| 49,016| 07-Jul-2021| 11:29| x86 \nSplit_publicfoldermailbox.ps1| Not applicable| 52,189| 07-Jul-2021| 09:29| Not applicable \nStartdagservermaintenance.ps1| Not applicable| 27,847| 07-Jul-2021| 09:29| Not applicable \nStatisticsutil.dll| 15.1.2242.12| 142,200| 07-Jul-2021| 09:29| x64 \nStopdagservermaintenance.ps1| Not applicable| 21,133| 07-Jul-2021| 09:29| Not applicable \nStoretsconstants.ps1| Not applicable| 15,830| 07-Jul-2021| 09:29| Not applicable \nStoretslibrary.ps1| Not applicable| 27,983| 07-Jul-2021| 09:29| Not applicable \nStore_mapi_net_bin_perf_x64_exrpcperf.dll| 15.1.2242.12| 28,552| 07-Jul-2021| 09:19| x64 \nSync_mailpublicfolders.ps1| Not applicable| 43,927| 07-Jul-2021| 09:29| Not applicable \nSync_modernmailpublicfolders.ps1| Not applicable| 43,973| 07-Jul-2021| 09:29| Not applicable \nTextconversionmodule.dll| 15.1.2242.12| 86,416| 07-Jul-2021| 09:29| x64 \nTroubleshoot_ci.ps1| Not applicable| 22,727| 07-Jul-2021| 09:29| Not applicable \nTroubleshoot_databaselatency.ps1| Not applicable| 33,433| 07-Jul-2021| 09:29| Not applicable \nTroubleshoot_databasespace.ps1| Not applicable| 30,029| 07-Jul-2021| 09:29| Not applicable \nUmservice.exe| 15.1.2242.12| 100,240| 07-Jul-2021| 11:02| x86 \nUmworkerprocess.exe| 15.1.2242.12| 38,280| 07-Jul-2021| 11:00| x86 \nUninstall_antispamagents.ps1| Not applicable| 15,493| 07-Jul-2021| 09:29| Not applicable \nUpdateapppoolmanagedframeworkversion.ps1| Not applicable| 14,030| 07-Jul-2021| 09:29| Not applicable \nUpdatecas.ps1| Not applicable| 32,968| 07-Jul-2021| 10:57| Not applicable \nUpdateconfigfiles.ps1| Not applicable| 19,722| 07-Jul-2021| 10:57| Not applicable \nUpdateserver.exe| 15.1.2242.12| 3,014,544| 07-Jul-2021| 09:31| x64 \nUpdate_malwarefilteringserver.ps1| Not applicable| 18,156| 07-Jul-2021| 09:29| Not applicable \nWeb.config_053c31bdd6824e95b35d61b0a5e7b62d| Not applicable| 31,816| 07-Jul-2021| 13:18| Not applicable \nWsbexchange.exe| 15.1.2242.12| 125,304| 07-Jul-2021| 09:31| x64 \nX400prox.dll| 15.1.2242.12| 103,296| 07-Jul-2021| 09:29| x64 \n_search.lingoperators.a| 15.1.2242.12| 34,704| 07-Jul-2021| 10:57| Not applicable \n_search.lingoperators.b| 15.1.2242.12| 34,704| 07-Jul-2021| 10:57| Not applicable \n_search.mailboxoperators.a| 15.1.2242.12| 289,160| 07-Jul-2021| 11:03| Not applicable \n_search.mailboxoperators.b| 15.1.2242.12| 289,160| 07-Jul-2021| 11:03| Not applicable \n_search.operatorschema.a| 15.1.2242.12| 483,192| 07-Jul-2021| 10:57| Not applicable \n_search.operatorschema.b| 15.1.2242.12| 483,192| 07-Jul-2021| 10:57| Not applicable \n_search.tokenoperators.a| 15.1.2242.12| 106,872| 07-Jul-2021| 10:57| Not applicable \n_search.tokenoperators.b| 15.1.2242.12| 106,872| 07-Jul-2021| 10:57| Not applicable \n_search.transportoperators.a| 15.1.2242.12| 64,904| 07-Jul-2021| 11:07| Not applicable \n_search.transportoperators.b| 15.1.2242.12| 64,904| 07-Jul-2021| 11:07| Not applicable \n \n## Information about protection and security\n\nProtect yourself online: [Windows Security support](< https://support.microsoft.com/hub/4099151 >)Learn how we guard against cyber threats: [Microsoft Security](< https://www.microsoft.com/security >)\n", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.0, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-07-13T07:00:00", "type": "mskb", "title": "Description of the security update for Microsoft Exchange Server 2016: July 13, 2021 (KB5004779)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 5.5, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.9, "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-33768"], "modified": "2021-07-13T07:00:00", "id": "KB5004779", "href": "https://support.microsoft.com/en-us/help/5004779", "cvss": {"score": 7.9, "vector": "AV:A/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-23T19:38:35", "description": "None\nSecurity Update 1 for Exchange Server 2019 Cumulative Update 10 resolves vulnerabilities in Microsoft Exchange Server. To learn more about these vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE):\n\n * [CVE-2021-31196 | Microsoft Exchange Server Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-31196>)\n * [CVE-2021-31206 | Microsoft Exchange Server Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-31206>)\n * [CVE-2021-33768 | Microsoft Exchange Server Elevation of Privilege Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-33768>)\nSecurity Update 3 for Exchange Server 2019 Cumulative Update 9 resolves vulnerabilities in Microsoft Exchange Server. To learn more about these vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE):\n * [CVE-2021-31196 | Microsoft Exchange Server Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-31196>)\n * [CVE-2021-31206 | Microsoft Exchange Server Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-31206>)\n\n## Improvements in this update\n\n * The Exchange Server version number is now added to the HTTP response reply header. You can use this information to validate the security update status of Exchange-based servers in your network.\n\n**Important: **To be able to successfully install this security update, you must first follow the steps [in this article](<https://docs.microsoft.com/en-us/exchange/troubleshoot/administration/cannot-access-owa-or-ecp-if-oauth-expired>) to make sure that the server authentication certificate is present and is not expired. If the OAuth certificate is not present or is expired, republish the certificate before you install this update.\n\n## Known issues in this update\n\n * **Issue 1** \n \nWhen you try to manually install this security update by double-clicking the update file (.msp) to run it in Normal mode (that is, not as an administrator), some files are not correctly updated.When this issue occurs, you don\u2019t receive an error message or any indication that the security update was not correctly installed. However, Outlook Web Access (OWA) and the Exchange Control Panel (ECP) might stop working. \n \nThis issue occurs on servers that are using User Account Control (UAC). The issue occurs because the security update doesn\u2019t correctly stop certain Exchange-related services.\n\n**Note: **This issue does not occur if you install the update through Microsoft Update.\n\nTo avoid this issue, follow these steps to manually install this security update:\n 1. Select **Start**, and type **cmd**.\n 2. In the results, right-click **Command Prompt**, and then select **Run as administrator**.\n 3. If the **User Account Control** dialog box appears, verify that the default action is the action that you want, and then select **Continue**.\n 4. Type the full path of the .msp file, and then press Enter.\n * **Issue 2** \n \nExchange services might remain in a disabled state after you install this security update. This condition does not indicate that the update is not installed correctly. This condition might occur if the service control scripts experience a problem when they try to return Exchange services to their usual state. \n \nTo fix this issue, use Services Manager to restore the startup type to **Automatic**, and then start the affected Exchange services manually. To avoid this issue, run the security update at an elevated command prompt. For more information about how to open an elevated Command Prompt window, see [Start a Command Prompt as an Administrator](<https://technet.microsoft.com/en-us/library/cc947813\\(v=ws.10\\).aspx>).\n * **Issue 3** \n \nWhen you block third-party cookies in a web browser, you might be continually prompted to trust a particular add-in even though you keep selecting the option to trust it. This issue occurs also in privacy window modes (such as InPrivate mode in Microsoft Edge). This issue occurs because browser restrictions prevent the response from being recorded. To record the response and enable the add-in, you must enable third-party cookies for the domain that's hosting OWA or Office Online Server in the browser settings. To enable this setting, refer to the specific support documentation for the browser.\n * **Issue 4** \n \nWhen you try to request free/busy information for a user in a different forest in a trusted cross-forest topology, the request fails and generates a \"(400) Bad Request\" error message. For more information and workarounds to this issue, see [\"(400) Bad Request\" error during Autodiscover for per-user free/busy in a trusted cross-forest topology](<https://support.microsoft.com/help/5003623>).\n * **Issue 5** \n \nAfter you install Microsoft Exchange Server 2019, 2016, or 2013, you can't access Outlook Web App (OWA) or Exchange Control Panel (ECP). For more information, see [Can't sign in to Outlook on the web or EAC if Exchange Server OAuth certificate is expired](<https://docs.microsoft.com/en-us/exchange/troubleshoot/administration/cannot-access-owa-or-ecp-if-oauth-expired>).\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5004780>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center.\n\n * [Download Security Update 1 for Exchange Server 2019 Cumulative Update 10 (KB5004780)](<https://www.microsoft.com/download/details.aspx?familyid=07683b40-1608-437d-a90a-eb2683cb3092>)\n * [Download Security Update 3 For Exchange Server 2019 Cumulative Update 9 (KB5004780)](<https://www.microsoft.com/download/details.aspx?familyid=a78de9ec-af4e-4e31-be7d-17db9fc335db>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: June 13, 2021](<https://support.microsoft.com/topic/24aa34b8-b210-41cf-adbb-44b8a9ae84dc>).\n\n### Security update replacement information\n\nThis security update replaces the following previously released updates:\n\n * [Description of the security update for Microsoft Exchange Server 2019, 2016, and 2013: May 11, 2021 (KB5003435)](<https://support.microsoft.com/help/5003435>)\n\n## File information\n\n### File hash information\n\nUpdate name| File name| | SHA256 hash \n---|---|---|--- \nExchange Server 2019 Cumulative Update 10| Exchange2019-KB5004779-x64-en.msp| | 89965AB451800DFE132D3DF083058C3934E935CDDC86C2805AADD0411DD03F28 \nExchange Server 2019 Cumulative Update 9| Exchange2019-KB5004779-x64-en.msp| | 00E9B203032EBF34BED3B51C1AF401FB8869BE57123636068B567705F29755DD \n \n## Exchange Server file information\n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n### \n\n__\n\nMicrosoft Exchange Server 2019 Cumulative Update 10\n\nFile name| File version| File size| Date| Time| Platform \n---|---|---|---|---|--- \nActivemonitoringeventmsg.dll| 15.2.922.13| 71,056| 07-Jul-2021| 09:09| x64 \nActivemonitoringexecutionlibrary.ps1| Not applicable| 29,538| 07-Jul-2021| 09:09| Not applicable \nAdduserstopfrecursive.ps1| Not applicable| 14,961| 07-Jul-2021| 09:10| Not applicable \nAdemodule.dll| 15.2.922.13| 106,376| 07-Jul-2021| 09:09| x64 \nAirfilter.dll| 15.2.922.13| 42,872| 07-Jul-2021| 09:08| x64 \nAjaxcontroltoolkit.dll| 15.2.922.13| 92,528| 07-Jul-2021| 09:10| x86 \nAntispamcommon.ps1| Not applicable| 13,481| 07-Jul-2021| 09:08| Not applicable \nAsdat.msi| Not applicable| 5,087,232| 07-Jul-2021| 09:09| Not applicable \nAsentirs.msi| Not applicable| 77,824| 07-Jul-2021| 09:08| Not applicable \nAsentsig.msi| Not applicable| 73,728| 07-Jul-2021| 09:08| Not applicable \nBigfunnel.bondtypes.dll| 15.2.922.13| 45,456| 07-Jul-2021| 09:08| x86 \nBigfunnel.common.dll| 15.2.922.13| 66,448| 07-Jul-2021| 08:58| x86 \nBigfunnel.configuration.dll| 15.2.922.13| 118,152| 07-Jul-2021| 09:33| x86 \nBigfunnel.entropy.dll| 15.2.922.13| 44,416| 07-Jul-2021| 09:08| x86 \nBigfunnel.filter.dll| 15.2.922.13| 54,160| 07-Jul-2021| 09:09| x86 \nBigfunnel.indexstream.dll| 15.2.922.13| 69,000| 07-Jul-2021| 09:11| x86 \nBigfunnel.neuraltree.dll| Not applicable| 694,136| 07-Jul-2021| 08:59| x64 \nBigfunnel.neuraltreeranking.dll| 15.2.922.13| 19,848| 07-Jul-2021| 09:33| x86 \nBigfunnel.poi.dll| 15.2.922.13| 245,136| 07-Jul-2021| 09:09| x86 \nBigfunnel.postinglist.dll| 15.2.922.13| 189,320| 07-Jul-2021| 09:12| x86 \nBigfunnel.query.dll| 15.2.922.13| 101,240| 07-Jul-2021| 08:59| x86 \nBigfunnel.ranking.dll| 15.2.922.13| 109,448| 07-Jul-2021| 09:34| x86 \nBigfunnel.syntheticdatalib.dll| 15.2.922.13| 3,634,552| 07-Jul-2021| 09:12| x86 \nBigfunnel.tracing.dll| 15.2.922.13| 42,896| 07-Jul-2021| 09:08| x86 \nBigfunnel.wordbreakers.dll| 15.2.922.13| 46,456| 07-Jul-2021| 09:10| x86 \nCafe_airfilter_dll| 15.2.922.13| 42,872| 07-Jul-2021| 09:08| x64 \nCafe_exppw_dll| 15.2.922.13| 83,336| 07-Jul-2021| 09:09| x64 \nCafe_owaauth_dll| 15.2.922.13| 92,048| 07-Jul-2021| 09:08| x64 \nCalcalculation.ps1| Not applicable| 42,109| 07-Jul-2021| 09:34| Not applicable \nCheckdatabaseredundancy.ps1| Not applicable| 94,618| 07-Jul-2021| 09:08| Not applicable \nChksgfiles.dll| 15.2.922.13| 57,208| 07-Jul-2021| 09:10| x64 \nCitsconstants.ps1| Not applicable| 15,837| 07-Jul-2021| 09:10| Not applicable \nCitslibrary.ps1| Not applicable| 82,676| 07-Jul-2021| 09:10| Not applicable \nCitstypes.ps1| Not applicable| 14,496| 07-Jul-2021| 09:10| Not applicable \nClassificationengine_mce| 15.2.922.13| 1,693,072| 07-Jul-2021| 09:08| Not applicable \nClusmsg.dll| 15.2.922.13| 134,008| 07-Jul-2021| 09:09| x64 \nCoconet.dll| 15.2.922.13| 48,008| 07-Jul-2021| 09:09| x64 \nCollectovermetrics.ps1| Not applicable| 81,676| 07-Jul-2021| 09:09| Not applicable \nCollectreplicationmetrics.ps1| Not applicable| 41,862| 07-Jul-2021| 09:08| Not applicable \nCommonconnectfunctions.ps1| Not applicable| 29,943| 07-Jul-2021| 11:10| Not applicable \nComplianceauditservice.exe| 15.2.922.13| 39,816| 07-Jul-2021| 11:14| x86 \nConfigureadam.ps1| Not applicable| 22,756| 07-Jul-2021| 09:10| Not applicable \nConfigurecaferesponseheaders.ps1| Not applicable| 20,340| 07-Jul-2021| 09:10| Not applicable \nConfigurecryptodefaults.ps1| Not applicable| 42,071| 07-Jul-2021| 09:34| Not applicable \nConfigurenetworkprotocolparameters.ps1| Not applicable| 19,802| 07-Jul-2021| 09:10| Not applicable \nConfiguresmbipsec.ps1| Not applicable| 39,860| 07-Jul-2021| 09:10| Not applicable \nConfigure_enterprisepartnerapplication.ps1| Not applicable| 22,315| 07-Jul-2021| 09:10| Not applicable \nConnectfunctions.ps1| Not applicable| 37,137| 07-Jul-2021| 11:11| Not applicable \nConnect_exchangeserver_help.xml| Not applicable| 30,412| 07-Jul-2021| 11:11| Not applicable \nConsoleinitialize.ps1| Not applicable| 24,264| 07-Jul-2021| 10:59| Not applicable \nConvertoabvdir.ps1| Not applicable| 20,085| 07-Jul-2021| 09:10| Not applicable \nConverttomessagelatency.ps1| Not applicable| 14,564| 07-Jul-2021| 09:10| Not applicable \nConvert_distributiongrouptounifiedgroup.ps1| Not applicable| 34,797| 07-Jul-2021| 09:10| Not applicable \nCreate_publicfoldermailboxesformigration.ps1| Not applicable| 27,944| 07-Jul-2021| 09:10| Not applicable \nCts.14.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts.14.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts.14.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts.14.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts.14.4.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts.15.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts.15.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts.15.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts.15.20.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts.8.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts.8.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts.8.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts_exsmime.dll| 15.2.922.13| 380,808| 07-Jul-2021| 09:08| x64 \nCts_microsoft.exchange.data.common.dll| 15.2.922.13| 1,686,904| 07-Jul-2021| 09:08| x86 \nCts_microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 07-Jul-2021| 08:59| Not applicable \nCts_policy.14.0.microsoft.exchange.data.common.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:08| x86 \nCts_policy.14.1.microsoft.exchange.data.common.dll| 15.2.922.13| 12,664| 07-Jul-2021| 09:09| x86 \nCts_policy.14.2.microsoft.exchange.data.common.dll| 15.2.922.13| 12,688| 07-Jul-2021| 09:09| x86 \nCts_policy.14.3.microsoft.exchange.data.common.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:08| x86 \nCts_policy.14.4.microsoft.exchange.data.common.dll| 15.2.922.13| 12,688| 07-Jul-2021| 09:08| x86 \nCts_policy.15.0.microsoft.exchange.data.common.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:09| x86 \nCts_policy.15.1.microsoft.exchange.data.common.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:09| x86 \nCts_policy.15.2.microsoft.exchange.data.common.dll| 15.2.922.13| 12,688| 07-Jul-2021| 09:08| x86 \nCts_policy.15.20.microsoft.exchange.data.common.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:08| x86 \nCts_policy.8.0.microsoft.exchange.data.common.dll| 15.2.922.13| 12,664| 07-Jul-2021| 08:59| x86 \nCts_policy.8.1.microsoft.exchange.data.common.dll| 15.2.922.13| 12,688| 07-Jul-2021| 09:08| x86 \nCts_policy.8.2.microsoft.exchange.data.common.dll| 15.2.922.13| 12,664| 07-Jul-2021| 09:08| x86 \nCts_policy.8.3.microsoft.exchange.data.common.dll| 15.2.922.13| 12,664| 07-Jul-2021| 09:08| x86 \nDagcommonlibrary.ps1| Not applicable| 60,258| 07-Jul-2021| 09:09| Not applicable \nDependentassemblygenerator.exe| 15.2.922.13| 22,408| 07-Jul-2021| 09:09| x86 \nDiaghelper.dll| 15.2.922.13| 66,960| 07-Jul-2021| 09:08| x86 \nDiagnosticscriptcommonlibrary.ps1| Not applicable| 16,366| 07-Jul-2021| 09:10| Not applicable \nDisableinmemorytracing.ps1| Not applicable| 13,374| 07-Jul-2021| 09:10| Not applicable \nDisable_antimalwarescanning.ps1| Not applicable| 15,221| 07-Jul-2021| 09:10| Not applicable \nDisable_outsidein.ps1| Not applicable| 13,686| 07-Jul-2021| 09:10| Not applicable \nDisklockerapi.dll| Not applicable| 22,416| 07-Jul-2021| 09:09| x64 \nDlmigrationmodule.psm1| Not applicable| 39,612| 07-Jul-2021| 09:10| Not applicable \nDsaccessperf.dll| 15.2.922.13| 45,960| 07-Jul-2021| 09:08| x64 \nDscperf.dll| 15.2.922.13| 32,648| 07-Jul-2021| 09:09| x64 \nDup_cts_microsoft.exchange.data.common.dll| 15.2.922.13| 1,686,904| 07-Jul-2021| 09:08| x86 \nDup_ext_microsoft.exchange.data.transport.dll| 15.2.922.13| 601,480| 07-Jul-2021| 09:33| x86 \nEcpperfcounters.xml| Not applicable| 31,180| 07-Jul-2021| 09:09| Not applicable \nEdgeextensibility_microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEdgeextensibility_policy.8.0.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:09| x86 \nEdgetransport.exe| 15.2.922.13| 49,552| 07-Jul-2021| 10:32| x86 \nEext.14.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext.14.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext.14.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext.14.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext.14.4.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext.15.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext.15.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext.15.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext.15.20.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext.8.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext.8.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext.8.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 07-Jul-2021| 09:05| Not applicable \nEext_policy.14.0.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:09| x86 \nEext_policy.14.1.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:09| x86 \nEext_policy.14.2.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,664| 07-Jul-2021| 09:09| x86 \nEext_policy.14.3.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,688| 07-Jul-2021| 09:09| x86 \nEext_policy.14.4.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,688| 07-Jul-2021| 09:09| x86 \nEext_policy.15.0.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,688| 07-Jul-2021| 09:09| x86 \nEext_policy.15.1.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,688| 07-Jul-2021| 09:09| x86 \nEext_policy.15.2.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,664| 07-Jul-2021| 09:09| x86 \nEext_policy.15.20.microsoft.exchange.data.transport.dll| 15.2.922.13| 13,200| 07-Jul-2021| 09:09| x86 \nEext_policy.8.1.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,664| 07-Jul-2021| 09:09| x86 \nEext_policy.8.2.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:09| x86 \nEext_policy.8.3.microsoft.exchange.data.transport.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:09| x86 \nEnableinmemorytracing.ps1| Not applicable| 13,396| 07-Jul-2021| 09:10| Not applicable \nEnable_antimalwarescanning.ps1| Not applicable| 17,555| 07-Jul-2021| 09:10| Not applicable \nEnable_basicauthtooauthconverterhttpmodule.ps1| Not applicable| 18,620| 07-Jul-2021| 09:10| Not applicable \nEnable_crossforestconnector.ps1| Not applicable| 18,630| 07-Jul-2021| 09:10| Not applicable \nEnable_outlookcertificateauthentication.ps1| Not applicable| 22,948| 07-Jul-2021| 09:10| Not applicable \nEnable_outsidein.ps1| Not applicable| 13,679| 07-Jul-2021| 09:10| Not applicable \nEngineupdateserviceinterfaces.dll| 15.2.922.13| 17,808| 07-Jul-2021| 09:33| x86 \nEscprint.dll| 15.2.922.13| 20,368| 07-Jul-2021| 09:09| x64 \nEse.dll| 15.2.922.13| 3,741,048| 07-Jul-2021| 09:09| x64 \nEseback2.dll| 15.2.922.13| 350,096| 07-Jul-2021| 09:10| x64 \nEsebcli2.dll| 15.2.922.13| 318,344| 07-Jul-2021| 09:09| x64 \nEseperf.dll| 15.2.922.13| 108,920| 07-Jul-2021| 09:12| x64 \nEseutil.exe| 15.2.922.13| 425,360| 07-Jul-2021| 09:10| x64 \nEsevss.dll| 15.2.922.13| 44,432| 07-Jul-2021| 09:10| x64 \nEtweseproviderresources.dll| 15.2.922.13| 101,256| 07-Jul-2021| 08:59| x64 \nEventperf.dll| 15.2.922.13| 59,768| 07-Jul-2021| 08:59| x64 \nExchange.depthtwo.types.ps1xml| Not applicable| 40,105| 07-Jul-2021| 11:10| Not applicable \nExchange.format.ps1xml| Not applicable| 649,690| 07-Jul-2021| 11:10| Not applicable \nExchange.partial.types.ps1xml| Not applicable| 44,335| 07-Jul-2021| 11:10| Not applicable \nExchange.ps1| Not applicable| 20,803| 07-Jul-2021| 11:11| Not applicable \nExchange.support.format.ps1xml| Not applicable| 26,547| 07-Jul-2021| 11:01| Not applicable \nExchange.types.ps1xml| Not applicable| 365,145| 07-Jul-2021| 11:10| Not applicable \nExchangeudfcommon.dll| 15.2.922.13| 122,744| 07-Jul-2021| 09:09| x86 \nExchangeudfs.dll| 15.2.922.13| 272,760| 07-Jul-2021| 09:09| x86 \nExchmem.dll| 15.2.922.13| 86,408| 07-Jul-2021| 09:08| x64 \nExchsetupmsg.dll| 15.2.922.13| 19,344| 07-Jul-2021| 09:09| x64 \nExdbfailureitemapi.dll| Not applicable| 27,016| 07-Jul-2021| 09:09| x64 \nExdbmsg.dll| 15.2.922.13| 230,800| 07-Jul-2021| 09:09| x64 \nExeventperfplugin.dll| 15.2.922.13| 25,464| 07-Jul-2021| 09:08| x64 \nExmime.dll| 15.2.922.13| 364,920| 07-Jul-2021| 09:09| x64 \nExportedgeconfig.ps1| Not applicable| 27,423| 07-Jul-2021| 09:10| Not applicable \nExport_mailpublicfoldersformigration.ps1| Not applicable| 18,590| 07-Jul-2021| 09:10| Not applicable \nExport_modernpublicfolderstatistics.ps1| Not applicable| 29,238| 07-Jul-2021| 09:10| Not applicable \nExport_outlookclassification.ps1| Not applicable| 14,370| 07-Jul-2021| 09:08| Not applicable \nExport_publicfolderstatistics.ps1| Not applicable| 23,157| 07-Jul-2021| 09:10| Not applicable \nExport_retentiontags.ps1| Not applicable| 17,076| 07-Jul-2021| 09:10| Not applicable \nExppw.dll| 15.2.922.13| 83,336| 07-Jul-2021| 09:09| x64 \nExprfdll.dll| 15.2.922.13| 26,488| 07-Jul-2021| 09:08| x64 \nExrpc32.dll| 15.2.922.13| 2,029,448| 07-Jul-2021| 09:34| x64 \nExrw.dll| 15.2.922.13| 28,040| 07-Jul-2021| 09:08| x64 \nExsetdata.dll| 15.2.922.13| 2,779,024| 07-Jul-2021| 09:34| x64 \nExsetup.exe| 15.2.922.13| 35,216| 07-Jul-2021| 11:06| x86 \nExsetupui.exe| 15.2.922.13| 471,944| 07-Jul-2021| 11:04| x86 \nExtrace.dll| 15.2.922.13| 245,112| 07-Jul-2021| 08:59| x64 \nExt_microsoft.exchange.data.transport.dll| 15.2.922.13| 601,480| 07-Jul-2021| 09:33| x86 \nExwatson.dll| 15.2.922.13| 44,920| 07-Jul-2021| 09:08| x64 \nFastioext.dll| 15.2.922.13| 60,296| 07-Jul-2021| 09:09| x64 \nFil06f84122c94c91a0458cad45c22cce20| Not applicable| 784,631| 07-Jul-2021| 12:34| Not applicable \nFil143a7a5d4894478a85eefc89a6539fc8| Not applicable| 1,909,228| 07-Jul-2021| 12:34| Not applicable \nFil19f527f284a0bb584915f9994f4885c3| Not applicable| 648,760| 07-Jul-2021| 12:34| Not applicable \nFil1a9540363a531e7fb18ffe600cffc3ce| Not applicable| 358,405| 07-Jul-2021| 12:33| Not applicable \nFil220d95210c8697448312eee6628c815c| Not applicable| 303,657| 07-Jul-2021| 12:33| Not applicable \nFil2cf5a31e239a45fabea48687373b547c| Not applicable| 652,759| 07-Jul-2021| 12:33| Not applicable \nFil397f0b1f1d7bd44d6e57e496decea2ec| Not applicable| 784,628| 07-Jul-2021| 12:33| Not applicable \nFil3ab126057b34eee68c4fd4b127ff7aee| Not applicable| 784,604| 07-Jul-2021| 12:34| Not applicable \nFil41bb2e5743e3bde4ecb1e07a76c5a7a8| Not applicable| 149,154| 07-Jul-2021| 12:33| Not applicable \nFil51669bfbda26e56e3a43791df94c1e9c| Not applicable| 9,345| 07-Jul-2021| 12:33| Not applicable \nFil558cb84302edfc96e553bcfce2b85286| Not applicable| 85,259| 07-Jul-2021| 12:34| Not applicable \nFil55ce217251b77b97a46e914579fc4c64| Not applicable| 648,754| 07-Jul-2021| 12:33| Not applicable \nFil5a9e78a51a18d05bc36b5e8b822d43a8| Not applicable| 1,596,145| 07-Jul-2021| 12:33| Not applicable \nFil5c7d10e5f1f9ada1e877c9aa087182a9| Not applicable| 1,596,145| 07-Jul-2021| 12:33| Not applicable \nFil6569a92c80a1e14949e4282ae2cc699c| Not applicable| 1,596,145| 07-Jul-2021| 12:33| Not applicable \nFil6a01daba551306a1e55f0bf6894f4d9f| Not applicable| 648,730| 07-Jul-2021| 12:34| Not applicable \nFil8863143ea7cd93a5f197c9fff13686bf| Not applicable| 648,760| 07-Jul-2021| 12:33| Not applicable \nFil8a8c76f225c7205db1000e8864c10038| Not applicable| 1,596,145| 07-Jul-2021| 12:33| Not applicable \nFil8cd999415d36ba78a3ac16a080c47458| Not applicable| 784,634| 07-Jul-2021| 12:34| Not applicable \nFil97913e630ff02079ce9889505a517ec0| Not applicable| 1,596,145| 07-Jul-2021| 12:33| Not applicable \nFilaa49badb2892075a28d58d06560f8da2| Not applicable| 785,658| 07-Jul-2021| 12:33| Not applicable \nFilae28aeed23ccb4b9b80accc2d43175b5| Not applicable| 648,757| 07-Jul-2021| 12:33| Not applicable \nFilb17f496f9d880a684b5c13f6b02d7203| Not applicable| 784,634| 07-Jul-2021| 12:33| Not applicable \nFilb94ca32f2654692263a5be009c0fe4ca| Not applicable| 2,564,949| 07-Jul-2021| 12:34| Not applicable \nFilbabdc4808eba0c4f18103f12ae955e5c| Not applicable| 341,984,395| 07-Jul-2021| 12:33| Not applicable \nFilc92cf2bf29bed21bd5555163330a3d07| Not applicable| 652,777| 07-Jul-2021| 12:33| Not applicable \nFilcc478d2a8346db20c4e2dc36f3400628| Not applicable| 784,634| 07-Jul-2021| 12:33| Not applicable \nFild26cd6b13cfe2ec2a16703819da6d043| Not applicable| 1,596,145| 07-Jul-2021| 12:33| Not applicable \nFilf2719f9dc8f7b74df78ad558ad3ee8a6| Not applicable| 785,640| 07-Jul-2021| 12:33| Not applicable \nFilfa5378dc76359a55ef20cc34f8a23fee| Not applicable| 1,427,187| 07-Jul-2021| 12:33| Not applicable \nFilteringconfigurationcommands.ps1| Not applicable| 18,263| 07-Jul-2021| 09:10| Not applicable \nFilteringpowershell.dll| 15.2.922.13| 223,096| 07-Jul-2021| 09:33| x86 \nFilteringpowershell.format.ps1xml| Not applicable| 29,664| 07-Jul-2021| 09:34| Not applicable \nFiltermodule.dll| 15.2.922.13| 180,112| 07-Jul-2021| 09:08| x64 \nFipexeuperfctrresource.dll| 15.2.922.13| 15,240| 07-Jul-2021| 09:09| x64 \nFipexeventsresource.dll| 15.2.922.13| 44,936| 07-Jul-2021| 09:09| x64 \nFipexperfctrresource.dll| 15.2.922.13| 32,648| 07-Jul-2021| 09:08| x64 \nFirewallres.dll| 15.2.922.13| 72,592| 07-Jul-2021| 08:59| x64 \nFms.exe| 15.2.922.13| 1,350,024| 07-Jul-2021| 09:34| x64 \nForefrontactivedirectoryconnector.exe| 15.2.922.13| 110,968| 07-Jul-2021| 09:09| x64 \nFpsdiag.exe| 15.2.922.13| 18,808| 07-Jul-2021| 09:09| x86 \nFsccachedfilemanagedlocal.dll| 15.2.922.13| 822,136| 07-Jul-2021| 09:08| x64 \nFscconfigsupport.dll| 15.2.922.13| 56,720| 07-Jul-2021| 09:08| x86 \nFscconfigurationserver.exe| 15.2.922.13| 430,984| 07-Jul-2021| 09:09| x64 \nFscconfigurationserverinterfaces.dll| 15.2.922.13| 15,752| 07-Jul-2021| 09:09| x86 \nFsccrypto.dll| 15.2.922.13| 208,784| 07-Jul-2021| 08:59| x64 \nFscipcinterfaceslocal.dll| 15.2.922.13| 28,536| 07-Jul-2021| 08:59| x86 \nFscipclocal.dll| 15.2.922.13| 38,280| 07-Jul-2021| 09:09| x86 \nFscsqmuploader.exe| 15.2.922.13| 453,496| 07-Jul-2021| 09:10| x64 \nGetucpool.ps1| Not applicable| 19,807| 07-Jul-2021| 09:10| Not applicable \nGetvalidengines.ps1| Not applicable| 13,306| 07-Jul-2021| 09:10| Not applicable \nGet_antispamfilteringreport.ps1| Not applicable| 15,785| 07-Jul-2021| 09:08| Not applicable \nGet_antispamsclhistogram.ps1| Not applicable| 14,631| 07-Jul-2021| 09:08| Not applicable \nGet_antispamtopblockedsenderdomains.ps1| Not applicable| 15,703| 07-Jul-2021| 09:08| Not applicable \nGet_antispamtopblockedsenderips.ps1| Not applicable| 14,771| 07-Jul-2021| 09:09| Not applicable \nGet_antispamtopblockedsenders.ps1| Not applicable| 15,474| 07-Jul-2021| 09:08| Not applicable \nGet_antispamtoprblproviders.ps1| Not applicable| 14,681| 07-Jul-2021| 09:09| Not applicable \nGet_antispamtoprecipients.ps1| Not applicable| 14,786| 07-Jul-2021| 09:08| Not applicable \nGet_dleligibilitylist.ps1| Not applicable| 42,328| 07-Jul-2021| 09:10| Not applicable \nGet_exchangeetwtrace.ps1| Not applicable| 28,979| 07-Jul-2021| 09:10| Not applicable \nGet_publicfoldermailboxsize.ps1| Not applicable| 15,058| 07-Jul-2021| 09:10| Not applicable \nGet_storetrace.ps1| Not applicable| 51,883| 07-Jul-2021| 09:08| Not applicable \nHuffman_xpress.dll| 15.2.922.13| 32,648| 07-Jul-2021| 09:09| x64 \nImportedgeconfig.ps1| Not applicable| 77,280| 07-Jul-2021| 09:10| Not applicable \nImport_mailpublicfoldersformigration.ps1| Not applicable| 29,468| 07-Jul-2021| 09:10| Not applicable \nImport_retentiontags.ps1| Not applicable| 28,850| 07-Jul-2021| 09:10| Not applicable \nInproxy.dll| 15.2.922.13| 85,896| 07-Jul-2021| 09:09| x64 \nInstallwindowscomponent.ps1| Not applicable| 34,555| 07-Jul-2021| 09:34| Not applicable \nInstall_antispamagents.ps1| Not applicable| 17,905| 07-Jul-2021| 09:09| Not applicable \nInstall_odatavirtualdirectory.ps1| Not applicable| 17,979| 07-Jul-2021| 11:33| Not applicable \nInterop.activeds.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.922.13| 107,408| 07-Jul-2021| 09:09| Not applicable \nInterop.adsiis.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.922.13| 20,368| 07-Jul-2021| 09:08| Not applicable \nInterop.certenroll.dll| 15.2.922.13| 142,736| 07-Jul-2021| 08:57| x86 \nInterop.licenseinfointerface.dll| 15.2.922.13| 14,216| 07-Jul-2021| 09:12| x86 \nInterop.netfw.dll| 15.2.922.13| 34,192| 07-Jul-2021| 08:59| x86 \nInterop.plalibrary.dll| 15.2.922.13| 72,584| 07-Jul-2021| 08:59| x86 \nInterop.stdole2.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.922.13| 27,024| 07-Jul-2021| 08:59| Not applicable \nInterop.taskscheduler.dll| 15.2.922.13| 46,480| 07-Jul-2021| 08:59| x86 \nInterop.wuapilib.dll| 15.2.922.13| 60,792| 07-Jul-2021| 09:09| x86 \nInterop.xenroll.dll| 15.2.922.13| 39,824| 07-Jul-2021| 08:59| x86 \nKerbauth.dll| 15.2.922.13| 62,856| 07-Jul-2021| 09:09| x64 \nLicenseinfointerface.dll| 15.2.922.13| 643,472| 07-Jul-2021| 09:10| x64 \nLpversioning.xml| Not applicable| 20,466| 07-Jul-2021| 11:06| Not applicable \nMailboxdatabasereseedusingspares.ps1| Not applicable| 31,896| 07-Jul-2021| 09:08| Not applicable \nManagedavailabilitycrimsonmsg.dll| 15.2.922.13| 138,616| 07-Jul-2021| 08:59| x64 \nManagedstorediagnosticfunctions.ps1| Not applicable| 126,269| 07-Jul-2021| 09:09| Not applicable \nManagescheduledtask.ps1| Not applicable| 36,372| 07-Jul-2021| 09:09| Not applicable \nManage_metacachedatabase.ps1| Not applicable| 51,119| 07-Jul-2021| 09:10| Not applicable \nMce.dll| 15.2.922.13| 1,693,072| 07-Jul-2021| 09:08| x64 \nMeasure_storeusagestatistics.ps1| Not applicable| 29,479| 07-Jul-2021| 09:08| Not applicable \nMerge_publicfoldermailbox.ps1| Not applicable| 22,655| 07-Jul-2021| 09:10| Not applicable \nMicrosoft.database.isam.dll| 15.2.922.13| 127,888| 07-Jul-2021| 09:12| x86 \nMicrosoft.dkm.proxy.dll| 15.2.922.13| 25,992| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.activemonitoring.activemonitoringvariantconfig.dll| 15.2.922.13| 68,488| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.activemonitoring.eventlog.dll| 15.2.922.13| 17,800| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.addressbook.service.dll| 15.2.922.13| 233,336| 07-Jul-2021| 10:58| x86 \nMicrosoft.exchange.addressbook.service.eventlog.dll| 15.2.922.13| 15,736| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.airsync.airsyncmsg.dll| 15.2.922.13| 43,408| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.airsync.comon.dll| 15.2.922.13| 1,776,008| 07-Jul-2021| 10:40| x86 \nMicrosoft.exchange.airsync.dll1| 15.2.922.13| 505,208| 07-Jul-2021| 11:30| Not applicable \nMicrosoft.exchange.airsynchandler.dll| 15.2.922.13| 76,176| 07-Jul-2021| 11:32| x86 \nMicrosoft.exchange.anchorservice.dll| 15.2.922.13| 135,544| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.antispam.eventlog.dll| 15.2.922.13| 23,416| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.antispamupdate.eventlog.dll| 15.2.922.13| 15,760| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.antispamupdatesvc.exe| 15.2.922.13| 27,000| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.approval.applications.dll| 15.2.922.13| 53,648| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.assistants.dll| 15.2.922.13| 925,072| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.assistants.eventlog.dll| 15.2.922.13| 25,976| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.assistants.interfaces.dll| 15.2.922.13| 43,408| 07-Jul-2021| 10:12| x86 \nMicrosoft.exchange.audit.azureclient.dll| 15.2.922.13| 15,224| 07-Jul-2021| 11:03| x86 \nMicrosoft.exchange.auditlogsearch.eventlog.dll| 15.2.922.13| 14,736| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.auditlogsearchservicelet.dll| 15.2.922.13| 70,544| 07-Jul-2021| 10:58| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.dll| 15.2.922.13| 94,608| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.eventlog.dll| 15.2.922.13| 13,176| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.authadmin.eventlog.dll| 15.2.922.13| 15,760| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.authadminservicelet.dll| 15.2.922.13| 36,728| 07-Jul-2021| 10:59| x86 \nMicrosoft.exchange.authservicehostservicelet.dll| 15.2.922.13| 15,736| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.autodiscover.configuration.dll| 15.2.922.13| 79,752| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.autodiscover.dll| 15.2.922.13| 396,168| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.autodiscover.eventlogs.dll| 15.2.922.13| 21,384| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.autodiscoverv2.dll| 15.2.922.13| 57,232| 07-Jul-2021| 10:46| x86 \nMicrosoft.exchange.bandwidthmonitorservicelet.dll| 15.2.922.13| 14,712| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.batchservice.dll| 15.2.922.13| 35,704| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.cabutility.dll| 15.2.922.13| 276,360| 07-Jul-2021| 08:59| x64 \nMicrosoft.exchange.certificatedeployment.eventlog.dll| 15.2.922.13| 16,248| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.certificatedeploymentservicelet.dll| 15.2.922.13| 25,976| 07-Jul-2021| 10:59| x86 \nMicrosoft.exchange.certificatenotification.eventlog.dll| 15.2.922.13| 13,712| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.certificatenotificationservicelet.dll| 15.2.922.13| 23,440| 07-Jul-2021| 10:58| x86 \nMicrosoft.exchange.clients.common.dll| 15.2.922.13| 378,248| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.clients.eventlogs.dll| 15.2.922.13| 83,856| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.clients.owa.dll| 15.2.922.13| 2,971,024| 07-Jul-2021| 11:31| x86 \nMicrosoft.exchange.clients.owa2.server.dll| 15.2.922.13| 5,029,776| 07-Jul-2021| 11:28| x86 \nMicrosoft.exchange.clients.owa2.servervariantconfiguration.dll| 15.2.922.13| 893,832| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.clients.security.dll| 15.2.922.13| 413,576| 07-Jul-2021| 11:07| x86 \nMicrosoft.exchange.clients.strings.dll| 15.2.922.13| 924,552| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.cluster.bandwidthmonitor.dll| 15.2.922.13| 31,608| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.cluster.common.dll| 15.2.922.13| 52,112| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.cluster.common.extensions.dll| 15.2.922.13| 21,896| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.cluster.diskmonitor.dll| 15.2.922.13| 33,664| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.cluster.replay.dll| 15.2.922.13| 3,558,792| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.cluster.replicaseeder.dll| 15.2.922.13| 108,408| 07-Jul-2021| 09:12| x64 \nMicrosoft.exchange.cluster.replicavsswriter.dll| 15.2.922.13| 288,632| 07-Jul-2021| 10:34| x64 \nMicrosoft.exchange.cluster.shared.dll| 15.2.922.13| 627,600| 07-Jul-2021| 10:13| x86 \nMicrosoft.exchange.common.agentconfig.transport.dll| 15.2.922.13| 86,408| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.componentconfig.transport.dll| 15.2.922.13| 1,830,288| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.directory.adagentservicevariantconfig.dll| 15.2.922.13| 31,624| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.directory.directoryvariantconfig.dll| 15.2.922.13| 466,320| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.directory.domtvariantconfig.dll| 15.2.922.13| 25,992| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.directory.ismemberofresolverconfig.dll| 15.2.922.13| 38,280| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.directory.tenantrelocationvariantconfig.dll| 15.2.922.13| 102,784| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.directory.topologyservicevariantconfig.dll| 15.2.922.13| 48,520| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.diskmanagement.dll| 15.2.922.13| 67,448| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.common.dll| 15.2.922.13| 172,920| 07-Jul-2021| 09:12| x86 \nMicrosoft.exchange.common.encryption.variantconfig.dll| 15.2.922.13| 113,544| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.il.dll| 15.2.922.13| 13,712| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.common.inference.dll| 15.2.922.13| 130,440| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.optics.dll| 15.2.922.13| 63,880| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.common.processmanagermsg.dll| 15.2.922.13| 19,856| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.common.protocols.popimap.dll| 15.2.922.13| 15,248| 07-Jul-2021| 08:58| x86 \nMicrosoft.exchange.common.search.dll| 15.2.922.13| 108,936| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.common.search.eventlog.dll| 15.2.922.13| 17,792| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.common.smtp.dll| 15.2.922.13| 51,576| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.suiteservices.suiteservicesvariantconfig.dll| 15.2.922.13| 36,744| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.common.transport.azure.dll| 15.2.922.13| 27,528| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.common.transport.monitoringconfig.dll| 15.2.922.13| 1,042,296| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.commonmsg.dll| 15.2.922.13| 29,072| 07-Jul-2021| 08:59| x64 \nMicrosoft.exchange.compliance.auditlogpumper.messages.dll| 15.2.922.13| 13,176| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.compliance.auditservice.core.dll| 15.2.922.13| 181,112| 07-Jul-2021| 11:12| x86 \nMicrosoft.exchange.compliance.auditservice.messages.dll| 15.2.922.13| 30,096| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.compliance.common.dll| 15.2.922.13| 22,392| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.compliance.crimsonevents.dll| 15.2.922.13| 85,880| 07-Jul-2021| 08:59| x64 \nMicrosoft.exchange.compliance.dll| 15.2.922.13| 41,336| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.compliance.recordreview.dll| 15.2.922.13| 37,240| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.compliance.supervision.dll| 15.2.922.13| 50,552| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.compliance.taskcreator.dll| 15.2.922.13| 33,168| 07-Jul-2021| 10:27| x86 \nMicrosoft.exchange.compliance.taskdistributioncommon.dll| 15.2.922.13| 1,100,176| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.compliance.taskdistributionfabric.dll| 15.2.922.13| 206,736| 07-Jul-2021| 10:27| x86 \nMicrosoft.exchange.compliance.taskplugins.dll| 15.2.922.13| 210,808| 07-Jul-2021| 10:46| x86 \nMicrosoft.exchange.compression.dll| 15.2.922.13| 17,272| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.configuration.certificateauth.dll| 15.2.922.13| 37,776| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.configuration.certificateauth.eventlog.dll| 15.2.922.13| 14,224| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.configuration.core.dll| 15.2.922.13| 145,784| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.configuration.core.eventlog.dll| 15.2.922.13| 14,224| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.configuration.delegatedauth.dll| 15.2.922.13| 53,136| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.configuration.delegatedauth.eventlog.dll| 15.2.922.13| 15,760| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.configuration.diagnosticsmodules.dll| 15.2.922.13| 23,432| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.configuration.diagnosticsmodules.eventlog.dll| 15.2.922.13| 13,200| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.configuration.failfast.dll| 15.2.922.13| 54,672| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.configuration.failfast.eventlog.dll| 15.2.922.13| 13,688| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.configuration.objectmodel.dll| 15.2.922.13| 1,846,152| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.configuration.objectmodel.eventlog.dll| 15.2.922.13| 30,088| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.configuration.redirectionmodule.dll| 15.2.922.13| 68,496| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.configuration.redirectionmodule.eventlog.dll| 15.2.922.13| 15,224| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.configuration.remotepowershellbackendcmdletproxymodule.dll| 15.2.922.13| 21,384| 07-Jul-2021| 10:13| x86 \nMicrosoft.exchange.configuration.remotepowershellbackendcmdletproxymodule.eventlog.dll| 15.2.922.13| 13,176| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.connectiondatacollector.dll| 15.2.922.13| 25,976| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.connections.common.dll| 15.2.922.13| 169,864| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.connections.eas.dll| 15.2.922.13| 330,104| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.connections.imap.dll| 15.2.922.13| 173,968| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.connections.pop.dll| 15.2.922.13| 71,056| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.contentfilter.wrapper.exe| 15.2.922.13| 203,656| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.context.client.dll| 15.2.922.13| 27,000| 07-Jul-2021| 10:13| x86 \nMicrosoft.exchange.context.configuration.dll| 15.2.922.13| 51,592| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.context.core.dll| 15.2.922.13| 51,064| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.context.datamodel.dll| 15.2.922.13| 46,984| 07-Jul-2021| 09:40| x86 \nMicrosoft.exchange.core.strings.dll| 15.2.922.13| 1,093,512| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.core.timezone.dll| 15.2.922.13| 57,224| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.data.applicationlogic.deep.dll| 15.2.922.13| 326,544| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.data.applicationlogic.dll| 15.2.922.13| 3,357,560| 07-Jul-2021| 10:07| x86 \nMicrosoft.exchange.data.applicationlogic.eventlog.dll| 15.2.922.13| 35,728| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.data.applicationlogic.monitoring.ifx.dll| 15.2.922.13| 17,792| 07-Jul-2021| 10:08| x86 \nMicrosoft.exchange.data.connectors.dll| 15.2.922.13| 165,240| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.data.consumermailboxprovisioning.dll| 15.2.922.13| 619,408| 07-Jul-2021| 09:59| x86 \nMicrosoft.exchange.data.directory.dll| 15.2.922.13| 7,791,992| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.data.directory.eventlog.dll| 15.2.922.13| 80,272| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.data.dll| 15.2.922.13| 1,790,344| 07-Jul-2021| 09:38| x86 \nMicrosoft.exchange.data.groupmailboxaccesslayer.dll| 15.2.922.13| 1,631,632| 07-Jul-2021| 10:27| x86 \nMicrosoft.exchange.data.ha.dll| 15.2.922.13| 377,720| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.data.imageanalysis.dll| 15.2.922.13| 105,352| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.data.mailboxfeatures.dll| 15.2.922.13| 15,760| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.data.mailboxloadbalance.dll| 15.2.922.13| 224,656| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.data.mapi.dll| 15.2.922.13| 186,744| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.data.metering.contracts.dll| 15.2.922.13| 39,824| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.data.metering.dll| 15.2.922.13| 119,160| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.data.msosyncxsd.dll| 15.2.922.13| 968,072| 07-Jul-2021| 09:12| x86 \nMicrosoft.exchange.data.notification.dll| 15.2.922.13| 141,176| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.data.personaldataplatform.dll| 15.2.922.13| 769,400| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.data.providers.dll| 15.2.922.13| 139,664| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.data.provisioning.dll| 15.2.922.13| 56,720| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.data.rightsmanagement.dll| 15.2.922.13| 452,984| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.data.scheduledtimers.dll| 15.2.922.13| 32,648| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.data.storage.clientstrings.dll| 15.2.922.13| 256,888| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.data.storage.dll| 15.2.922.13| 11,841,928| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.data.storage.eventlog.dll| 15.2.922.13| 37,768| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.data.storageconfigurationresources.dll| 15.2.922.13| 655,760| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.data.storeobjects.dll| 15.2.922.13| 175,496| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.data.throttlingservice.client.dll| 15.2.922.13| 36,216| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.data.throttlingservice.client.eventlog.dll| 15.2.922.13| 14,224| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.data.throttlingservice.eventlog.dll| 15.2.922.13| 14,200| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.datacenter.management.activemonitoring.recoveryservice.eventlog.dll| 15.2.922.13| 14,712| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.datacenterstrings.dll| 15.2.922.13| 72,568| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.delivery.eventlog.dll| 15.2.922.13| 13,176| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.diagnostics.certificatelogger.dll| 15.2.922.13| 22,928| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.diagnostics.dll| 15.2.922.13| 1,845,616| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.diagnostics.dll.deploy| 15.2.922.13| 1,845,616| 07-Jul-2021| 09:08| Not applicable \nMicrosoft.exchange.diagnostics.performancelogger.dll| 15.2.922.13| 23,928| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.diagnostics.service.common.dll| 15.2.922.13| 546,696| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.diagnostics.service.eventlog.dll| 15.2.922.13| 215,440| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.diagnostics.service.exchangejobs.dll| 15.2.922.13| 194,440| 07-Jul-2021| 10:12| x86 \nMicrosoft.exchange.diagnostics.service.exe| 15.2.922.13| 146,320| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.diagnostics.service.fuseboxperfcounters.dll| 15.2.922.13| 27,512| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.diagnosticsaggregation.eventlog.dll| 15.2.922.13| 13,688| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.diagnosticsaggregationservicelet.dll| 15.2.922.13| 49,544| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.directory.topologyservice.eventlog.dll| 15.2.922.13| 28,048| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.directory.topologyservice.exe| 15.2.922.13| 208,768| 07-Jul-2021| 10:10| x86 \nMicrosoft.exchange.disklocker.events.dll| 15.2.922.13| 88,960| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.disklocker.interop.dll| 15.2.922.13| 32,632| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.drumtesting.calendarmigration.dll| 15.2.922.13| 45,960| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.drumtesting.common.dll| 15.2.922.13| 18,808| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.dxstore.dll| 15.2.922.13| 473,464| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.dxstore.ha.events.dll| 15.2.922.13| 206,224| 07-Jul-2021| 08:59| x64 \nMicrosoft.exchange.dxstore.ha.instance.exe| 15.2.922.13| 36,728| 07-Jul-2021| 10:33| x86 \nMicrosoft.exchange.eac.flighting.dll| 15.2.922.13| 131,464| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.edgecredentialsvc.exe| 15.2.922.13| 21,904| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.edgesync.common.dll| 15.2.922.13| 148,344| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.edgesync.datacenterproviders.dll| 15.2.922.13| 220,024| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.edgesync.eventlog.dll| 15.2.922.13| 23,952| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.edgesyncsvc.exe| 15.2.922.13| 97,656| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.ediscovery.export.dll| 15.2.922.13| 1,266,552| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.ediscovery.export.dll.deploy| 15.2.922.13| 1,266,552| 07-Jul-2021| 09:10| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.application| Not applicable| 16,503| 07-Jul-2021| 09:33| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.exe.deploy| 15.2.922.13| 87,416| 07-Jul-2021| 09:12| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.manifest| Not applicable| 67,453| 07-Jul-2021| 09:34| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.strings.dll.deploy| 15.2.922.13| 52,096| 07-Jul-2021| 09:08| Not applicable \nMicrosoft.exchange.ediscovery.mailboxsearch.dll| 15.2.922.13| 292,232| 07-Jul-2021| 10:46| x86 \nMicrosoft.exchange.entities.birthdaycalendar.dll| 15.2.922.13| 73,104| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.entities.booking.defaultservicesettings.dll| 15.2.922.13| 45,968| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.entities.booking.dll| 15.2.922.13| 218,512| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.entities.booking.management.dll| 15.2.922.13| 78,224| 07-Jul-2021| 10:05| x86 \nMicrosoft.exchange.entities.bookings.dll| 15.2.922.13| 35,728| 07-Jul-2021| 10:05| x86 \nMicrosoft.exchange.entities.calendaring.dll| 15.2.922.13| 935,288| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.entities.common.dll| 15.2.922.13| 336,248| 07-Jul-2021| 10:01| x86 \nMicrosoft.exchange.entities.connectors.dll| 15.2.922.13| 52,624| 07-Jul-2021| 10:05| x86 \nMicrosoft.exchange.entities.contentsubmissions.dll| 15.2.922.13| 32,144| 07-Jul-2021| 10:13| x86 \nMicrosoft.exchange.entities.context.dll| 15.2.922.13| 60,808| 07-Jul-2021| 10:10| x86 \nMicrosoft.exchange.entities.datamodel.dll| 15.2.922.13| 854,392| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.entities.fileproviders.dll| 15.2.922.13| 291,728| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.entities.foldersharing.dll| 15.2.922.13| 39,288| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.entities.holidaycalendars.dll| 15.2.922.13| 76,176| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.entities.insights.dll| 15.2.922.13| 166,800| 07-Jul-2021| 10:42| x86 \nMicrosoft.exchange.entities.meetinglocation.dll| 15.2.922.13| 1,486,728| 07-Jul-2021| 10:45| x86 \nMicrosoft.exchange.entities.meetingparticipants.dll| 15.2.922.13| 122,256| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.entities.meetingtimecandidates.dll| 15.2.922.13| 12,327,312| 07-Jul-2021| 10:48| x86 \nMicrosoft.exchange.entities.onlinemeetings.dll| 15.2.922.13| 264,072| 07-Jul-2021| 10:15| x86 \nMicrosoft.exchange.entities.people.dll| 15.2.922.13| 37,760| 07-Jul-2021| 10:10| x86 \nMicrosoft.exchange.entities.peopleinsights.dll| 15.2.922.13| 186,768| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.entities.reminders.dll| 15.2.922.13| 64,400| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.entities.schedules.dll| 15.2.922.13| 83,848| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.entities.shellservice.dll| 15.2.922.13| 63,888| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.entities.tasks.dll| 15.2.922.13| 100,216| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.entities.xrm.dll| 15.2.922.13| 144,784| 07-Jul-2021| 10:06| x86 \nMicrosoft.exchange.entityextraction.calendar.dll| 15.2.922.13| 270,224| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.eserepl.common.dll| 15.2.922.13| 15,248| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.eserepl.configuration.dll| 15.2.922.13| 15,760| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.eserepl.dll| 15.2.922.13| 130,424| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.ews.configuration.dll| 15.2.922.13| 254,352| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.exchangecertificate.eventlog.dll| 15.2.922.13| 13,192| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.exchangecertificateservicelet.dll| 15.2.922.13| 37,240| 07-Jul-2021| 10:59| x86 \nMicrosoft.exchange.extensibility.internal.dll| 15.2.922.13| 640,904| 07-Jul-2021| 09:38| x86 \nMicrosoft.exchange.extensibility.partner.dll| 15.2.922.13| 37,256| 07-Jul-2021| 10:05| x86 \nMicrosoft.exchange.federateddirectory.dll| 15.2.922.13| 146,320| 07-Jul-2021| 11:11| x86 \nMicrosoft.exchange.ffosynclogmsg.dll| 15.2.922.13| 13,192| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.frontendhttpproxy.dll| 15.2.922.13| 596,344| 07-Jul-2021| 11:09| x86 \nMicrosoft.exchange.frontendhttpproxy.eventlogs.dll| 15.2.922.13| 14,712| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.frontendtransport.monitoring.dll| 15.2.922.13| 30,088| 07-Jul-2021| 11:50| x86 \nMicrosoft.exchange.griffin.variantconfiguration.dll| 15.2.922.13| 99,720| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.hathirdpartyreplication.dll| 15.2.922.13| 42,384| 07-Jul-2021| 09:12| x86 \nMicrosoft.exchange.helpprovider.dll| 15.2.922.13| 40,328| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.httpproxy.addressfinder.dll| 15.2.922.13| 54,136| 07-Jul-2021| 10:33| x86 \nMicrosoft.exchange.httpproxy.common.dll| 15.2.922.13| 164,232| 07-Jul-2021| 10:13| x86 \nMicrosoft.exchange.httpproxy.diagnostics.dll| 15.2.922.13| 58,760| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.httpproxy.flighting.dll| 15.2.922.13| 204,680| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.httpproxy.passivemonitor.dll| 15.2.922.13| 17,800| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.httpproxy.proxyassistant.dll| 15.2.922.13| 30,584| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.httpproxy.routerefresher.dll| 15.2.922.13| 38,800| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.httpproxy.routeselector.dll| 15.2.922.13| 48,504| 07-Jul-2021| 10:33| x86 \nMicrosoft.exchange.httpproxy.routing.dll| 15.2.922.13| 180,624| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.httpredirectmodules.dll| 15.2.922.13| 36,744| 07-Jul-2021| 11:08| x86 \nMicrosoft.exchange.httprequestfiltering.dll| 15.2.922.13| 28,040| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.httputilities.dll| 15.2.922.13| 25,976| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.hygiene.data.dll| 15.2.922.13| 1,868,176| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.hygiene.diagnosisutil.dll| 15.2.922.13| 54,672| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.hygiene.eopinstantprovisioning.dll| 15.2.922.13| 35,728| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.idserialization.dll| 15.2.922.13| 35,728| 07-Jul-2021| 08:58| x86 \nMicrosoft.exchange.imap4.eventlog.dll| 15.2.922.13| 18,304| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.imap4.eventlog.dll.fe| 15.2.922.13| 18,304| 07-Jul-2021| 09:09| Not applicable \nMicrosoft.exchange.imap4.exe| 15.2.922.13| 263,032| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.imap4.exe.fe| 15.2.922.13| 263,032| 07-Jul-2021| 10:26| Not applicable \nMicrosoft.exchange.imap4service.exe| 15.2.922.13| 24,976| 07-Jul-2021| 10:13| x86 \nMicrosoft.exchange.imap4service.exe.fe| 15.2.922.13| 24,976| 07-Jul-2021| 10:13| Not applicable \nMicrosoft.exchange.imapconfiguration.dl1| 15.2.922.13| 53,128| 07-Jul-2021| 09:33| Not applicable \nMicrosoft.exchange.inference.common.dll| 15.2.922.13| 216,976| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.inference.hashtagsrelevance.dll| 15.2.922.13| 32,136| 07-Jul-2021| 10:44| x64 \nMicrosoft.exchange.inference.peoplerelevance.dll| 15.2.922.13| 282,000| 07-Jul-2021| 10:42| x86 \nMicrosoft.exchange.inference.ranking.dll| 15.2.922.13| 18,832| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.inference.safetylibrary.dll| 15.2.922.13| 83,848| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.inference.service.eventlog.dll| 15.2.922.13| 15,224| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.infoworker.assistantsclientresources.dll| 15.2.922.13| 94,072| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.infoworker.common.dll| 15.2.922.13| 1,840,528| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.infoworker.eventlog.dll| 15.2.922.13| 71,560| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.infoworker.meetingvalidator.dll| 15.2.922.13| 175,504| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.instantmessaging.dll| 15.2.922.13| 45,968| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.irm.formprotector.dll| 15.2.922.13| 159,600| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.irm.msoprotector.dll| 15.2.922.13| 51,088| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.irm.ofcprotector.dll| 15.2.922.13| 45,968| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.isam.databasemanager.dll| 15.2.922.13| 32,136| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.isam.esebcli.dll| 15.2.922.13| 100,216| 07-Jul-2021| 09:10| x64 \nMicrosoft.exchange.jobqueue.eventlog.dll| 15.2.922.13| 13,192| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.jobqueueservicelet.dll| 15.2.922.13| 271,240| 07-Jul-2021| 11:12| x86 \nMicrosoft.exchange.killswitch.dll| 15.2.922.13| 22,416| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.killswitchconfiguration.dll| 15.2.922.13| 33,672| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.loganalyzer.analyzers.auditing.dll| 15.2.922.13| 18,304| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.analyzers.certificatelog.dll| 15.2.922.13| 15,240| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.analyzers.cmdletinfralog.dll| 15.2.922.13| 27,536| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.analyzers.easlog.dll| 15.2.922.13| 30,584| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.ecplog.dll| 15.2.922.13| 22,408| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.loganalyzer.analyzers.eventlog.dll| 15.2.922.13| 66,448| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.ewslog.dll| 15.2.922.13| 29,560| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.loganalyzer.analyzers.griffinperfcounter.dll| 15.2.922.13| 19,848| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.groupescalationlog.dll| 15.2.922.13| 20,368| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.analyzers.httpproxylog.dll| 15.2.922.13| 19,336| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.hxservicelog.dll| 15.2.922.13| 34,168| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.iislog.dll| 15.2.922.13| 103,816| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.analyzers.lameventlog.dll| 15.2.922.13| 31,608| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.migrationlog.dll| 15.2.922.13| 15,736| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.loganalyzer.analyzers.oabdownloadlog.dll| 15.2.922.13| 20,872| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.oauthcafelog.dll| 15.2.922.13| 16,264| 07-Jul-2021| 09:12| x86 \nMicrosoft.exchange.loganalyzer.analyzers.outlookservicelog.dll| 15.2.922.13| 49,016| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.owaclientlog.dll| 15.2.922.13| 44,432| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.owalog.dll| 15.2.922.13| 38,264| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.loganalyzer.analyzers.perflog.dll| 15.2.922.13| 10,375,032| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.pfassistantlog.dll| 15.2.922.13| 29,064| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.loganalyzer.analyzers.rca.dll| 15.2.922.13| 21,384| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.analyzers.restlog.dll| 15.2.922.13| 24,456| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.store.dll| 15.2.922.13| 15,240| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.analyzers.transportsynchealthlog.dll| 15.2.922.13| 21,904| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.core.dll| 15.2.922.13| 89,480| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.loganalyzer.extensions.auditing.dll| 15.2.922.13| 20,880| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.loganalyzer.extensions.certificatelog.dll| 15.2.922.13| 26,504| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.cmdletinfralog.dll| 15.2.922.13| 21,392| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.loganalyzer.extensions.common.dll| 15.2.922.13| 28,048| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.loganalyzer.extensions.easlog.dll| 15.2.922.13| 28,560| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.errordetection.dll| 15.2.922.13| 36,240| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.loganalyzer.extensions.ewslog.dll| 15.2.922.13| 16,784| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.griffinperfcounter.dll| 15.2.922.13| 19,848| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.loganalyzer.extensions.groupescalationlog.dll| 15.2.922.13| 15,248| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.loganalyzer.extensions.httpproxylog.dll| 15.2.922.13| 17,296| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.hxservicelog.dll| 15.2.922.13| 19,848| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.iislog.dll| 15.2.922.13| 57,232| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.loganalyzer.extensions.migrationlog.dll| 15.2.922.13| 17,808| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.oabdownloadlog.dll| 15.2.922.13| 18,832| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.extensions.oauthcafelog.dll| 15.2.922.13| 16,272| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.outlookservicelog.dll| 15.2.922.13| 17,800| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.owaclientlog.dll| 15.2.922.13| 15,248| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.owalog.dll| 15.2.922.13| 15,248| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.perflog.dll| 15.2.922.13| 52,624| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.pfassistantlog.dll| 15.2.922.13| 18,296| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.loganalyzer.extensions.rca.dll| 15.2.922.13| 34,192| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.restlog.dll| 15.2.922.13| 17,288| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.loganalyzer.extensions.store.dll| 15.2.922.13| 18,832| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loganalyzer.extensions.transportsynchealthlog.dll| 15.2.922.13| 43,408| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.loguploader.dll| 15.2.922.13| 165,240| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.loguploaderproxy.dll| 15.2.922.13| 54,664| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.mailboxassistants.assistants.dll| 15.2.922.13| 9,059,728| 07-Jul-2021| 11:40| x86 \nMicrosoft.exchange.mailboxassistants.attachmentthumbnail.dll| 15.2.922.13| 33,168| 07-Jul-2021| 10:15| x86 \nMicrosoft.exchange.mailboxassistants.common.dll| 15.2.922.13| 124,304| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.mailboxassistants.crimsonevents.dll| 15.2.922.13| 82,832| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.mailboxassistants.eventlog.dll| 15.2.922.13| 14,208| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.mailboxassistants.rightsmanagement.dll| 15.2.922.13| 30,072| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.mailboxloadbalance.dll| 15.2.922.13| 661,384| 07-Jul-2021| 10:46| x86 \nMicrosoft.exchange.mailboxloadbalance.serverstrings.dll| 15.2.922.13| 63,352| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.mailboxreplicationservice.calendarsyncprovider.dll| 15.2.922.13| 175,480| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.mailboxreplicationservice.common.dll| 15.2.922.13| 2,791,824| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.mailboxreplicationservice.complianceprovider.dll| 15.2.922.13| 53,112| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.mailboxreplicationservice.contactsyncprovider.dll| 15.2.922.13| 151,928| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.mailboxreplicationservice.dll| 15.2.922.13| 967,048| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.easprovider.dll| 15.2.922.13| 185,208| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.mailboxreplicationservice.eventlog.dll| 15.2.922.13| 31,632| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.mailboxreplicationservice.googledocprovider.dll| 15.2.922.13| 39,800| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.mailboxreplicationservice.imapprovider.dll| 15.2.922.13| 105,848| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.mailboxreplicationservice.mapiprovider.dll| 15.2.922.13| 95,096| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.mailboxreplicationservice.popprovider.dll| 15.2.922.13| 43,384| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyclient.dll| 15.2.922.13| 18,824| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyservice.dll| 15.2.922.13| 172,920| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.pstprovider.dll| 15.2.922.13| 102,776| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.mailboxreplicationservice.remoteprovider.dll| 15.2.922.13| 98,680| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.mailboxreplicationservice.storageprovider.dll| 15.2.922.13| 188,808| 07-Jul-2021| 10:40| x86 \nMicrosoft.exchange.mailboxreplicationservice.syncprovider.dll| 15.2.922.13| 43,400| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.mailboxreplicationservice.xml.dll| 15.2.922.13| 447,376| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.mailboxreplicationservice.xrmprovider.dll| 15.2.922.13| 89,976| 07-Jul-2021| 10:42| x86 \nMicrosoft.exchange.mailboxtransport.monitoring.dll| 15.2.922.13| 107,912| 07-Jul-2021| 11:49| x86 \nMicrosoft.exchange.mailboxtransport.storedriveragents.dll| 15.2.922.13| 371,064| 07-Jul-2021| 10:45| x86 \nMicrosoft.exchange.mailboxtransport.storedrivercommon.dll| 15.2.922.13| 193,912| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.mailboxtransport.storedriverdelivery.dll| 15.2.922.13| 552,328| 07-Jul-2021| 10:33| x86 \nMicrosoft.exchange.mailboxtransport.storedriverdelivery.eventlog.dll| 15.2.922.13| 16,264| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.mailboxtransport.submission.eventlog.dll| 15.2.922.13| 15,736| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.mailboxtransport.submission.storedriversubmission.dll| 15.2.922.13| 321,416| 07-Jul-2021| 10:40| x86 \nMicrosoft.exchange.mailboxtransport.submission.storedriversubmission.eventlog.dll| 15.2.922.13| 17,800| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.mailboxtransport.syncdelivery.dll| 15.2.922.13| 45,432| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.mailboxtransportwatchdogservicelet.dll| 15.2.922.13| 18,312| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.mailboxtransportwatchdogservicelet.eventlog.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.managedlexruntime.mppgruntime.dll| 15.2.922.13| 20,880| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.management.activedirectory.dll| 15.2.922.13| 415,120| 07-Jul-2021| 10:12| x86 \nMicrosoft.exchange.management.classificationdefinitions.dll| 15.2.922.13| 1,269,624| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.management.compliancepolicy.dll| 15.2.922.13| 41,848| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.management.controlpanel.basics.dll| 15.2.922.13| 433,528| 07-Jul-2021| 09:11| x86 \nMicrosoft.exchange.management.controlpanel.dll| 15.2.922.13| 4,566,392| 07-Jul-2021| 12:42| x86 \nMicrosoft.exchange.management.controlpanel.owaoptionstrings.dll| 15.2.922.13| 260,984| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.management.controlpanelmsg.dll| 15.2.922.13| 33,656| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.management.deployment.analysis.dll| 15.2.922.13| 94,072| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.management.deployment.dll| 15.2.922.13| 586,120| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.management.deployment.xml.dll| 15.2.922.13| 3,543,440| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.management.detailstemplates.dll| 15.2.922.13| 67,976| 07-Jul-2021| 11:14| x86 \nMicrosoft.exchange.management.dll| 15.2.922.13| 16,498,056| 07-Jul-2021| 10:56| x86 \nMicrosoft.exchange.management.edge.systemmanager.dll| 15.2.922.13| 58,760| 07-Jul-2021| 11:03| x86 \nMicrosoft.exchange.management.infrastructure.asynchronoustask.dll| 15.2.922.13| 23,952| 07-Jul-2021| 11:03| x86 \nMicrosoft.exchange.management.jitprovisioning.dll| 15.2.922.13| 101,760| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.management.migration.dll| 15.2.922.13| 544,120| 07-Jul-2021| 10:58| x86 \nMicrosoft.exchange.management.mobility.dll| 15.2.922.13| 305,016| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.management.nativeresources.dll| 15.2.922.13| 273,800| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.management.powershell.support.dll| 15.2.922.13| 418,696| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.management.provisioning.dll| 15.2.922.13| 275,832| 07-Jul-2021| 11:05| x86 \nMicrosoft.exchange.management.psdirectinvoke.dll| 15.2.922.13| 70,544| 07-Jul-2021| 11:08| x86 \nMicrosoft.exchange.management.rbacdefinition.dll| 15.2.922.13| 7,874,448| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.management.recipient.dll| 15.2.922.13| 1,501,576| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.management.snapin.esm.dll| 15.2.922.13| 71,552| 07-Jul-2021| 11:03| x86 \nMicrosoft.exchange.management.systemmanager.dll| 15.2.922.13| 1,301,368| 07-Jul-2021| 10:59| x86 \nMicrosoft.exchange.management.transport.dll| 15.2.922.13| 1,876,368| 07-Jul-2021| 11:05| x86 \nMicrosoft.exchange.managementgui.dll| 15.2.922.13| 5,366,648| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.managementmsg.dll| 15.2.922.13| 36,240| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.mapihttpclient.dll| 15.2.922.13| 117,640| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.mapihttphandler.dll| 15.2.922.13| 209,808| 07-Jul-2021| 11:03| x86 \nMicrosoft.exchange.messagesecurity.dll| 15.2.922.13| 79,736| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.messagesecurity.messagesecuritymsg.dll| 15.2.922.13| 17,272| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.messagingpolicies.dlppolicyagent.dll| 15.2.922.13| 156,040| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.messagingpolicies.edgeagents.dll| 15.2.922.13| 65,912| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.messagingpolicies.eventlog.dll| 15.2.922.13| 30,608| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.messagingpolicies.filtering.dll| 15.2.922.13| 58,232| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.messagingpolicies.hygienerules.dll| 15.2.922.13| 29,584| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.messagingpolicies.journalagent.dll| 15.2.922.13| 175,504| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.messagingpolicies.redirectionagent.dll| 15.2.922.13| 28,560| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.messagingpolicies.retentionpolicyagent.dll| 15.2.922.13| 75,144| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.messagingpolicies.rmsvcagent.dll| 15.2.922.13| 207,248| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.messagingpolicies.rules.dll| 15.2.922.13| 440,696| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.messagingpolicies.supervisoryreviewagent.dll| 15.2.922.13| 83,336| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.messagingpolicies.transportruleagent.dll| 15.2.922.13| 35,216| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.messagingpolicies.unifiedpolicycommon.dll| 15.2.922.13| 53,112| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.messagingpolicies.unjournalagent.dll| 15.2.922.13| 96,656| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.migration.dll| 15.2.922.13| 1,110,392| 07-Jul-2021| 10:42| x86 \nMicrosoft.exchange.migrationworkflowservice.eventlog.dll| 15.2.922.13| 14,712| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.mobiledriver.dll| 15.2.922.13| 135,568| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.monitoring.activemonitoring.local.components.dll| 15.2.922.13| 5,064,048| 07-Jul-2021| 11:44| x86 \nMicrosoft.exchange.monitoring.servicecontextprovider.dll| 15.2.922.13| 19,832| 07-Jul-2021| 09:40| x86 \nMicrosoft.exchange.mrsmlbconfiguration.dll| 15.2.922.13| 68,496| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.net.dll| 15.2.922.13| 5,086,096| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.net.rightsmanagement.dll| 15.2.922.13| 265,616| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.networksettings.dll| 15.2.922.13| 37,768| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.notifications.broker.eventlog.dll| 15.2.922.13| 14,216| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.notifications.broker.exe| 15.2.922.13| 549,776| 07-Jul-2021| 11:36| x86 \nMicrosoft.exchange.oabauthmodule.dll| 15.2.922.13| 22,904| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.oabrequesthandler.dll| 15.2.922.13| 106,360| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.oauth.core.dll| 15.2.922.13| 291,720| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.objectstoreclient.dll| 15.2.922.13| 17,272| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.odata.configuration.dll| 15.2.922.13| 277,896| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.odata.dll| 15.2.922.13| 2,993,544| 07-Jul-2021| 11:33| x86 \nMicrosoft.exchange.officegraph.common.dll| 15.2.922.13| 90,488| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.officegraph.grain.dll| 15.2.922.13| 101,768| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.officegraph.graincow.dll| 15.2.922.13| 38,280| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.officegraph.graineventbasedassistants.dll| 15.2.922.13| 45,456| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.officegraph.grainpropagationengine.dll| 15.2.922.13| 58,248| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.officegraph.graintransactionstorage.dll| 15.2.922.13| 147,320| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.officegraph.graintransportdeliveryagent.dll| 15.2.922.13| 26,496| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.officegraph.graphstore.dll| 15.2.922.13| 184,200| 07-Jul-2021| 10:05| x86 \nMicrosoft.exchange.officegraph.permailboxkeys.dll| 15.2.922.13| 26,504| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.officegraph.secondarycopyquotamanagement.dll| 15.2.922.13| 38,288| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.officegraph.secondaryshallowcopylocation.dll| 15.2.922.13| 55,672| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.officegraph.security.dll| 15.2.922.13| 147,336| 07-Jul-2021| 10:02| x86 \nMicrosoft.exchange.officegraph.semanticgraph.dll| 15.2.922.13| 191,880| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.officegraph.tasklogger.dll| 15.2.922.13| 33,680| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.partitioncache.dll| 15.2.922.13| 28,024| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.passivemonitoringsettings.dll| 15.2.922.13| 32,648| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.photogarbagecollectionservicelet.dll| 15.2.922.13| 15,240| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.pop3.eventlog.dll| 15.2.922.13| 17,272| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.pop3.eventlog.dll.fe| 15.2.922.13| 17,272| 07-Jul-2021| 09:09| Not applicable \nMicrosoft.exchange.pop3.exe| 15.2.922.13| 106,896| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.pop3.exe.fe| 15.2.922.13| 106,896| 07-Jul-2021| 10:26| Not applicable \nMicrosoft.exchange.pop3service.exe| 15.2.922.13| 24,968| 07-Jul-2021| 10:13| x86 \nMicrosoft.exchange.pop3service.exe.fe| 15.2.922.13| 24,968| 07-Jul-2021| 10:13| Not applicable \nMicrosoft.exchange.popconfiguration.dl1| 15.2.922.13| 42,888| 07-Jul-2021| 09:33| Not applicable \nMicrosoft.exchange.popimap.core.dll| 15.2.922.13| 264,568| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.popimap.core.dll.fe| 15.2.922.13| 264,568| 07-Jul-2021| 10:14| Not applicable \nMicrosoft.exchange.powersharp.dll| 15.2.922.13| 358,264| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.powersharp.management.dll| 15.2.922.13| 4,167,056| 07-Jul-2021| 11:08| x86 \nMicrosoft.exchange.powershell.configuration.dll| 15.2.922.13| 308,616| 07-Jul-2021| 11:11| x64 \nMicrosoft.exchange.powershell.rbachostingtools.dll| 15.2.922.13| 41,352| 07-Jul-2021| 11:09| x86 \nMicrosoft.exchange.protectedservicehost.exe| 15.2.922.13| 30,600| 07-Jul-2021| 10:10| x86 \nMicrosoft.exchange.protocols.fasttransfer.dll| 15.2.922.13| 137,096| 07-Jul-2021| 10:33| x86 \nMicrosoft.exchange.protocols.mapi.dll| 15.2.922.13| 441,728| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.provisioning.eventlog.dll| 15.2.922.13| 14,224| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.provisioningagent.dll| 15.2.922.13| 224,632| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.provisioningservicelet.dll| 15.2.922.13| 105,848| 07-Jul-2021| 10:58| x86 \nMicrosoft.exchange.pst.dll| 15.2.922.13| 168,840| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.pst.dll.deploy| 15.2.922.13| 168,840| 07-Jul-2021| 08:59| Not applicable \nMicrosoft.exchange.pswsclient.dll| 15.2.922.13| 259,448| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.publicfolders.dll| 15.2.922.13| 72,072| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.pushnotifications.crimsonevents.dll| 15.2.922.13| 215,944| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.pushnotifications.dll| 15.2.922.13| 106,872| 07-Jul-2021| 10:15| x86 \nMicrosoft.exchange.pushnotifications.publishers.dll| 15.2.922.13| 425,864| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.pushnotifications.server.dll| 15.2.922.13| 70,536| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.query.analysis.dll| 15.2.922.13| 46,456| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.query.configuration.dll| 15.2.922.13| 215,944| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.query.core.dll| 15.2.922.13| 168,848| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.query.ranking.dll| 15.2.922.13| 343,416| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.query.retrieval.dll| 15.2.922.13| 174,456| 07-Jul-2021| 10:45| x86 \nMicrosoft.exchange.query.suggestions.dll| 15.2.922.13| 95,120| 07-Jul-2021| 10:42| x86 \nMicrosoft.exchange.realtimeanalyticspublisherservicelet.dll| 15.2.922.13| 127,352| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.relevance.core.dll| 15.2.922.13| 63,376| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.relevance.data.dll| 15.2.922.13| 36,752| 07-Jul-2021| 09:56| x64 \nMicrosoft.exchange.relevance.mailtagger.dll| 15.2.922.13| 17,784| 07-Jul-2021| 09:11| x64 \nMicrosoft.exchange.relevance.people.dll| 15.2.922.13| 9,666,960| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.relevance.peopleindex.dll| 15.2.922.13| 20,788,104| 07-Jul-2021| 09:35| x64 \nMicrosoft.exchange.relevance.peopleranker.dll| 15.2.922.13| 36,728| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.relevance.perm.dll| 15.2.922.13| 97,680| 07-Jul-2021| 08:59| x64 \nMicrosoft.exchange.relevance.sassuggest.dll| 15.2.922.13| 28,552| 07-Jul-2021| 09:34| x64 \nMicrosoft.exchange.relevance.upm.dll| 15.2.922.13| 72,056| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.routing.client.dll| 15.2.922.13| 15,752| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.routing.eventlog.dll| 15.2.922.13| 13,176| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.routing.server.exe| 15.2.922.13| 59,272| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.rpc.dll| 15.2.922.13| 1,647,504| 07-Jul-2021| 09:33| x64 \nMicrosoft.exchange.rpcclientaccess.dll| 15.2.922.13| 209,808| 07-Jul-2021| 10:13| x86 \nMicrosoft.exchange.rpcclientaccess.exmonhandler.dll| 15.2.922.13| 60,304| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.rpcclientaccess.handler.dll| 15.2.922.13| 518,008| 07-Jul-2021| 10:16| x86 \nMicrosoft.exchange.rpcclientaccess.monitoring.dll| 15.2.922.13| 161,160| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.rpcclientaccess.parser.dll| 15.2.922.13| 724,344| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.rpcclientaccess.server.dll| 15.2.922.13| 243,088| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.rpcclientaccess.service.eventlog.dll| 15.2.922.13| 20,872| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.rpcclientaccess.service.exe| 15.2.922.13| 35,216| 07-Jul-2021| 11:03| x86 \nMicrosoft.exchange.rpchttpmodules.dll| 15.2.922.13| 42,384| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.rpcoverhttpautoconfig.dll| 15.2.922.13| 56,184| 07-Jul-2021| 10:59| x86 \nMicrosoft.exchange.rpcoverhttpautoconfig.eventlog.dll| 15.2.922.13| 27,536| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.rules.common.dll| 15.2.922.13| 130,448| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.saclwatcher.eventlog.dll| 15.2.922.13| 14,712| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.saclwatcherservicelet.dll| 15.2.922.13| 20,360| 07-Jul-2021| 10:27| x86 \nMicrosoft.exchange.safehtml.dll| 15.2.922.13| 21,392| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.sandbox.activities.dll| 15.2.922.13| 267,640| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.sandbox.contacts.dll| 15.2.922.13| 110,968| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.sandbox.core.dll| 15.2.922.13| 112,520| 07-Jul-2021| 08:58| x86 \nMicrosoft.exchange.sandbox.services.dll| 15.2.922.13| 622,456| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.search.bigfunnel.dll| 15.2.922.13| 185,200| 07-Jul-2021| 10:42| x86 \nMicrosoft.exchange.search.bigfunnel.eventlog.dll| 15.2.922.13| 12,152| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.search.blingwrapper.dll| 15.2.922.13| 19,344| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.search.core.dll| 15.2.922.13| 211,848| 07-Jul-2021| 10:12| x86 \nMicrosoft.exchange.search.ediscoveryquery.dll| 15.2.922.13| 17,808| 07-Jul-2021| 10:44| x86 \nMicrosoft.exchange.search.engine.dll| 15.2.922.13| 97,672| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.search.fast.configuration.dll| 15.2.922.13| 16,776| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.search.fast.dll| 15.2.922.13| 436,600| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.search.files.dll| 15.2.922.13| 274,312| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.search.flighting.dll| 15.2.922.13| 24,968| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.search.mdb.dll| 15.2.922.13| 218,000| 07-Jul-2021| 10:16| x86 \nMicrosoft.exchange.search.service.exe| 15.2.922.13| 26,504| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.security.applicationencryption.dll| 15.2.922.13| 221,064| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.security.dll| 15.2.922.13| 1,559,416| 07-Jul-2021| 10:11| x86 \nMicrosoft.exchange.security.msarpsservice.exe| 15.2.922.13| 19,832| 07-Jul-2021| 10:13| x86 \nMicrosoft.exchange.security.securitymsg.dll| 15.2.922.13| 28,552| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.server.storage.admininterface.dll| 15.2.922.13| 225,160| 07-Jul-2021| 10:41| x86 \nMicrosoft.exchange.server.storage.common.dll| 15.2.922.13| 5,151,096| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.server.storage.diagnostics.dll| 15.2.922.13| 214,904| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.server.storage.directoryservices.dll| 15.2.922.13| 115,592| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.server.storage.esebackinterop.dll| 15.2.922.13| 82,808| 07-Jul-2021| 09:55| x64 \nMicrosoft.exchange.server.storage.eventlog.dll| 15.2.922.13| 80,784| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.server.storage.fulltextindex.dll| 15.2.922.13| 66,424| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.server.storage.ha.dll| 15.2.922.13| 81,296| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.server.storage.lazyindexing.dll| 15.2.922.13| 211,848| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.server.storage.logicaldatamodel.dll| 15.2.922.13| 1,341,328| 07-Jul-2021| 10:27| x86 \nMicrosoft.exchange.server.storage.mapidisp.dll| 15.2.922.13| 511,864| 07-Jul-2021| 10:37| x86 \nMicrosoft.exchange.server.storage.multimailboxsearch.dll| 15.2.922.13| 47,488| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.server.storage.physicalaccess.dll| 15.2.922.13| 873,848| 07-Jul-2021| 10:16| x86 \nMicrosoft.exchange.server.storage.propertydefinitions.dll| 15.2.922.13| 1,352,568| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.server.storage.propertytag.dll| 15.2.922.13| 30,584| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.server.storage.rpcproxy.dll| 15.2.922.13| 130,440| 07-Jul-2021| 10:42| x86 \nMicrosoft.exchange.server.storage.storecommonservices.dll| 15.2.922.13| 1,018,752| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.server.storage.storeintegritycheck.dll| 15.2.922.13| 111,496| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.server.storage.workermanager.dll| 15.2.922.13| 34,672| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.server.storage.xpress.dll| 15.2.922.13| 19,336| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.servicehost.eventlog.dll| 15.2.922.13| 14,736| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.servicehost.exe| 15.2.922.13| 60,792| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.servicelets.globallocatorcache.dll| 15.2.922.13| 50,576| 07-Jul-2021| 10:11| x86 \nMicrosoft.exchange.servicelets.globallocatorcache.eventlog.dll| 15.2.922.13| 14,200| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.servicelets.unifiedpolicysyncservicelet.eventlog.dll| 15.2.922.13| 14,200| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.services.common.dll| 15.2.922.13| 74,128| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.services.dll| 15.2.922.13| 8,480,632| 07-Jul-2021| 11:16| x86 \nMicrosoft.exchange.services.eventlogs.dll| 15.2.922.13| 30,096| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.services.ewshandler.dll| 15.2.922.13| 633,736| 07-Jul-2021| 11:29| x86 \nMicrosoft.exchange.services.ewsserialization.dll| 15.2.922.13| 1,651,080| 07-Jul-2021| 11:19| x86 \nMicrosoft.exchange.services.json.dll| 15.2.922.13| 296,312| 07-Jul-2021| 11:25| x86 \nMicrosoft.exchange.services.messaging.dll| 15.2.922.13| 43,408| 07-Jul-2021| 11:17| x86 \nMicrosoft.exchange.services.onlinemeetings.dll| 15.2.922.13| 233,336| 07-Jul-2021| 10:13| x86 \nMicrosoft.exchange.services.surface.dll| 15.2.922.13| 178,552| 07-Jul-2021| 11:27| x86 \nMicrosoft.exchange.services.wcf.dll| 15.2.922.13| 348,552| 07-Jul-2021| 11:22| x86 \nMicrosoft.exchange.setup.acquirelanguagepack.dll| 15.2.922.13| 56,712| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.setup.bootstrapper.common.dll| 15.2.922.13| 93,072| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.setup.common.dll| 15.2.922.13| 296,312| 07-Jul-2021| 11:13| x86 \nMicrosoft.exchange.setup.commonbase.dll| 15.2.922.13| 35,704| 07-Jul-2021| 11:03| x86 \nMicrosoft.exchange.setup.console.dll| 15.2.922.13| 27,024| 07-Jul-2021| 11:16| x86 \nMicrosoft.exchange.setup.gui.dll| 15.2.922.13| 114,552| 07-Jul-2021| 11:16| x86 \nMicrosoft.exchange.setup.parser.dll| 15.2.922.13| 53,624| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.setup.signverfwrapper.dll| 15.2.922.13| 75,152| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.sharedcache.caches.dll| 15.2.922.13| 142,728| 07-Jul-2021| 10:09| x86 \nMicrosoft.exchange.sharedcache.client.dll| 15.2.922.13| 24,976| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.sharedcache.eventlog.dll| 15.2.922.13| 15,224| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.sharedcache.exe| 15.2.922.13| 58,744| 07-Jul-2021| 10:11| x86 \nMicrosoft.exchange.sharepointsignalstore.dll| 15.2.922.13| 27,000| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.slabmanifest.dll| 15.2.922.13| 46,992| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.sqm.dll| 15.2.922.13| 46,984| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.store.service.exe| 15.2.922.13| 28,048| 07-Jul-2021| 10:45| x86 \nMicrosoft.exchange.store.worker.exe| 15.2.922.13| 26,512| 07-Jul-2021| 10:42| x86 \nMicrosoft.exchange.storeobjectsservice.eventlog.dll| 15.2.922.13| 13,712| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.storeobjectsservice.exe| 15.2.922.13| 31,608| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.storeprovider.dll| 15.2.922.13| 1,205,128| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.structuredquery.dll| 15.2.922.13| 158,608| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.symphonyhandler.dll| 15.2.922.13| 628,088| 07-Jul-2021| 10:49| x86 \nMicrosoft.exchange.syncmigration.eventlog.dll| 15.2.922.13| 13,176| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.syncmigrationservicelet.dll| 15.2.922.13| 16,272| 07-Jul-2021| 11:01| x86 \nMicrosoft.exchange.systemprobemsg.dll| 15.2.922.13| 13,192| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.textprocessing.dll| 15.2.922.13| 221,560| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.textprocessing.eventlog.dll| 15.2.922.13| 13,688| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.transport.agent.addressbookpolicyroutingagent.dll| 15.2.922.13| 29,048| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.transport.agent.antispam.common.dll| 15.2.922.13| 138,640| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.transport.agent.contentfilter.cominterop.dll| 15.2.922.13| 21,904| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.transport.agent.controlflow.dll| 15.2.922.13| 40,312| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.transport.agent.faultinjectionagent.dll| 15.2.922.13| 22,928| 07-Jul-2021| 10:35| x86 \nMicrosoft.exchange.transport.agent.frontendproxyagent.dll| 15.2.922.13| 21,368| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.transport.agent.hygiene.dll| 15.2.922.13| 212,368| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.transport.agent.interceptoragent.dll| 15.2.922.13| 98,704| 07-Jul-2021| 10:36| x86 \nMicrosoft.exchange.transport.agent.liveidauth.dll| 15.2.922.13| 22,920| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.transport.agent.malware.dll| 15.2.922.13| 169,336| 07-Jul-2021| 10:47| x86 \nMicrosoft.exchange.transport.agent.malware.eventlog.dll| 15.2.922.13| 18,320| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.transport.agent.phishingdetection.dll| 15.2.922.13| 20,856| 07-Jul-2021| 10:06| x86 \nMicrosoft.exchange.transport.agent.prioritization.dll| 15.2.922.13| 31,608| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.transport.agent.protocolanalysis.dbaccess.dll| 15.2.922.13| 46,992| 07-Jul-2021| 10:33| x86 \nMicrosoft.exchange.transport.agent.search.dll| 15.2.922.13| 30,096| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.transport.agent.senderid.core.dll| 15.2.922.13| 53,128| 07-Jul-2021| 10:05| x86 \nMicrosoft.exchange.transport.agent.sharedmailboxsentitemsroutingagent.dll| 15.2.922.13| 44,944| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.transport.agent.systemprobedrop.dll| 15.2.922.13| 18,320| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.transport.agent.transportfeatureoverrideagent.dll| 15.2.922.13| 46,472| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.transport.agent.trustedmailagents.dll| 15.2.922.13| 46,456| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.transport.cloudmonitor.common.dll| 15.2.922.13| 28,048| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.transport.common.dll| 15.2.922.13| 457,080| 07-Jul-2021| 09:58| x86 \nMicrosoft.exchange.transport.contracts.dll| 15.2.922.13| 18,296| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.transport.decisionengine.dll| 15.2.922.13| 30,592| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.transport.dll| 15.2.922.13| 4,183,952| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.transport.dsapiclient.dll| 15.2.922.13| 182,136| 07-Jul-2021| 09:59| x86 \nMicrosoft.exchange.transport.eventlog.dll| 15.2.922.13| 121,720| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.transport.extensibility.dll| 15.2.922.13| 403,848| 07-Jul-2021| 10:02| x86 \nMicrosoft.exchange.transport.extensibilityeventlog.dll| 15.2.922.13| 14,736| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.transport.flighting.dll| 15.2.922.13| 90,000| 07-Jul-2021| 09:34| x86 \nMicrosoft.exchange.transport.logging.dll| 15.2.922.13| 88,960| 07-Jul-2021| 09:59| x86 \nMicrosoft.exchange.transport.logging.search.dll| 15.2.922.13| 68,472| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.transport.loggingcommon.dll| 15.2.922.13| 63,376| 07-Jul-2021| 09:55| x86 \nMicrosoft.exchange.transport.monitoring.dll| 15.2.922.13| 430,480| 07-Jul-2021| 11:47| x86 \nMicrosoft.exchange.transport.net.dll| 15.2.922.13| 122,232| 07-Jul-2021| 10:14| x86 \nMicrosoft.exchange.transport.protocols.contracts.dll| 15.2.922.13| 17,808| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.transport.protocols.dll| 15.2.922.13| 29,056| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.transport.protocols.httpsubmission.dll| 15.2.922.13| 60,792| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.transport.requestbroker.dll| 15.2.922.13| 50,040| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.transport.scheduler.contracts.dll| 15.2.922.13| 33,144| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.transport.scheduler.dll| 15.2.922.13| 113,024| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.transport.smtpshared.dll| 15.2.922.13| 18,296| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.transport.storage.contracts.dll| 15.2.922.13| 52,088| 07-Jul-2021| 10:16| x86 \nMicrosoft.exchange.transport.storage.dll| 15.2.922.13| 675,184| 07-Jul-2021| 10:26| x86 \nMicrosoft.exchange.transport.storage.management.dll| 15.2.922.13| 23,952| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.transport.sync.agents.dll| 15.2.922.13| 17,808| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.transport.sync.common.dll| 15.2.922.13| 487,280| 07-Jul-2021| 10:38| x86 \nMicrosoft.exchange.transport.sync.common.eventlog.dll| 15.2.922.13| 12,680| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.transport.sync.manager.dll| 15.2.922.13| 306,064| 07-Jul-2021| 10:40| x86 \nMicrosoft.exchange.transport.sync.manager.eventlog.dll| 15.2.922.13| 15,760| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.transport.sync.migrationrpc.dll| 15.2.922.13| 46,456| 07-Jul-2021| 10:39| x86 \nMicrosoft.exchange.transport.sync.worker.dll| 15.2.922.13| 1,044,344| 07-Jul-2021| 10:41| x86 \nMicrosoft.exchange.transport.sync.worker.eventlog.dll| 15.2.922.13| 15,224| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.transportlogsearch.eventlog.dll| 15.2.922.13| 18,824| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.transportsyncmanagersvc.exe| 15.2.922.13| 18,832| 07-Jul-2021| 10:42| x86 \nMicrosoft.exchange.um.troubleshootingtool.shared.dll| 15.2.922.13| 118,664| 07-Jul-2021| 09:12| x86 \nMicrosoft.exchange.um.umcommon.dll| 15.2.922.13| 924,560| 07-Jul-2021| 10:32| x86 \nMicrosoft.exchange.um.umcore.dll| 15.2.922.13| 1,469,312| 07-Jul-2021| 10:34| x86 \nMicrosoft.exchange.um.umvariantconfiguration.dll| 15.2.922.13| 32,648| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.unifiedcontent.dll| 15.2.922.13| 41,848| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.unifiedcontent.exchange.dll| 15.2.922.13| 24,976| 07-Jul-2021| 09:56| x86 \nMicrosoft.exchange.unifiedpolicyfilesync.eventlog.dll| 15.2.922.13| 15,248| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.unifiedpolicyfilesyncservicelet.dll| 15.2.922.13| 83,336| 07-Jul-2021| 10:58| x86 \nMicrosoft.exchange.unifiedpolicysyncservicelet.dll| 15.2.922.13| 50,056| 07-Jul-2021| 10:58| x86 \nMicrosoft.exchange.variantconfiguration.antispam.dll| 15.2.922.13| 658,824| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.variantconfiguration.core.dll| 15.2.922.13| 186,256| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.variantconfiguration.dll| 15.2.922.13| 67,464| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.variantconfiguration.eventlog.dll| 15.2.922.13| 12,688| 07-Jul-2021| 09:08| x64 \nMicrosoft.exchange.variantconfiguration.excore.dll| 15.2.922.13| 56,712| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.variantconfiguration.globalsettings.dll| 15.2.922.13| 28,032| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.variantconfiguration.hygiene.dll| 15.2.922.13| 120,712| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.variantconfiguration.protectionservice.dll| 15.2.922.13| 31,624| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.variantconfiguration.threatintel.dll| 15.2.922.13| 57,224| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.webservices.auth.dll| 15.2.922.13| 35,720| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.webservices.dll| 15.2.922.13| 1,054,072| 07-Jul-2021| 08:59| x86 \nMicrosoft.exchange.webservices.xrm.dll| 15.2.922.13| 67,984| 07-Jul-2021| 09:08| x86 \nMicrosoft.exchange.wlmservicelet.dll| 15.2.922.13| 23,424| 07-Jul-2021| 10:27| x86 \nMicrosoft.exchange.wopiclient.dll| 15.2.922.13| 77,176| 07-Jul-2021| 09:10| x86 \nMicrosoft.exchange.workingset.signalapi.dll| 15.2.922.13| 17,296| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.workingsetabstraction.signalapiabstraction.dll| 15.2.922.13| 29,048| 07-Jul-2021| 09:09| x86 \nMicrosoft.exchange.workloadmanagement.dll| 15.2.922.13| 505,208| 07-Jul-2021| 10:10| x86 \nMicrosoft.exchange.workloadmanagement.eventlogs.dll| 15.2.922.13| 14,736| 07-Jul-2021| 09:09| x64 \nMicrosoft.exchange.workloadmanagement.throttling.configuration.dll| 15.2.922.13| 36,744| 07-Jul-2021| 09:33| x86 \nMicrosoft.exchange.workloadmanagement.throttling.dll| 15.2.922.13| 66,424| 07-Jul-2021| 10:14| x86 \nMicrosoft.fast.contextlogger.json.dll| 15.2.922.13| 19,344| 07-Jul-2021| 08:59| x86 \nMicrosoft.filtering.dll| 15.2.922.13| 113,016| 07-Jul-2021| 09:33| x86 \nMicrosoft.filtering.exchange.dll| 15.2.922.13| 57,232| 07-Jul-2021| 10:32| x86 \nMicrosoft.filtering.interop.dll| 15.2.922.13| 15,224| 07-Jul-2021| 09:33| x86 \nMicrosoft.forefront.activedirectoryconnector.dll| 15.2.922.13| 46,992| 07-Jul-2021| 09:55| x86 \nMicrosoft.forefront.activedirectoryconnector.eventlog.dll| 15.2.922.13| 15,752| 07-Jul-2021| 09:09| x64 \nMicrosoft.forefront.filtering.common.dll| 15.2.922.13| 23,952| 07-Jul-2021| 09:09| x86 \nMicrosoft.forefront.filtering.diagnostics.dll| 15.2.922.13| 22,400| 07-Jul-2021| 08:59| x86 \nMicrosoft.forefront.filtering.eventpublisher.dll| 15.2.922.13| 34,696| 07-Jul-2021| 09:08| x86 \nMicrosoft.forefront.management.powershell.format.ps1xml| Not applicable| 48,890| 07-Jul-2021| 11:11| Not applicable \nMicrosoft.forefront.management.powershell.types.ps1xml| Not applicable| 16,270| 07-Jul-2021| 11:11| Not applicable \nMicrosoft.forefront.monitoring.activemonitoring.local.components.dll| 15.2.922.13| 1,518,480| 07-Jul-2021| 11:49| x86 \nMicrosoft.forefront.monitoring.activemonitoring.local.components.messages.dll| 15.2.922.13| 13,192| 07-Jul-2021| 09:09| x64 \nMicrosoft.forefront.monitoring.management.outsidein.dll| 15.2.922.13| 33,168| 07-Jul-2021| 11:32| x86 \nMicrosoft.forefront.recoveryactionarbiter.contract.dll| 15.2.922.13| 18,320| 07-Jul-2021| 08:58| x86 \nMicrosoft.forefront.reporting.common.dll| 15.2.922.13| 46,456| 07-Jul-2021| 10:32| x86 \nMicrosoft.forefront.reporting.ondemandquery.dll| 15.2.922.13| 50,568| 07-Jul-2021| 10:32| x86 \nMicrosoft.isam.esent.collections.dll| 15.2.922.13| 72,592| 07-Jul-2021| 09:34| x86 \nMicrosoft.isam.esent.interop.dll| 15.2.922.13| 541,584| 07-Jul-2021| 09:11| x86 \nMicrosoft.managementgui.dll| 15.2.922.13| 133,504| 07-Jul-2021| 08:59| x86 \nMicrosoft.mce.interop.dll| 15.2.922.13| 24,464| 07-Jul-2021| 08:59| x86 \nMicrosoft.office.audit.dll| 15.2.922.13| 124,816| 07-Jul-2021| 08:59| x86 \nMicrosoft.office.client.discovery.unifiedexport.dll| 15.2.922.13| 593,272| 07-Jul-2021| 09:34| x86 \nMicrosoft.office.common.ipcommonlogger.dll| 15.2.922.13| 42,376| 07-Jul-2021| 09:33| x86 \nMicrosoft.office.compliance.console.core.dll| 15.2.922.13| 218,000| 07-Jul-2021| 12:46| x86 \nMicrosoft.office.compliance.console.dll| 15.2.922.13| 854,904| 07-Jul-2021| 13:15| x86 \nMicrosoft.office.compliance.console.extensions.dll| 15.2.922.13| 485,752| 07-Jul-2021| 12:51| x86 \nMicrosoft.office.compliance.core.dll| 15.2.922.13| 413,056| 07-Jul-2021| 09:34| x86 \nMicrosoft.office.compliance.ingestion.dll| 15.2.922.13| 36,232| 07-Jul-2021| 09:33| x86 \nMicrosoft.office.compliancepolicy.exchange.dar.dll| 15.2.922.13| 85,368| 07-Jul-2021| 10:27| x86 \nMicrosoft.office.compliancepolicy.platform.dll| 15.2.922.13| 1,782,160| 07-Jul-2021| 09:10| x86 \nMicrosoft.office.datacenter.activemonitoring.management.common.dll| 15.2.922.13| 49,528| 07-Jul-2021| 10:26| x86 \nMicrosoft.office.datacenter.activemonitoring.management.dll| 15.2.922.13| 27,528| 07-Jul-2021| 10:32| x86 \nMicrosoft.office.datacenter.activemonitoringlocal.dll| 15.2.922.13| 174,984| 07-Jul-2021| 09:34| x86 \nMicrosoft.office.datacenter.monitoring.activemonitoring.recovery.dll| 15.2.922.13| 165,776| 07-Jul-2021| 09:58| x86 \nMicrosoft.office365.datainsights.uploader.dll| 15.2.922.13| 40,336| 07-Jul-2021| 08:59| x86 \nMicrosoft.online.box.shell.dll| 15.2.922.13| 46,456| 07-Jul-2021| 08:59| x86 \nMicrosoft.powershell.hostingtools.dll| 15.2.922.13| 67,984| 07-Jul-2021| 08:59| x86 \nMicrosoft.powershell.hostingtools_2.dll| 15.2.922.13| 67,984| 07-Jul-2021| 08:59| x86 \nMicrosoft.tailoredexperiences.core.dll| 15.2.922.13| 120,184| 07-Jul-2021| 09:33| x86 \nMigrateumcustomprompts.ps1| Not applicable| 19,142| 07-Jul-2021| 09:10| Not applicable \nModernpublicfoldertomailboxmapgenerator.ps1| Not applicable| 29,084| 07-Jul-2021| 09:10| Not applicable \nMovemailbox.ps1| Not applicable| 61,180| 07-Jul-2021| 09:10| Not applicable \nMovetransportdatabase.ps1| Not applicable| 30,622| 07-Jul-2021| 09:10| Not applicable \nMove_publicfolderbranch.ps1| Not applicable| 17,552| 07-Jul-2021| 09:10| Not applicable \nMpgearparser.dll| 15.2.922.13| 99,720| 07-Jul-2021| 09:09| x64 \nMsclassificationadapter.dll| 15.2.922.13| 248,712| 07-Jul-2021| 09:08| x64 \nMsexchangecompliance.exe| 15.2.922.13| 78,712| 07-Jul-2021| 10:49| x86 \nMsexchangedagmgmt.exe| 15.2.922.13| 25,480| 07-Jul-2021| 10:38| x86 \nMsexchangedelivery.exe| 15.2.922.13| 38,800| 07-Jul-2021| 10:36| x86 \nMsexchangefrontendtransport.exe| 15.2.922.13| 31,608| 07-Jul-2021| 10:32| x86 \nMsexchangehmhost.exe| 15.2.922.13| 27,024| 07-Jul-2021| 11:49| x86 \nMsexchangehmrecovery.exe| 15.2.922.13| 29,560| 07-Jul-2021| 09:56| x86 \nMsexchangemailboxassistants.exe| 15.2.922.13| 72,568| 07-Jul-2021| 10:34| x86 \nMsexchangemailboxreplication.exe| 15.2.922.13| 20,864| 07-Jul-2021| 10:46| x86 \nMsexchangemigrationworkflow.exe| 15.2.922.13| 69,000| 07-Jul-2021| 10:50| x86 \nMsexchangerepl.exe| 15.2.922.13| 71,032| 07-Jul-2021| 10:37| x86 \nMsexchangesubmission.exe| 15.2.922.13| 123,256| 07-Jul-2021| 10:43| x86 \nMsexchangethrottling.exe| 15.2.922.13| 39,808| 07-Jul-2021| 09:55| x86 \nMsexchangetransport.exe| 15.2.922.13| 74,120| 07-Jul-2021| 09:55| x86 \nMsexchangetransportlogsearch.exe| 15.2.922.13| 139,152| 07-Jul-2021| 10:32| x86 \nMsexchangewatchdog.exe| 15.2.922.13| 55,688| 07-Jul-2021| 09:09| x64 \nMspatchlinterop.dll| 15.2.922.13| 53,640| 07-Jul-2021| 09:12| x64 \nNativehttpproxy.dll| 15.2.922.13| 91,536| 07-Jul-2021| 09:09| x64 \nNavigatorparser.dll| 15.2.922.13| 636,808| 07-Jul-2021| 09:08| x64 \nNego2nativeinterface.dll| 15.2.922.13| 19,328| 07-Jul-2021| 09:09| x64 \nNegotiateclientcertificatemodule.dll| 15.2.922.13| 30,072| 07-Jul-2021| 09:08| x64 \nNewtestcasconnectivityuser.ps1| Not applicable| 19,784| 07-Jul-2021| 09:10| Not applicable \nNewtestcasconnectivityuserhosting.ps1| Not applicable| 24,599| 07-Jul-2021| 09:10| Not applicable \nNtspxgen.dll| 15.2.922.13| 80,784| 07-Jul-2021| 09:09| x64 \nOleconverter.exe| 15.2.922.13| 173,968| 07-Jul-2021| 09:09| x64 \nOutsideinmodule.dll| 15.2.922.13| 87,952| 07-Jul-2021| 09:09| x64 \nOwaauth.dll| 15.2.922.13| 92,048| 07-Jul-2021| 09:08| x64 \nPerf_common_extrace.dll| 15.2.922.13| 245,112| 07-Jul-2021| 08:59| x64 \nPerf_exchmem.dll| 15.2.922.13| 86,408| 07-Jul-2021| 09:08| x64 \nPipeline2.dll| 15.2.922.13| 1,454,472| 07-Jul-2021| 09:34| x64 \nPreparemoverequesthosting.ps1| Not applicable| 71,015| 07-Jul-2021| 09:10| Not applicable \nPrepare_moverequest.ps1| Not applicable| 73,249| 07-Jul-2021| 09:10| Not applicable \nProductinfo.managed.dll| 15.2.922.13| 27,024| 07-Jul-2021| 08:59| x86 \nProxybinclientsstringsdll| 15.2.922.13| 924,552| 07-Jul-2021| 09:09| x86 \nPublicfoldertomailboxmapgenerator.ps1| Not applicable| 23,258| 07-Jul-2021| 09:10| Not applicable \nQuietexe.exe| 15.2.922.13| 14,736| 07-Jul-2021| 09:09| x86 \nRedistributeactivedatabases.ps1| Not applicable| 250,524| 07-Jul-2021| 09:09| Not applicable \nReinstalldefaulttransportagents.ps1| Not applicable| 21,675| 07-Jul-2021| 11:05| Not applicable \nRemoteexchange.ps1| Not applicable| 23,573| 07-Jul-2021| 11:10| Not applicable \nRemoveuserfrompfrecursive.ps1| Not applicable| 14,704| 07-Jul-2021| 09:10| Not applicable \nReplaceuserpermissiononpfrecursive.ps1| Not applicable| 15,022| 07-Jul-2021| 09:10| Not applicable \nReplaceuserwithuseronpfrecursive.ps1| Not applicable| 15,032| 07-Jul-2021| 09:10| Not applicable \nReplaycrimsonmsg.dll| 15.2.922.13| 1,104,776| 07-Jul-2021| 08:59| x64 \nResetattachmentfilterentry.ps1| Not applicable| 15,496| 07-Jul-2021| 11:05| Not applicable \nResetcasservice.ps1| Not applicable| 21,707| 07-Jul-2021| 09:10| Not applicable \nReset_antispamupdates.ps1| Not applicable| 14,081| 07-Jul-2021| 09:09| Not applicable \nRestoreserveronprereqfailure.ps1| Not applicable| 15,161| 07-Jul-2021| 09:34| Not applicable \nResumemailboxdatabasecopy.ps1| Not applicable| 17,230| 07-Jul-2021| 09:09| Not applicable \nRightsmanagementwrapper.dll| 15.2.922.13| 86,392| 07-Jul-2021| 09:10| x64 \nRollalternateserviceaccountpassword.ps1| Not applicable| 55,810| 07-Jul-2021| 09:10| Not applicable \nRpcperf.dll| 15.2.922.13| 23,440| 07-Jul-2021| 09:09| x64 \nRpcproxyshim.dll| 15.2.922.13| 39,288| 07-Jul-2021| 09:10| x64 \nRulesauditmsg.dll| 15.2.922.13| 12,672| 07-Jul-2021| 09:11| x64 \nSafehtmlnativewrapper.dll| 15.2.922.13| 34,680| 07-Jul-2021| 09:09| x64 \nScanenginetest.exe| 15.2.922.13| 956,304| 07-Jul-2021| 09:10| x64 \nScanningprocess.exe| 15.2.922.13| 739,216| 07-Jul-2021| 09:34| x64 \nSearchdiagnosticinfo.ps1| Not applicable| 16,832| 07-Jul-2021| 09:10| Not applicable \nServicecontrol.ps1| Not applicable| 52,349| 07-Jul-2021| 09:33| Not applicable \nSetmailpublicfolderexternaladdress.ps1| Not applicable| 20,774| 07-Jul-2021| 09:10| Not applicable \nSettingsadapter.dll| 15.2.922.13| 116,104| 07-Jul-2021| 09:08| x64 \nSetup.exe| 15.2.922.13| 20,368| 07-Jul-2021| 09:33| x86 \nSetupui.exe| 15.2.922.13| 188,288| 07-Jul-2021| 11:04| x86 \nSplit_publicfoldermailbox.ps1| Not applicable| 52,209| 07-Jul-2021| 09:10| Not applicable \nStartdagservermaintenance.ps1| Not applicable| 27,867| 07-Jul-2021| 09:08| Not applicable \nStatisticsutil.dll| 15.2.922.13| 142,224| 07-Jul-2021| 09:10| x64 \nStopdagservermaintenance.ps1| Not applicable| 21,133| 07-Jul-2021| 09:08| Not applicable \nStoretsconstants.ps1| Not applicable| 15,850| 07-Jul-2021| 09:10| Not applicable \nStoretslibrary.ps1| Not applicable| 28,023| 07-Jul-2021| 09:10| Not applicable \nStore_mapi_net_bin_perf_x64_exrpcperf.dll| 15.2.922.13| 28,536| 07-Jul-2021| 09:09| x64 \nSync_mailpublicfolders.ps1| Not applicable| 43,947| 07-Jul-2021| 09:10| Not applicable \nSync_modernmailpublicfolders.ps1| Not applicable| 43,993| 07-Jul-2021| 09:10| Not applicable \nTextconversionmodule.dll| 15.2.922.13| 86,392| 07-Jul-2021| 09:09| x64 \nTroubleshoot_ci.ps1| Not applicable| 22,747| 07-Jul-2021| 09:10| Not applicable \nTroubleshoot_databaselatency.ps1| Not applicable| 33,453| 07-Jul-2021| 09:10| Not applicable \nTroubleshoot_databasespace.ps1| Not applicable| 30,049| 07-Jul-2021| 09:10| Not applicable \nUninstall_antispamagents.ps1| Not applicable| 15,453| 07-Jul-2021| 09:08| Not applicable \nUpdateapppoolmanagedframeworkversion.ps1| Not applicable| 14,010| 07-Jul-2021| 09:10| Not applicable \nUpdatecas.ps1| Not applicable| 38,193| 07-Jul-2021| 09:33| Not applicable \nUpdateconfigfiles.ps1| Not applicable| 19,742| 07-Jul-2021| 09:34| Not applicable \nUpdateserver.exe| 15.2.922.13| 3,014,520| 07-Jul-2021| 09:34| x64 \nUpdate_malwarefilteringserver.ps1| Not applicable| 18,156| 07-Jul-2021| 09:10| Not applicable \nWeb.config_053c31bdd6824e95b35d61b0a5e7b62d| Not applicable| 32,046| 07-Jul-2021| 12:41| Not applicable \nWsbexchange.exe| 15.2.922.13| 125,320| 07-Jul-2021| 09:12| x64 \nX400prox.dll| 15.2.922.13| 103,312| 07-Jul-2021| 09:08| x64 \n_search.lingoperators.a| 15.2.922.13| 34,704| 07-Jul-2021| 10:16| Not applicable \n_search.lingoperators.b| 15.2.922.13| 34,704| 07-Jul-2021| 10:16| Not applicable \n_search.mailboxoperators.a| 15.2.922.13| 290,192| 07-Jul-2021| 10:40| Not applicable \n_search.mailboxoperators.b| 15.2.922.13| 290,192| 07-Jul-2021| 10:40| Not applicable \n_search.operatorschema.a| 15.2.922.13| 485,752| 07-Jul-2021| 09:59| Not applicable \n_search.operatorschema.b| 15.2.922.13| 485,752| 07-Jul-2021| 09:59| Not applicable \n_search.tokenoperators.a| 15.2.922.13| 113,528| 07-Jul-2021| 10:14| Not applicable \n_search.tokenoperators.b| 15.2.922.13| 113,528| 07-Jul-2021| 10:14| Not applicable \n_search.transportoperators.a| 15.2.922.13| 67,984| 07-Jul-2021| 10:44| Not applicable \n_search.transportoperators.b| 15.2.922.13| 67,984| 07-Jul-2021| 10:44| Not applicable \n \n### \n\n__\n\nMicrosoft Exchange Server 2019 Cumulative Update 9\n\nFile name| File version| File size| Date| Time| Platform \n---|---|---|---|---|--- \nActivemonitoringeventmsg.dll| 15.2.858.15| 71,032| 08-Jul-2021| 21:42| x64 \nActivemonitoringexecutionlibrary.ps1| Not applicable| 29,502| 08-Jul-2021| 21:42| Not applicable \nAdduserstopfrecursive.ps1| Not applicable| 14,953| 08-Jul-2021| 21:48| Not applicable \nAdemodule.dll| 15.2.858.15| 106,376| 08-Jul-2021| 21:48| x64 \nAirfilter.dll| 15.2.858.15| 42,888| 08-Jul-2021| 21:48| x64 \nAjaxcontroltoolkit.dll| 15.2.858.15| 92,536| 08-Jul-2021| 21:42| x86 \nAntispamcommon.ps1| Not applicable| 13,501| 08-Jul-2021| 21:42| Not applicable \nAsdat.msi| Not applicable| 5,087,232| 08-Jul-2021| 21:49| Not applicable \nAsentirs.msi| Not applicable| 77,824| 08-Jul-2021| 21:42| Not applicable \nAsentsig.msi| Not applicable| 73,728| 08-Jul-2021| 21:49| Not applicable \nBigfunnel.bondtypes.dll| 15.2.858.15| 45,432| 08-Jul-2021| 21:43| x86 \nBigfunnel.common.dll| 15.2.858.15| 66,448| 08-Jul-2021| 21:42| x86 \nBigfunnel.configuration.dll| 15.2.858.15| 118,136| 08-Jul-2021| 21:51| x86 \nBigfunnel.entropy.dll| 15.2.858.15| 44,432| 08-Jul-2021| 21:43| x86 \nBigfunnel.filter.dll| 15.2.858.15| 54,136| 08-Jul-2021| 21:42| x86 \nBigfunnel.indexstream.dll| 15.2.858.15| 69,008| 08-Jul-2021| 21:42| x86 \nBigfunnel.neuraltree.dll| Not applicable| 694,160| 08-Jul-2021| 21:42| x64 \nBigfunnel.neuraltreeranking.dll| 15.2.858.15| 19,856| 08-Jul-2021| 21:48| x86 \nBigfunnel.poi.dll| 15.2.858.15| 245,112| 08-Jul-2021| 21:42| x86 \nBigfunnel.postinglist.dll| 15.2.858.15| 189,320| 08-Jul-2021| 21:48| x86 \nBigfunnel.query.dll| 15.2.858.15| 101,264| 08-Jul-2021| 21:42| x86 \nBigfunnel.ranking.dll| 15.2.858.15| 109,456| 08-Jul-2021| 21:47| x86 \nBigfunnel.syntheticdatalib.dll| 15.2.858.15| 3,634,552| 08-Jul-2021| 21:48| x86 \nBigfunnel.tracing.dll| 15.2.858.15| 42,888| 08-Jul-2021| 21:42| x86 \nBigfunnel.wordbreakers.dll| 15.2.858.15| 46,456| 08-Jul-2021| 21:48| x86 \nCafe_airfilter_dll| 15.2.858.15| 42,888| 08-Jul-2021| 21:48| x64 \nCafe_exppw_dll| 15.2.858.15| 83,336| 08-Jul-2021| 21:48| x64 \nCafe_owaauth_dll| 15.2.858.15| 92,024| 08-Jul-2021| 21:47| x64 \nCalcalculation.ps1| Not applicable| 42,089| 08-Jul-2021| 22:12| Not applicable \nCheckdatabaseredundancy.ps1| Not applicable| 94,602| 08-Jul-2021| 21:47| Not applicable \nChksgfiles.dll| 15.2.858.15| 57,208| 08-Jul-2021| 21:48| x64 \nCitsconstants.ps1| Not applicable| 15,837| 08-Jul-2021| 21:48| Not applicable \nCitslibrary.ps1| Not applicable| 82,656| 08-Jul-2021| 21:48| Not applicable \nCitstypes.ps1| Not applicable| 14,476| 08-Jul-2021| 21:48| Not applicable \nClassificationengine_mce| 15.2.858.15| 1,693,072| 08-Jul-2021| 21:42| Not applicable \nClusmsg.dll| 15.2.858.15| 134,008| 08-Jul-2021| 21:42| x64 \nCoconet.dll| 15.2.858.15| 48,008| 08-Jul-2021| 21:42| x64 \nCollectovermetrics.ps1| Not applicable| 81,640| 08-Jul-2021| 21:48| Not applicable \nCollectreplicationmetrics.ps1| Not applicable| 41,894| 08-Jul-2021| 21:48| Not applicable \nCommonconnectfunctions.ps1| Not applicable| 29,963| 08-Jul-2021| 23:31| Not applicable \nComplianceauditservice.exe| 15.2.858.15| 39,824| 08-Jul-2021| 23:37| x86 \nConfigureadam.ps1| Not applicable| 22,788| 08-Jul-2021| 21:47| Not applicable \nConfigurecaferesponseheaders.ps1| Not applicable| 20,304| 08-Jul-2021| 21:47| Not applicable \nConfigurecryptodefaults.ps1| Not applicable| 42,035| 08-Jul-2021| 22:11| Not applicable \nConfigurenetworkprotocolparameters.ps1| Not applicable| 19,766| 08-Jul-2021| 21:48| Not applicable \nConfiguresmbipsec.ps1| Not applicable| 39,852| 08-Jul-2021| 21:48| Not applicable \nConfigure_enterprisepartnerapplication.ps1| Not applicable| 22,279| 08-Jul-2021| 21:48| Not applicable \nConnectfunctions.ps1| Not applicable| 37,157| 08-Jul-2021| 23:32| Not applicable \nConnect_exchangeserver_help.xml| Not applicable| 30,412| 08-Jul-2021| 23:32| Not applicable \nConsoleinitialize.ps1| Not applicable| 24,244| 08-Jul-2021| 23:21| Not applicable \nConvertoabvdir.ps1| Not applicable| 20,049| 08-Jul-2021| 21:48| Not applicable \nConverttomessagelatency.ps1| Not applicable| 14,524| 08-Jul-2021| 21:48| Not applicable \nConvert_distributiongrouptounifiedgroup.ps1| Not applicable| 34,789| 08-Jul-2021| 21:48| Not applicable \nCreate_publicfoldermailboxesformigration.ps1| Not applicable| 27,944| 08-Jul-2021| 21:48| Not applicable \nCts.14.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts.14.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts.14.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts.14.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts.14.4.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts.15.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts.15.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts.15.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts.15.20.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts.8.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts.8.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts.8.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts_exsmime.dll| 15.2.858.15| 380,816| 08-Jul-2021| 21:43| x64 \nCts_microsoft.exchange.data.common.dll| 15.2.858.15| 1,686,912| 08-Jul-2021| 21:42| x86 \nCts_microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 509| 08-Jul-2021| 21:37| Not applicable \nCts_policy.14.0.microsoft.exchange.data.common.dll| 15.2.858.15| 12,664| 08-Jul-2021| 21:48| x86 \nCts_policy.14.1.microsoft.exchange.data.common.dll| 15.2.858.15| 12,672| 08-Jul-2021| 21:48| x86 \nCts_policy.14.2.microsoft.exchange.data.common.dll| 15.2.858.15| 12,680| 08-Jul-2021| 21:42| x86 \nCts_policy.14.3.microsoft.exchange.data.common.dll| 15.2.858.15| 12,688| 08-Jul-2021| 21:48| x86 \nCts_policy.14.4.microsoft.exchange.data.common.dll| 15.2.858.15| 12,664| 08-Jul-2021| 21:48| x86 \nCts_policy.15.0.microsoft.exchange.data.common.dll| 15.2.858.15| 12,680| 08-Jul-2021| 21:48| x86 \nCts_policy.15.1.microsoft.exchange.data.common.dll| 15.2.858.15| 12,688| 08-Jul-2021| 21:42| x86 \nCts_policy.15.2.microsoft.exchange.data.common.dll| 15.2.858.15| 12,664| 08-Jul-2021| 21:42| x86 \nCts_policy.15.20.microsoft.exchange.data.common.dll| 15.2.858.15| 12,688| 08-Jul-2021| 21:48| x86 \nCts_policy.8.0.microsoft.exchange.data.common.dll| 15.2.858.15| 12,680| 08-Jul-2021| 21:42| x86 \nCts_policy.8.1.microsoft.exchange.data.common.dll| 15.2.858.15| 12,680| 08-Jul-2021| 21:42| x86 \nCts_policy.8.2.microsoft.exchange.data.common.dll| 15.2.858.15| 12,664| 08-Jul-2021| 21:48| x86 \nCts_policy.8.3.microsoft.exchange.data.common.dll| 15.2.858.15| 12,664| 08-Jul-2021| 21:48| x86 \nDagcommonlibrary.ps1| Not applicable| 60,222| 08-Jul-2021| 21:48| Not applicable \nDependentassemblygenerator.exe| 15.2.858.15| 22,400| 08-Jul-2021| 21:48| x86 \nDiaghelper.dll| 15.2.858.15| 66,960| 08-Jul-2021| 21:42| x86 \nDiagnosticscriptcommonlibrary.ps1| Not applicable| 16,366| 08-Jul-2021| 21:48| Not applicable \nDisableinmemorytracing.ps1| Not applicable| 13,358| 08-Jul-2021| 21:48| Not applicable \nDisable_antimalwarescanning.ps1| Not applicable| 15,221| 08-Jul-2021| 21:48| Not applicable \nDisable_outsidein.ps1| Not applicable| 13,650| 08-Jul-2021| 21:48| Not applicable \nDisklockerapi.dll| Not applicable| 22,392| 08-Jul-2021| 21:48| x64 \nDlmigrationmodule.psm1| Not applicable| 39,572| 08-Jul-2021| 21:48| Not applicable \nDsaccessperf.dll| 15.2.858.15| 45,944| 08-Jul-2021| 21:42| x64 \nDscperf.dll| 15.2.858.15| 32,656| 08-Jul-2021| 21:48| x64 \nDup_cts_microsoft.exchange.data.common.dll| 15.2.858.15| 1,686,912| 08-Jul-2021| 21:42| x86 \nDup_ext_microsoft.exchange.data.transport.dll| 15.2.858.15| 601,464| 08-Jul-2021| 22:11| x86 \nEcpperfcounters.xml| Not applicable| 31,136| 08-Jul-2021| 21:48| Not applicable \nEdgeextensibility_microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEdgeextensibility_policy.8.0.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,680| 08-Jul-2021| 21:48| x86 \nEdgetransport.exe| 15.2.858.15| 49,552| 08-Jul-2021| 22:50| x86 \nEext.14.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext.14.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext.14.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext.14.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext.14.4.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext.15.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext.15.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext.15.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext.15.20.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext.8.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext.8.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext.8.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 512| 08-Jul-2021| 21:37| Not applicable \nEext_policy.14.0.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,680| 08-Jul-2021| 21:42| x86 \nEext_policy.14.1.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,664| 08-Jul-2021| 21:42| x86 \nEext_policy.14.2.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,688| 08-Jul-2021| 21:48| x86 \nEext_policy.14.3.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,688| 08-Jul-2021| 21:48| x86 \nEext_policy.14.4.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,664| 08-Jul-2021| 21:48| x86 \nEext_policy.15.0.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,688| 08-Jul-2021| 21:48| x86 \nEext_policy.15.1.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,680| 08-Jul-2021| 21:48| x86 \nEext_policy.15.2.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,680| 08-Jul-2021| 21:42| x86 \nEext_policy.15.20.microsoft.exchange.data.transport.dll| 15.2.858.15| 13,200| 08-Jul-2021| 21:48| x86 \nEext_policy.8.1.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,664| 08-Jul-2021| 21:49| x86 \nEext_policy.8.2.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,664| 08-Jul-2021| 21:48| x86 \nEext_policy.8.3.microsoft.exchange.data.transport.dll| 15.2.858.15| 12,680| 08-Jul-2021| 21:48| x86 \nEnableinmemorytracing.ps1| Not applicable| 13,388| 08-Jul-2021| 21:48| Not applicable \nEnable_antimalwarescanning.ps1| Not applicable| 17,555| 08-Jul-2021| 21:48| Not applicable \nEnable_basicauthtooauthconverterhttpmodule.ps1| Not applicable| 18,620| 08-Jul-2021| 21:48| Not applicable \nEnable_crossforestconnector.ps1| Not applicable| 18,622| 08-Jul-2021| 21:48| Not applicable \nEnable_outlookcertificateauthentication.ps1| Not applicable| 22,908| 08-Jul-2021| 21:48| Not applicable \nEnable_outsidein.ps1| Not applicable| 13,643| 08-Jul-2021| 21:48| Not applicable \nEngineupdateserviceinterfaces.dll| 15.2.858.15| 17,800| 08-Jul-2021| 21:48| x86 \nEscprint.dll| 15.2.858.15| 20,344| 08-Jul-2021| 21:42| x64 \nEse.dll| 15.2.858.15| 3,741,584| 08-Jul-2021| 21:42| x64 \nEseback2.dll| 15.2.858.15| 350,072| 08-Jul-2021| 21:48| x64 \nEsebcli2.dll| 15.2.858.15| 318,344| 08-Jul-2021| 21:42| x64 \nEseperf.dll| 15.2.858.15| 108,920| 08-Jul-2021| 21:48| x64 \nEseutil.exe| 15.2.858.15| 425,360| 08-Jul-2021| 21:48| x64 \nEsevss.dll| 15.2.858.15| 44,432| 08-Jul-2021| 21:48| x64 \nEtweseproviderresources.dll| 15.2.858.15| 101,256| 08-Jul-2021| 21:42| x64 \nEventperf.dll| 15.2.858.15| 59,792| 08-Jul-2021| 21:42| x64 \nExchange.depthtwo.types.ps1xml| Not applicable| 40,105| 08-Jul-2021| 23:31| Not applicable \nExchange.format.ps1xml| Not applicable| 649,717| 08-Jul-2021| 23:31| Not applicable \nExchange.partial.types.ps1xml| Not applicable| 44,362| 08-Jul-2021| 23:31| Not applicable \nExchange.ps1| Not applicable| 20,823| 08-Jul-2021| 23:32| Not applicable \nExchange.support.format.ps1xml| Not applicable| 26,531| 08-Jul-2021| 23:23| Not applicable \nExchange.types.ps1xml| Not applicable| 365,145| 08-Jul-2021| 23:31| Not applicable \nExchangeudfcommon.dll| 15.2.858.15| 122,760| 08-Jul-2021| 21:42| x86 \nExchangeudfs.dll| 15.2.858.15| 272,760| 08-Jul-2021| 21:48| x86 \nExchmem.dll| 15.2.858.15| 86,408| 08-Jul-2021| 21:42| x64 \nExchsetupmsg.dll| 15.2.858.15| 19,344| 08-Jul-2021| 21:43| x64 \nExdbfailureitemapi.dll| Not applicable| 27,024| 08-Jul-2021| 21:42| x64 \nExdbmsg.dll| 15.2.858.15| 230,776| 08-Jul-2021| 21:48| x64 \nExeventperfplugin.dll| 15.2.858.15| 25,480| 08-Jul-2021| 21:48| x64 \nExmime.dll| 15.2.858.15| 364,928| 08-Jul-2021| 21:48| x64 \nExportedgeconfig.ps1| Not applicable| 27,387| 08-Jul-2021| 21:48| Not applicable \nExport_mailpublicfoldersformigration.ps1| Not applicable| 18,550| 08-Jul-2021| 21:48| Not applicable \nExport_modernpublicfolderstatistics.ps1| Not applicable| 29,238| 08-Jul-2021| 21:48| Not applicable \nExport_outlookclassification.ps1| Not applicable| 14,390| 08-Jul-2021| 21:48| Not applicable \nExport_publicfolderstatistics.ps1| Not applicable| 23,157| 08-Jul-2021| 21:48| Not applicable \nExport_retentiontags.ps1| Not applicable| 17,040| 08-Jul-2021| 21:47| Not applicable \nExppw.dll| 15.2.858.15| 83,336| 08-Jul-2021| 21:48| x64 \nExprfdll.dll| 15.2.858.15| 26,512| 08-Jul-2021| 21:42| x64 \nExrpc32.dll| 15.2.858.15| 2,029,448| 08-Jul-2021| 21:48| x64 \nExrw.dll| 15.2.858.15| 28,024| 08-Jul-2021| 21:42| x64 \nExsetdata.dll| 15.2.858.15| 2,779,528| 08-Jul-2021| 21:48| x64 \nExsetup.exe| 15.2.858.15| 35,192| 08-Jul-2021| 23:26| x86 \nExsetupui.exe| 15.2.858.15| 471,944| 08-Jul-2021| 23:26| x86 \nExtrace.dll| 15.2.858.15| 245,112| 08-Jul-2021| 21:42| x64 \nExt_microsoft.exchange.data.transport.dll| 15.2.858.15| 601,464| 08-Jul-2021| 22:11| x86 \nExwatson.dll| 15.2.858.15| 44,944| 08-Jul-2021| 21:42| x64 \nFastioext.dll| 15.2.858.15| 60,304| 08-Jul-2021| 21:48| x64 \nFil06f84122c94c91a0458cad45c22cce20| Not applicable| 784,631| 09-Jul-2021| 01:03| Not applicable \nFil143a7a5d4894478a85eefc89a6539fc8| Not applicable| 1,909,228| 09-Jul-2021| 01:03| Not applicable \nFil19f527f284a0bb584915f9994f4885c3| Not applicable| 648,760| 09-Jul-2021| 01:03| Not applicable \nFil1a9540363a531e7fb18ffe600cffc3ce| Not applicable| 358,405| 09-Jul-2021| 01:03| Not applicable \nFil220d95210c8697448312eee6628c815c| Not applicable| 303,657| 09-Jul-2021| 01:03| Not applicable \nFil2cf5a31e239a45fabea48687373b547c| Not applicable| 652,759| 09-Jul-2021| 01:03| Not applicable \nFil397f0b1f1d7bd44d6e57e496decea2ec| Not applicable| 784,628| 09-Jul-2021| 01:03| Not applicable \nFil3ab126057b34eee68c4fd4b127ff7aee| Not applicable| 784,604| 09-Jul-2021| 01:03| Not applicable \nFil41bb2e5743e3bde4ecb1e07a76c5a7a8| Not applicable| 149,154| 09-Jul-2021| 01:03| Not applicable \nFil51669bfbda26e56e3a43791df94c1e9c| Not applicable| 9,345| 09-Jul-2021| 01:03| Not applicable \nFil558cb84302edfc96e553bcfce2b85286| Not applicable| 85,259| 09-Jul-2021| 01:03| Not applicable \nFil55ce217251b77b97a46e914579fc4c64| Not applicable| 648,754| 09-Jul-2021| 01:03| Not applicable \nFil5a9e78a51a18d05bc36b5e8b822d43a8| Not applicable| 1,596,145| 09-Jul-2021| 01:03| Not applicable \nFil5c7d10e5f1f9ada1e877c9aa087182a9| Not applicable| 1,596,145| 09-Jul-2021| 01:03| Not applicable \nFil6569a92c80a1e14949e4282ae2cc699c| Not applicable| 1,596,145| 09-Jul-2021| 01:03| Not applicable \nFil6a01daba551306a1e55f0bf6894f4d9f| Not applicable| 648,730| 09-Jul-2021| 01:03| Not applicable \nFil8863143ea7cd93a5f197c9fff13686bf| Not applicable| 648,760| 09-Jul-2021| 01:03| Not applicable \nFil8a8c76f225c7205db1000e8864c10038| Not applicable| 1,596,145| 09-Jul-2021| 01:03| Not applicable \nFil8cd999415d36ba78a3ac16a080c47458| Not applicable| 784,634| 09-Jul-2021| 01:03| Not applicable \nFil97913e630ff02079ce9889505a517ec0| Not applicable| 1,596,145| 09-Jul-2021| 01:03| Not applicable \nFilaa49badb2892075a28d58d06560f8da2| Not applicable| 785,658| 09-Jul-2021| 01:03| Not applicable \nFilae28aeed23ccb4b9b80accc2d43175b5| Not applicable| 648,757| 09-Jul-2021| 01:03| Not applicable \nFilb17f496f9d880a684b5c13f6b02d7203| Not applicable| 784,634| 09-Jul-2021| 01:03| Not applicable \nFilb94ca32f2654692263a5be009c0fe4ca| Not applicable| 2,564,949| 09-Jul-2021| 01:03| Not applicable \nFilbabdc4808eba0c4f18103f12ae955e5c| Not applicable| 342,803,074| 09-Jul-2021| 01:03| Not applicable \nFilc92cf2bf29bed21bd5555163330a3d07| Not applicable| 652,777| 09-Jul-2021| 01:03| Not applicable \nFilcc478d2a8346db20c4e2dc36f3400628| Not applicable| 784,634| 09-Jul-2021| 01:03| Not applicable \nFild26cd6b13cfe2ec2a16703819da6d043| Not applicable| 1,596,145| 09-Jul-2021| 01:03| Not applicable \nFilf2719f9dc8f7b74df78ad558ad3ee8a6| Not applicable| 785,640| 09-Jul-2021| 01:03| Not applicable \nFilfa5378dc76359a55ef20cc34f8a23fee| Not applicable| 1,427,187| 09-Jul-2021| 01:03| Not applicable \nFilteringconfigurationcommands.ps1| Not applicable| 18,263| 08-Jul-2021| 21:48| Not applicable \nFilteringpowershell.dll| 15.2.858.15| 223,112| 08-Jul-2021| 21:51| x86 \nFilteringpowershell.format.ps1xml| Not applicable| 29,648| 08-Jul-2021| 21:51| Not applicable \nFiltermodule.dll| 15.2.858.15| 180,088| 08-Jul-2021| 21:42| x64 \nFipexeuperfctrresource.dll| 15.2.858.15| 15,248| 08-Jul-2021| 21:42| x64 \nFipexeventsresource.dll| 15.2.858.15| 44,936| 08-Jul-2021| 21:42| x64 \nFipexperfctrresource.dll| 15.2.858.15| 32,632| 08-Jul-2021| 21:42| x64 \nFirewallres.dll| 15.2.858.15| 72,592| 08-Jul-2021| 21:43| x64 \nFms.exe| 15.2.858.15| 1,350,024| 08-Jul-2021| 22:11| x64 \nForefrontactivedirectoryconnector.exe| 15.2.858.15| 110,992| 08-Jul-2021| 21:43| x64 \nFpsdiag.exe| 15.2.858.15| 18,832| 08-Jul-2021| 21:42| x86 \nFsccachedfilemanagedlocal.dll| 15.2.858.15| 822,136| 08-Jul-2021| 21:48| x64 \nFscconfigsupport.dll| 15.2.858.15| 56,696| 08-Jul-2021| 21:43| x86 \nFscconfigurationserver.exe| 15.2.858.15| 430,992| 08-Jul-2021| 21:43| x64 \nFscconfigurationserverinterfaces.dll| 15.2.858.15| 15,736| 08-Jul-2021| 21:42| x86 \nFsccrypto.dll| 15.2.858.15| 208,768| 08-Jul-2021| 21:42| x64 \nFscipcinterfaceslocal.dll| 15.2.858.15| 28,536| 08-Jul-2021| 21:42| x86 \nFscipclocal.dll| 15.2.858.15| 38,264| 08-Jul-2021| 21:48| x86 \nFscsqmuploader.exe| 15.2.858.15| 453,512| 08-Jul-2021| 21:47| x64 \nGetucpool.ps1| Not applicable| 19,771| 08-Jul-2021| 21:48| Not applicable \nGetvalidengines.ps1| Not applicable| 13,306| 08-Jul-2021| 21:47| Not applicable \nGet_antispamfilteringreport.ps1| Not applicable| 15,805| 08-Jul-2021| 21:42| Not applicable \nGet_antispamsclhistogram.ps1| Not applicable| 14,635| 08-Jul-2021| 21:42| Not applicable \nGet_antispamtopblockedsenderdomains.ps1| Not applicable| 15,723| 08-Jul-2021| 21:42| Not applicable \nGet_antispamtopblockedsenderips.ps1| Not applicable| 14,771| 08-Jul-2021| 21:42| Not applicable \nGet_antispamtopblockedsenders.ps1| Not applicable| 15,474| 08-Jul-2021| 21:42| Not applicable \nGet_antispamtoprblproviders.ps1| Not applicable| 14,685| 08-Jul-2021| 21:42| Not applicable \nGet_antispamtoprecipients.ps1| Not applicable| 14,786| 08-Jul-2021| 21:42| Not applicable \nGet_dleligibilitylist.ps1| Not applicable| 42,368| 08-Jul-2021| 21:48| Not applicable \nGet_exchangeetwtrace.ps1| Not applicable| 28,979| 08-Jul-2021| 21:48| Not applicable \nGet_publicfoldermailboxsize.ps1| Not applicable| 15,018| 08-Jul-2021| 21:48| Not applicable \nGet_storetrace.ps1| Not applicable| 51,883| 08-Jul-2021| 21:48| Not applicable \nHuffman_xpress.dll| 15.2.858.15| 32,648| 08-Jul-2021| 21:47| x64 \nImportedgeconfig.ps1| Not applicable| 77,244| 08-Jul-2021| 21:48| Not applicable \nImport_mailpublicfoldersformigration.ps1| Not applicable| 29,476| 08-Jul-2021| 21:48| Not applicable \nImport_retentiontags.ps1| Not applicable| 28,850| 08-Jul-2021| 21:48| Not applicable \nInproxy.dll| 15.2.858.15| 85,896| 08-Jul-2021| 21:48| x64 \nInstallwindowscomponent.ps1| Not applicable| 34,519| 08-Jul-2021| 22:11| Not applicable \nInstall_antispamagents.ps1| Not applicable| 17,925| 08-Jul-2021| 21:42| Not applicable \nInstall_odatavirtualdirectory.ps1| Not applicable| 17,963| 08-Jul-2021| 23:52| Not applicable \nInterop.activeds.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.858.15| 107,408| 08-Jul-2021| 21:42| Not applicable \nInterop.adsiis.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.858.15| 20,368| 08-Jul-2021| 21:43| Not applicable \nInterop.certenroll.dll| 15.2.858.15| 142,728| 08-Jul-2021| 21:42| x86 \nInterop.licenseinfointerface.dll| 15.2.858.15| 14,200| 08-Jul-2021| 21:49| x86 \nInterop.netfw.dll| 15.2.858.15| 34,192| 08-Jul-2021| 21:42| x86 \nInterop.plalibrary.dll| 15.2.858.15| 72,568| 08-Jul-2021| 21:42| x86 \nInterop.stdole2.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.858.15| 27,024| 08-Jul-2021| 21:42| Not applicable \nInterop.taskscheduler.dll| 15.2.858.15| 46,480| 08-Jul-2021| 21:42| x86 \nInterop.wuapilib.dll| 15.2.858.15| 60,816| 08-Jul-2021| 21:42| x86 \nInterop.xenroll.dll| 15.2.858.15| 39,816| 08-Jul-2021| 21:42| x86 \nKerbauth.dll| 15.2.858.15| 62,856| 08-Jul-2021| 21:43| x64 \nLicenseinfointerface.dll| 15.2.858.15| 643,448| 08-Jul-2021| 21:47| x64 \nLpversioning.xml| Not applicable| 20,418| 08-Jul-2021| 23:26| Not applicable \nMailboxdatabasereseedusingspares.ps1| Not applicable| 31,916| 08-Jul-2021| 21:48| Not applicable \nManagedavailabilitycrimsonmsg.dll| 15.2.858.15| 138,640| 08-Jul-2021| 21:42| x64 \nManagedstorediagnosticfunctions.ps1| Not applicable| 126,249| 08-Jul-2021| 21:47| Not applicable \nManagescheduledtask.ps1| Not applicable| 36,332| 08-Jul-2021| 21:48| Not applicable \nManage_metacachedatabase.ps1| Not applicable| 51,119| 08-Jul-2021| 21:47| Not applicable \nMce.dll| 15.2.858.15| 1,693,072| 08-Jul-2021| 21:42| x64 \nMeasure_storeusagestatistics.ps1| Not applicable| 29,479| 08-Jul-2021| 21:48| Not applicable \nMerge_publicfoldermailbox.ps1| Not applicable| 22,615| 08-Jul-2021| 21:48| Not applicable \nMicrosoft.database.isam.dll| 15.2.858.15| 127,888| 08-Jul-2021| 21:48| x86 \nMicrosoft.dkm.proxy.dll| 15.2.858.15| 26,000| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.activemonitoring.activemonitoringvariantconfig.dll| 15.2.858.15| 68,472| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.activemonitoring.eventlog.dll| 15.2.858.15| 17,784| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.addressbook.service.dll| 15.2.858.15| 233,360| 08-Jul-2021| 23:20| x86 \nMicrosoft.exchange.addressbook.service.eventlog.dll| 15.2.858.15| 15,752| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.airsync.airsyncmsg.dll| 15.2.858.15| 43,384| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.airsync.comon.dll| 15.2.858.15| 1,776,016| 08-Jul-2021| 23:03| x86 \nMicrosoft.exchange.airsync.dll1| 15.2.858.15| 505,224| 08-Jul-2021| 23:50| Not applicable \nMicrosoft.exchange.airsynchandler.dll| 15.2.858.15| 76,176| 08-Jul-2021| 23:51| x86 \nMicrosoft.exchange.anchorservice.dll| 15.2.858.15| 135,560| 08-Jul-2021| 22:45| x86 \nMicrosoft.exchange.antispam.eventlog.dll| 15.2.858.15| 23,432| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.antispamupdate.eventlog.dll| 15.2.858.15| 15,736| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.antispamupdatesvc.exe| 15.2.858.15| 27,000| 08-Jul-2021| 22:53| x86 \nMicrosoft.exchange.approval.applications.dll| 15.2.858.15| 53,648| 08-Jul-2021| 22:51| x86 \nMicrosoft.exchange.assistants.dll| 15.2.858.15| 925,064| 08-Jul-2021| 22:45| x86 \nMicrosoft.exchange.assistants.eventlog.dll| 15.2.858.15| 25,976| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.assistants.interfaces.dll| 15.2.858.15| 43,400| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.audit.azureclient.dll| 15.2.858.15| 15,240| 08-Jul-2021| 23:24| x86 \nMicrosoft.exchange.auditlogsearch.eventlog.dll| 15.2.858.15| 14,736| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.auditlogsearchservicelet.dll| 15.2.858.15| 70,544| 08-Jul-2021| 23:21| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.dll| 15.2.858.15| 94,600| 08-Jul-2021| 23:32| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.eventlog.dll| 15.2.858.15| 13,200| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.authadmin.eventlog.dll| 15.2.858.15| 15,736| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.authadminservicelet.dll| 15.2.858.15| 36,752| 08-Jul-2021| 23:20| x86 \nMicrosoft.exchange.authservicehostservicelet.dll| 15.2.858.15| 15,752| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.autodiscover.configuration.dll| 15.2.858.15| 79,760| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.autodiscover.dll| 15.2.858.15| 396,168| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.autodiscover.eventlogs.dll| 15.2.858.15| 21,392| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.autodiscoverv2.dll| 15.2.858.15| 57,208| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.bandwidthmonitorservicelet.dll| 15.2.858.15| 14,728| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.batchservice.dll| 15.2.858.15| 35,720| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.cabutility.dll| 15.2.858.15| 276,344| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.certificatedeployment.eventlog.dll| 15.2.858.15| 16,248| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.certificatedeploymentservicelet.dll| 15.2.858.15| 26,000| 08-Jul-2021| 23:20| x86 \nMicrosoft.exchange.certificatenotification.eventlog.dll| 15.2.858.15| 13,704| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.certificatenotificationservicelet.dll| 15.2.858.15| 23,440| 08-Jul-2021| 23:20| x86 \nMicrosoft.exchange.clients.common.dll| 15.2.858.15| 378,248| 08-Jul-2021| 22:50| x86 \nMicrosoft.exchange.clients.eventlogs.dll| 15.2.858.15| 83,832| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.clients.owa.dll| 15.2.858.15| 2,971,024| 08-Jul-2021| 23:50| x86 \nMicrosoft.exchange.clients.owa2.server.dll| 15.2.858.15| 5,029,776| 08-Jul-2021| 23:48| x86 \nMicrosoft.exchange.clients.owa2.servervariantconfiguration.dll| 15.2.858.15| 893,824| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.clients.security.dll| 15.2.858.15| 413,576| 08-Jul-2021| 23:27| x86 \nMicrosoft.exchange.clients.strings.dll| 15.2.858.15| 924,560| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.cluster.bandwidthmonitor.dll| 15.2.858.15| 31,632| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.cluster.common.dll| 15.2.858.15| 52,112| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.cluster.common.extensions.dll| 15.2.858.15| 21,880| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.cluster.diskmonitor.dll| 15.2.858.15| 33,680| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.cluster.replay.dll| 15.2.858.15| 3,515,256| 08-Jul-2021| 22:52| x86 \nMicrosoft.exchange.cluster.replicaseeder.dll| 15.2.858.15| 108,432| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.cluster.replicavsswriter.dll| 15.2.858.15| 288,632| 08-Jul-2021| 23:00| x64 \nMicrosoft.exchange.cluster.shared.dll| 15.2.858.15| 625,544| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.common.agentconfig.transport.dll| 15.2.858.15| 86,392| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.common.componentconfig.transport.dll| 15.2.858.15| 1,830,264| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.common.directory.adagentservicevariantconfig.dll| 15.2.858.15| 31,632| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.common.directory.directoryvariantconfig.dll| 15.2.858.15| 466,320| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.common.directory.domtvariantconfig.dll| 15.2.858.15| 25,976| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.common.directory.ismemberofresolverconfig.dll| 15.2.858.15| 38,264| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.common.directory.tenantrelocationvariantconfig.dll| 15.2.858.15| 102,776| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.common.directory.topologyservicevariantconfig.dll| 15.2.858.15| 48,504| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.common.diskmanagement.dll| 15.2.858.15| 67,472| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.common.dll| 15.2.858.15| 172,944| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.common.encryption.variantconfig.dll| 15.2.858.15| 113,536| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.common.il.dll| 15.2.858.15| 13,712| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.common.inference.dll| 15.2.858.15| 130,448| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.common.optics.dll| 15.2.858.15| 63,888| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.common.processmanagermsg.dll| 15.2.858.15| 19,856| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.common.protocols.popimap.dll| 15.2.858.15| 15,248| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.common.search.dll| 15.2.858.15| 108,920| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.common.search.eventlog.dll| 15.2.858.15| 17,800| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.common.smtp.dll| 15.2.858.15| 51,576| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.common.suiteservices.suiteservicesvariantconfig.dll| 15.2.858.15| 36,728| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.common.transport.azure.dll| 15.2.858.15| 27,528| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.common.transport.monitoringconfig.dll| 15.2.858.15| 1,042,320| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.commonmsg.dll| 15.2.858.15| 29,064| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.compliance.auditlogpumper.messages.dll| 15.2.858.15| 13,176| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.compliance.auditservice.core.dll| 15.2.858.15| 181,136| 08-Jul-2021| 23:34| x86 \nMicrosoft.exchange.compliance.auditservice.messages.dll| 15.2.858.15| 30,088| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.compliance.common.dll| 15.2.858.15| 22,408| 08-Jul-2021| 22:21| x86 \nMicrosoft.exchange.compliance.crimsonevents.dll| 15.2.858.15| 85,888| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.compliance.dll| 15.2.858.15| 41,344| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.compliance.recordreview.dll| 15.2.858.15| 37,248| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.compliance.supervision.dll| 15.2.858.15| 50,560| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.compliance.taskcreator.dll| 15.2.858.15| 33,144| 08-Jul-2021| 22:48| x86 \nMicrosoft.exchange.compliance.taskdistributioncommon.dll| 15.2.858.15| 1,100,688| 08-Jul-2021| 22:47| x86 \nMicrosoft.exchange.compliance.taskdistributionfabric.dll| 15.2.858.15| 206,712| 08-Jul-2021| 22:49| x86 \nMicrosoft.exchange.compliance.taskplugins.dll| 15.2.858.15| 210,808| 08-Jul-2021| 23:11| x86 \nMicrosoft.exchange.compression.dll| 15.2.858.15| 17,288| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.configuration.certificateauth.dll| 15.2.858.15| 37,768| 08-Jul-2021| 22:41| x86 \nMicrosoft.exchange.configuration.certificateauth.eventlog.dll| 15.2.858.15| 14,200| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.configuration.core.dll| 15.2.858.15| 145,784| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.configuration.core.eventlog.dll| 15.2.858.15| 14,200| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.configuration.delegatedauth.dll| 15.2.858.15| 53,128| 08-Jul-2021| 22:41| x86 \nMicrosoft.exchange.configuration.delegatedauth.eventlog.dll| 15.2.858.15| 15,736| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.configuration.diagnosticsmodules.dll| 15.2.858.15| 23,416| 08-Jul-2021| 22:40| x86 \nMicrosoft.exchange.configuration.diagnosticsmodules.eventlog.dll| 15.2.858.15| 13,200| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.configuration.failfast.dll| 15.2.858.15| 54,648| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.configuration.failfast.eventlog.dll| 15.2.858.15| 13,688| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.configuration.objectmodel.dll| 15.2.858.15| 1,846,136| 08-Jul-2021| 22:42| x86 \nMicrosoft.exchange.configuration.objectmodel.eventlog.dll| 15.2.858.15| 30,072| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.configuration.redirectionmodule.dll| 15.2.858.15| 68,496| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.configuration.redirectionmodule.eventlog.dll| 15.2.858.15| 15,248| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.configuration.remotepowershellbackendcmdletproxymodule.dll| 15.2.858.15| 21,368| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.configuration.remotepowershellbackendcmdletproxymodule.eventlog.dll| 15.2.858.15| 13,200| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.connectiondatacollector.dll| 15.2.858.15| 26,000| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.connections.common.dll| 15.2.858.15| 169,864| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.connections.eas.dll| 15.2.858.15| 330,128| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.connections.imap.dll| 15.2.858.15| 173,968| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.connections.pop.dll| 15.2.858.15| 71,056| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.contentfilter.wrapper.exe| 15.2.858.15| 203,640| 08-Jul-2021| 21:49| x64 \nMicrosoft.exchange.context.client.dll| 15.2.858.15| 27,000| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.context.configuration.dll| 15.2.858.15| 51,576| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.context.core.dll| 15.2.858.15| 51,088| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.context.datamodel.dll| 15.2.858.15| 46,984| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.core.strings.dll| 15.2.858.15| 1,093,496| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.core.timezone.dll| 15.2.858.15| 57,208| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.data.applicationlogic.deep.dll| 15.2.858.15| 326,536| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.data.applicationlogic.dll| 15.2.858.15| 3,356,552| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.data.applicationlogic.eventlog.dll| 15.2.858.15| 35,704| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.data.applicationlogic.monitoring.ifx.dll| 15.2.858.15| 17,808| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.data.connectors.dll| 15.2.858.15| 165,240| 08-Jul-2021| 22:23| x86 \nMicrosoft.exchange.data.consumermailboxprovisioning.dll| 15.2.858.15| 619,400| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.data.directory.dll| 15.2.858.15| 7,792,000| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.data.directory.eventlog.dll| 15.2.858.15| 80,248| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.data.dll| 15.2.858.15| 1,790,344| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.data.groupmailboxaccesslayer.dll| 15.2.858.15| 1,626,504| 08-Jul-2021| 22:47| x86 \nMicrosoft.exchange.data.ha.dll| 15.2.858.15| 375,160| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.data.imageanalysis.dll| 15.2.858.15| 105,336| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.data.mailboxfeatures.dll| 15.2.858.15| 15,760| 08-Jul-2021| 22:21| x86 \nMicrosoft.exchange.data.mailboxloadbalance.dll| 15.2.858.15| 224,648| 08-Jul-2021| 22:23| x86 \nMicrosoft.exchange.data.mapi.dll| 15.2.858.15| 186,744| 08-Jul-2021| 22:23| x86 \nMicrosoft.exchange.data.metering.contracts.dll| 15.2.858.15| 39,824| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.data.metering.dll| 15.2.858.15| 119,160| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.data.msosyncxsd.dll| 15.2.858.15| 968,056| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.data.notification.dll| 15.2.858.15| 141,192| 08-Jul-2021| 22:22| x86 \nMicrosoft.exchange.data.personaldataplatform.dll| 15.2.858.15| 769,416| 08-Jul-2021| 22:12| x86 \nMicrosoft.exchange.data.providers.dll| 15.2.858.15| 139,664| 08-Jul-2021| 22:21| x86 \nMicrosoft.exchange.data.provisioning.dll| 15.2.858.15| 56,696| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.data.rightsmanagement.dll| 15.2.858.15| 452,984| 08-Jul-2021| 22:20| x86 \nMicrosoft.exchange.data.scheduledtimers.dll| 15.2.858.15| 32,640| 08-Jul-2021| 22:21| x86 \nMicrosoft.exchange.data.storage.clientstrings.dll| 15.2.858.15| 256,904| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.data.storage.dll| 15.2.858.15| 11,816,848| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.data.storage.eventlog.dll| 15.2.858.15| 37,768| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.data.storageconfigurationresources.dll| 15.2.858.15| 655,760| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.data.storeobjects.dll| 15.2.858.15| 175,480| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.data.throttlingservice.client.dll| 15.2.858.15| 36,216| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.data.throttlingservice.client.eventlog.dll| 15.2.858.15| 14,224| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.data.throttlingservice.eventlog.dll| 15.2.858.15| 14,200| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.datacenter.management.activemonitoring.recoveryservice.eventlog.dll| 15.2.858.15| 14,728| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.datacenterstrings.dll| 15.2.858.15| 72,592| 08-Jul-2021| 23:21| x86 \nMicrosoft.exchange.delivery.eventlog.dll| 15.2.858.15| 13,184| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.diagnostics.certificatelogger.dll| 15.2.858.15| 22,920| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.diagnostics.dll| 15.2.858.15| 2,213,240| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.diagnostics.dll.deploy| 15.2.858.15| 2,213,240| 08-Jul-2021| 21:42| Not applicable \nMicrosoft.exchange.diagnostics.performancelogger.dll| 15.2.858.15| 23,944| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.diagnostics.service.common.dll| 15.2.858.15| 546,680| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.diagnostics.service.eventlog.dll| 15.2.858.15| 215,416| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.diagnostics.service.exchangejobs.dll| 15.2.858.15| 194,432| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.diagnostics.service.exe| 15.2.858.15| 146,312| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.diagnostics.service.fuseboxperfcounters.dll| 15.2.858.15| 27,528| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.diagnosticsaggregation.eventlog.dll| 15.2.858.15| 13,688| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.diagnosticsaggregationservicelet.dll| 15.2.858.15| 49,528| 08-Jul-2021| 22:49| x86 \nMicrosoft.exchange.directory.topologyservice.eventlog.dll| 15.2.858.15| 28,024| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.directory.topologyservice.exe| 15.2.858.15| 208,784| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.disklocker.events.dll| 15.2.858.15| 88,968| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.disklocker.interop.dll| 15.2.858.15| 32,656| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.drumtesting.calendarmigration.dll| 15.2.858.15| 45,960| 08-Jul-2021| 23:03| x86 \nMicrosoft.exchange.drumtesting.common.dll| 15.2.858.15| 18,808| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.dxstore.dll| 15.2.858.15| 473,464| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.dxstore.ha.events.dll| 15.2.858.15| 206,216| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.dxstore.ha.instance.exe| 15.2.858.15| 36,752| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.eac.flighting.dll| 15.2.858.15| 131,448| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.edgecredentialsvc.exe| 15.2.858.15| 21,896| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.edgesync.common.dll| 15.2.858.15| 148,368| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.edgesync.datacenterproviders.dll| 15.2.858.15| 220,024| 08-Jul-2021| 22:21| x86 \nMicrosoft.exchange.edgesync.eventlog.dll| 15.2.858.15| 23,944| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.edgesyncsvc.exe| 15.2.858.15| 97,672| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.ediscovery.export.dll| 15.2.858.15| 1,266,064| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.ediscovery.export.dll.deploy| 15.2.858.15| 1,266,064| 08-Jul-2021| 21:42| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.application| Not applicable| 16,503| 08-Jul-2021| 21:48| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.exe.deploy| 15.2.858.15| 87,416| 08-Jul-2021| 21:48| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.manifest| Not applicable| 67,473| 08-Jul-2021| 21:48| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.strings.dll.deploy| 15.2.858.15| 52,096| 08-Jul-2021| 21:43| Not applicable \nMicrosoft.exchange.ediscovery.mailboxsearch.dll| 15.2.858.15| 292,232| 08-Jul-2021| 23:11| x86 \nMicrosoft.exchange.entities.birthdaycalendar.dll| 15.2.858.15| 73,080| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.entities.booking.defaultservicesettings.dll| 15.2.858.15| 45,968| 08-Jul-2021| 22:23| x86 \nMicrosoft.exchange.entities.booking.dll| 15.2.858.15| 218,488| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.entities.booking.management.dll| 15.2.858.15| 78,200| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.entities.bookings.dll| 15.2.858.15| 35,704| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.entities.calendaring.dll| 15.2.858.15| 935,304| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.entities.common.dll| 15.2.858.15| 336,248| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.entities.connectors.dll| 15.2.858.15| 52,600| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.entities.contentsubmissions.dll| 15.2.858.15| 32,144| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.entities.context.dll| 15.2.858.15| 60,816| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.entities.datamodel.dll| 15.2.858.15| 854,408| 08-Jul-2021| 22:22| x86 \nMicrosoft.exchange.entities.fileproviders.dll| 15.2.858.15| 291,704| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.entities.foldersharing.dll| 15.2.858.15| 39,288| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.entities.holidaycalendars.dll| 15.2.858.15| 76,152| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.entities.insights.dll| 15.2.858.15| 166,800| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.entities.meetinglocation.dll| 15.2.858.15| 1,486,728| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.entities.meetingparticipants.dll| 15.2.858.15| 122,232| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.entities.meetingtimecandidates.dll| 15.2.858.15| 12,327,304| 08-Jul-2021| 23:09| x86 \nMicrosoft.exchange.entities.onlinemeetings.dll| 15.2.858.15| 264,072| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.entities.people.dll| 15.2.858.15| 37,776| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.entities.peopleinsights.dll| 15.2.858.15| 186,744| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.entities.reminders.dll| 15.2.858.15| 64,376| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.entities.schedules.dll| 15.2.858.15| 83,832| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.entities.shellservice.dll| 15.2.858.15| 63,880| 08-Jul-2021| 22:22| x86 \nMicrosoft.exchange.entities.tasks.dll| 15.2.858.15| 100,216| 08-Jul-2021| 22:43| x86 \nMicrosoft.exchange.entities.xrm.dll| 15.2.858.15| 144,776| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.entityextraction.calendar.dll| 15.2.858.15| 270,200| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.eserepl.common.dll| 15.2.858.15| 15,248| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.eserepl.configuration.dll| 15.2.858.15| 15,752| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.eserepl.dll| 15.2.858.15| 130,424| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.ews.configuration.dll| 15.2.858.15| 254,352| 08-Jul-2021| 22:22| x86 \nMicrosoft.exchange.exchangecertificate.eventlog.dll| 15.2.858.15| 13,176| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.exchangecertificateservicelet.dll| 15.2.858.15| 37,264| 08-Jul-2021| 23:21| x86 \nMicrosoft.exchange.extensibility.internal.dll| 15.2.858.15| 640,888| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.extensibility.partner.dll| 15.2.858.15| 37,256| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.federateddirectory.dll| 15.2.858.15| 146,312| 08-Jul-2021| 23:32| x86 \nMicrosoft.exchange.ffosynclogmsg.dll| 15.2.858.15| 13,176| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.frontendhttpproxy.dll| 15.2.858.15| 596,344| 08-Jul-2021| 23:30| x86 \nMicrosoft.exchange.frontendhttpproxy.eventlogs.dll| 15.2.858.15| 14,736| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.frontendtransport.monitoring.dll| 15.2.858.15| 30,096| 09-Jul-2021| 00:09| x86 \nMicrosoft.exchange.griffin.variantconfiguration.dll| 15.2.858.15| 99,704| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.hathirdpartyreplication.dll| 15.2.858.15| 42,384| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.helpprovider.dll| 15.2.858.15| 40,312| 08-Jul-2021| 22:45| x86 \nMicrosoft.exchange.httpproxy.addressfinder.dll| 15.2.858.15| 54,136| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.httpproxy.common.dll| 15.2.858.15| 164,216| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.httpproxy.diagnostics.dll| 15.2.858.15| 58,768| 08-Jul-2021| 22:51| x86 \nMicrosoft.exchange.httpproxy.flighting.dll| 15.2.858.15| 204,168| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.httpproxy.passivemonitor.dll| 15.2.858.15| 17,784| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.httpproxy.proxyassistant.dll| 15.2.858.15| 30,608| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.httpproxy.routerefresher.dll| 15.2.858.15| 38,776| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.httpproxy.routeselector.dll| 15.2.858.15| 48,504| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.httpproxy.routing.dll| 15.2.858.15| 180,600| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.httpredirectmodules.dll| 15.2.858.15| 36,752| 08-Jul-2021| 23:30| x86 \nMicrosoft.exchange.httputilities.dll| 15.2.858.15| 25,976| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.hygiene.data.dll| 15.2.858.15| 1,868,168| 08-Jul-2021| 22:49| x86 \nMicrosoft.exchange.hygiene.diagnosisutil.dll| 15.2.858.15| 54,664| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.hygiene.eopinstantprovisioning.dll| 15.2.858.15| 35,720| 08-Jul-2021| 23:22| x86 \nMicrosoft.exchange.idserialization.dll| 15.2.858.15| 35,728| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.imap4.eventlog.dll| 15.2.858.15| 18,320| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.imap4.eventlog.dll.fe| 15.2.858.15| 18,320| 08-Jul-2021| 21:42| Not applicable \nMicrosoft.exchange.imap4.exe| 15.2.858.15| 263,048| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.imap4.exe.fe| 15.2.858.15| 263,048| 08-Jul-2021| 22:39| Not applicable \nMicrosoft.exchange.imap4service.exe| 15.2.858.15| 24,976| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.imap4service.exe.fe| 15.2.858.15| 24,976| 08-Jul-2021| 22:39| Not applicable \nMicrosoft.exchange.imapconfiguration.dl1| 15.2.858.15| 53,112| 08-Jul-2021| 21:51| Not applicable \nMicrosoft.exchange.inference.common.dll| 15.2.858.15| 216,976| 08-Jul-2021| 22:22| x86 \nMicrosoft.exchange.inference.hashtagsrelevance.dll| 15.2.858.15| 32,128| 08-Jul-2021| 23:07| x64 \nMicrosoft.exchange.inference.peoplerelevance.dll| 15.2.858.15| 281,976| 08-Jul-2021| 23:04| x86 \nMicrosoft.exchange.inference.ranking.dll| 15.2.858.15| 18,832| 08-Jul-2021| 22:21| x86 \nMicrosoft.exchange.inference.safetylibrary.dll| 15.2.858.15| 83,832| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.inference.service.eventlog.dll| 15.2.858.15| 15,248| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.infoworker.assistantsclientresources.dll| 15.2.858.15| 94,072| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.infoworker.common.dll| 15.2.858.15| 1,840,504| 08-Jul-2021| 22:50| x86 \nMicrosoft.exchange.infoworker.eventlog.dll| 15.2.858.15| 71,560| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.infoworker.meetingvalidator.dll| 15.2.858.15| 175,496| 08-Jul-2021| 22:52| x86 \nMicrosoft.exchange.instantmessaging.dll| 15.2.858.15| 45,968| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.irm.formprotector.dll| 15.2.858.15| 159,624| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.irm.msoprotector.dll| 15.2.858.15| 51,064| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.irm.ofcprotector.dll| 15.2.858.15| 45,968| 08-Jul-2021| 21:49| x64 \nMicrosoft.exchange.isam.databasemanager.dll| 15.2.858.15| 32,120| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.isam.esebcli.dll| 15.2.858.15| 100,216| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.jobqueue.eventlog.dll| 15.2.858.15| 13,176| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.jobqueueservicelet.dll| 15.2.858.15| 271,224| 08-Jul-2021| 23:34| x86 \nMicrosoft.exchange.killswitch.dll| 15.2.858.15| 22,408| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.killswitchconfiguration.dll| 15.2.858.15| 33,672| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.loganalyzer.analyzers.auditing.dll| 15.2.858.15| 18,312| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.analyzers.certificatelog.dll| 15.2.858.15| 15,240| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.analyzers.cmdletinfralog.dll| 15.2.858.15| 27,528| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.loganalyzer.analyzers.easlog.dll| 15.2.858.15| 30,608| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.ecplog.dll| 15.2.858.15| 22,408| 08-Jul-2021| 21:49| x86 \nMicrosoft.exchange.loganalyzer.analyzers.eventlog.dll| 15.2.858.15| 66,424| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.ewslog.dll| 15.2.858.15| 29,576| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.loganalyzer.analyzers.griffinperfcounter.dll| 15.2.858.15| 19,856| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.groupescalationlog.dll| 15.2.858.15| 20,344| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.analyzers.httpproxylog.dll| 15.2.858.15| 19,344| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.hxservicelog.dll| 15.2.858.15| 34,168| 08-Jul-2021| 22:20| x86 \nMicrosoft.exchange.loganalyzer.analyzers.iislog.dll| 15.2.858.15| 103,816| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.analyzers.lameventlog.dll| 15.2.858.15| 31,632| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.migrationlog.dll| 15.2.858.15| 15,752| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.analyzers.oabdownloadlog.dll| 15.2.858.15| 20,880| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.oauthcafelog.dll| 15.2.858.15| 16,256| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.loganalyzer.analyzers.outlookservicelog.dll| 15.2.858.15| 49,016| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.owaclientlog.dll| 15.2.858.15| 44,424| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.owalog.dll| 15.2.858.15| 38,280| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.loganalyzer.analyzers.perflog.dll| 15.2.858.15| 10,375,032| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.pfassistantlog.dll| 15.2.858.15| 29,064| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.analyzers.rca.dll| 15.2.858.15| 21,368| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.analyzers.restlog.dll| 15.2.858.15| 24,440| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.store.dll| 15.2.858.15| 15,224| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.analyzers.transportsynchealthlog.dll| 15.2.858.15| 21,880| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.core.dll| 15.2.858.15| 89,464| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.auditing.dll| 15.2.858.15| 20,856| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.loganalyzer.extensions.certificatelog.dll| 15.2.858.15| 26,504| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.loganalyzer.extensions.cmdletinfralog.dll| 15.2.858.15| 21,376| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.loganalyzer.extensions.common.dll| 15.2.858.15| 28,040| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.easlog.dll| 15.2.858.15| 28,552| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.errordetection.dll| 15.2.858.15| 36,232| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.ewslog.dll| 15.2.858.15| 16,776| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.loganalyzer.extensions.griffinperfcounter.dll| 15.2.858.15| 19,832| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.loganalyzer.extensions.groupescalationlog.dll| 15.2.858.15| 15,240| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.httpproxylog.dll| 15.2.858.15| 17,288| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.hxservicelog.dll| 15.2.858.15| 19,848| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.iislog.dll| 15.2.858.15| 57,224| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.migrationlog.dll| 15.2.858.15| 17,800| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.oabdownloadlog.dll| 15.2.858.15| 18,808| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.extensions.oauthcafelog.dll| 15.2.858.15| 16,264| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.loganalyzer.extensions.outlookservicelog.dll| 15.2.858.15| 17,800| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.owaclientlog.dll| 15.2.858.15| 15,248| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.owalog.dll| 15.2.858.15| 15,240| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.loganalyzer.extensions.perflog.dll| 15.2.858.15| 52,624| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.pfassistantlog.dll| 15.2.858.15| 18,312| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.rca.dll| 15.2.858.15| 34,168| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.restlog.dll| 15.2.858.15| 17,280| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.loganalyzer.extensions.store.dll| 15.2.858.15| 18,816| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loganalyzer.extensions.transportsynchealthlog.dll| 15.2.858.15| 43,400| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.loguploader.dll| 15.2.858.15| 165,256| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.loguploaderproxy.dll| 15.2.858.15| 54,672| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.mailboxassistants.assistants.dll| 15.2.858.15| 9,057,144| 08-Jul-2021| 23:58| x86 \nMicrosoft.exchange.mailboxassistants.attachmentthumbnail.dll| 15.2.858.15| 33,144| 08-Jul-2021| 22:41| x86 \nMicrosoft.exchange.mailboxassistants.common.dll| 15.2.858.15| 124,280| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.mailboxassistants.crimsonevents.dll| 15.2.858.15| 82,808| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.mailboxassistants.eventlog.dll| 15.2.858.15| 14,224| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.mailboxassistants.rightsmanagement.dll| 15.2.858.15| 30,096| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxloadbalance.dll| 15.2.858.15| 661,368| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.mailboxloadbalance.serverstrings.dll| 15.2.858.15| 63,368| 08-Jul-2021| 22:48| x86 \nMicrosoft.exchange.mailboxreplicationservice.calendarsyncprovider.dll| 15.2.858.15| 175,480| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.common.dll| 15.2.858.15| 2,791,824| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.complianceprovider.dll| 15.2.858.15| 53,112| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.contactsyncprovider.dll| 15.2.858.15| 151,928| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.dll| 15.2.858.15| 966,520| 08-Jul-2021| 23:04| x86 \nMicrosoft.exchange.mailboxreplicationservice.easprovider.dll| 15.2.858.15| 185,208| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.eventlog.dll| 15.2.858.15| 31,608| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.mailboxreplicationservice.googledocprovider.dll| 15.2.858.15| 39,800| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.imapprovider.dll| 15.2.858.15| 105,848| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.mapiprovider.dll| 15.2.858.15| 95,104| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.popprovider.dll| 15.2.858.15| 43,384| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyclient.dll| 15.2.858.15| 18,824| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyservice.dll| 15.2.858.15| 172,936| 08-Jul-2021| 23:04| x86 \nMicrosoft.exchange.mailboxreplicationservice.pstprovider.dll| 15.2.858.15| 102,776| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.remoteprovider.dll| 15.2.858.15| 98,696| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.storageprovider.dll| 15.2.858.15| 188,808| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.mailboxreplicationservice.syncprovider.dll| 15.2.858.15| 43,400| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.mailboxreplicationservice.xml.dll| 15.2.858.15| 447,368| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.mailboxreplicationservice.xrmprovider.dll| 15.2.858.15| 90,000| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.mailboxtransport.monitoring.dll| 15.2.858.15| 107,920| 09-Jul-2021| 00:09| x86 \nMicrosoft.exchange.mailboxtransport.storedriveragents.dll| 15.2.858.15| 371,088| 08-Jul-2021| 23:08| x86 \nMicrosoft.exchange.mailboxtransport.storedrivercommon.dll| 15.2.858.15| 193,912| 08-Jul-2021| 22:50| x86 \nMicrosoft.exchange.mailboxtransport.storedriverdelivery.dll| 15.2.858.15| 552,312| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.mailboxtransport.storedriverdelivery.eventlog.dll| 15.2.858.15| 16,256| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.mailboxtransport.submission.eventlog.dll| 15.2.858.15| 15,736| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.mailboxtransport.submission.storedriversubmission.dll| 15.2.858.15| 321,424| 08-Jul-2021| 23:03| x86 \nMicrosoft.exchange.mailboxtransport.submission.storedriversubmission.eventlog.dll| 15.2.858.15| 17,808| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.mailboxtransport.syncdelivery.dll| 15.2.858.15| 45,448| 08-Jul-2021| 22:51| x86 \nMicrosoft.exchange.mailboxtransportwatchdogservicelet.dll| 15.2.858.15| 18,320| 08-Jul-2021| 22:46| x86 \nMicrosoft.exchange.mailboxtransportwatchdogservicelet.eventlog.dll| 15.2.858.15| 12,664| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.managedlexruntime.mppgruntime.dll| 15.2.858.15| 20,880| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.management.activedirectory.dll| 15.2.858.15| 415,096| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.management.classificationdefinitions.dll| 15.2.858.15| 1,269,624| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.management.compliancepolicy.dll| 15.2.858.15| 39,288| 08-Jul-2021| 22:44| x86 \nMicrosoft.exchange.management.controlpanel.basics.dll| 15.2.858.15| 433,544| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.management.controlpanel.dll| 15.2.858.15| 4,566,408| 09-Jul-2021| 01:10| x86 \nMicrosoft.exchange.management.controlpanel.owaoptionstrings.dll| 15.2.858.15| 260,984| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.management.controlpanelmsg.dll| 15.2.858.15| 33,680| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.management.deployment.analysis.dll| 15.2.858.15| 94,072| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.management.deployment.dll| 15.2.858.15| 586,120| 08-Jul-2021| 22:48| x86 \nMicrosoft.exchange.management.deployment.xml.dll| 15.2.858.15| 3,543,416| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.management.detailstemplates.dll| 15.2.858.15| 67,976| 08-Jul-2021| 23:33| x86 \nMicrosoft.exchange.management.dll| 15.2.858.15| 16,497,032| 08-Jul-2021| 23:18| x86 \nMicrosoft.exchange.management.edge.systemmanager.dll| 15.2.858.15| 58,768| 08-Jul-2021| 23:23| x86 \nMicrosoft.exchange.management.infrastructure.asynchronoustask.dll| 15.2.858.15| 23,944| 08-Jul-2021| 23:24| x86 \nMicrosoft.exchange.management.jitprovisioning.dll| 15.2.858.15| 101,776| 08-Jul-2021| 22:46| x86 \nMicrosoft.exchange.management.migration.dll| 15.2.858.15| 544,144| 08-Jul-2021| 23:20| x86 \nMicrosoft.exchange.management.mobility.dll| 15.2.858.15| 305,016| 08-Jul-2021| 23:22| x86 \nMicrosoft.exchange.management.nativeresources.dll| 15.2.858.15| 273,808| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.management.powershell.support.dll| 15.2.858.15| 418,680| 08-Jul-2021| 23:23| x86 \nMicrosoft.exchange.management.provisioning.dll| 15.2.858.15| 275,832| 08-Jul-2021| 23:25| x86 \nMicrosoft.exchange.management.psdirectinvoke.dll| 15.2.858.15| 70,520| 08-Jul-2021| 23:30| x86 \nMicrosoft.exchange.management.rbacdefinition.dll| 15.2.858.15| 7,873,936| 08-Jul-2021| 22:20| x86 \nMicrosoft.exchange.management.recipient.dll| 15.2.858.15| 1,502,072| 08-Jul-2021| 23:22| x86 \nMicrosoft.exchange.management.snapin.esm.dll| 15.2.858.15| 71,560| 08-Jul-2021| 23:24| x86 \nMicrosoft.exchange.management.systemmanager.dll| 15.2.858.15| 1,249,160| 08-Jul-2021| 23:21| x86 \nMicrosoft.exchange.management.transport.dll| 15.2.858.15| 1,876,880| 08-Jul-2021| 23:26| x86 \nMicrosoft.exchange.managementgui.dll| 15.2.858.15| 5,366,664| 08-Jul-2021| 22:12| x86 \nMicrosoft.exchange.managementmsg.dll| 15.2.858.15| 36,240| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.mapihttpclient.dll| 15.2.858.15| 117,624| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.mapihttphandler.dll| 15.2.858.15| 209,800| 08-Jul-2021| 23:23| x86 \nMicrosoft.exchange.messagesecurity.dll| 15.2.858.15| 79,736| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.messagesecurity.messagesecuritymsg.dll| 15.2.858.15| 17,296| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.messagingpolicies.dlppolicyagent.dll| 15.2.858.15| 156,040| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.messagingpolicies.edgeagents.dll| 15.2.858.15| 65,936| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.messagingpolicies.eventlog.dll| 15.2.858.15| 30,600| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.messagingpolicies.filtering.dll| 15.2.858.15| 58,248| 08-Jul-2021| 22:51| x86 \nMicrosoft.exchange.messagingpolicies.hygienerules.dll| 15.2.858.15| 29,584| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.messagingpolicies.journalagent.dll| 15.2.858.15| 175,488| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.messagingpolicies.redirectionagent.dll| 15.2.858.15| 28,552| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.messagingpolicies.retentionpolicyagent.dll| 15.2.858.15| 75,152| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.messagingpolicies.rmsvcagent.dll| 15.2.858.15| 207,232| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.messagingpolicies.rules.dll| 15.2.858.15| 440,696| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.messagingpolicies.supervisoryreviewagent.dll| 15.2.858.15| 83,320| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.messagingpolicies.transportruleagent.dll| 15.2.858.15| 35,208| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.messagingpolicies.unifiedpolicycommon.dll| 15.2.858.15| 53,128| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.messagingpolicies.unjournalagent.dll| 15.2.858.15| 96,648| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.migration.dll| 15.2.858.15| 1,110,416| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.migrationworkflowservice.eventlog.dll| 15.2.858.15| 14,728| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.mobiledriver.dll| 15.2.858.15| 135,544| 08-Jul-2021| 22:50| x86 \nMicrosoft.exchange.monitoring.activemonitoring.local.components.dll| 15.2.858.15| 5,065,592| 09-Jul-2021| 00:04| x86 \nMicrosoft.exchange.monitoring.servicecontextprovider.dll| 15.2.858.15| 19,832| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.mrsmlbconfiguration.dll| 15.2.858.15| 68,488| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.net.dll| 15.2.858.15| 5,086,088| 08-Jul-2021| 21:47| x86 \nMicrosoft.exchange.net.rightsmanagement.dll| 15.2.858.15| 265,592| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.networksettings.dll| 15.2.858.15| 37,776| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.notifications.broker.eventlog.dll| 15.2.858.15| 14,200| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.notifications.broker.exe| 15.2.858.15| 549,752| 08-Jul-2021| 23:55| x86 \nMicrosoft.exchange.oabauthmodule.dll| 15.2.858.15| 22,920| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.oabrequesthandler.dll| 15.2.858.15| 106,376| 08-Jul-2021| 22:44| x86 \nMicrosoft.exchange.oauth.core.dll| 15.2.858.15| 291,704| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.objectstoreclient.dll| 15.2.858.15| 17,272| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.odata.configuration.dll| 15.2.858.15| 277,880| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.odata.dll| 15.2.858.15| 2,993,552| 08-Jul-2021| 23:52| x86 \nMicrosoft.exchange.officegraph.common.dll| 15.2.858.15| 90,504| 08-Jul-2021| 22:23| x86 \nMicrosoft.exchange.officegraph.grain.dll| 15.2.858.15| 101,776| 08-Jul-2021| 22:44| x86 \nMicrosoft.exchange.officegraph.graincow.dll| 15.2.858.15| 38,264| 08-Jul-2021| 22:44| x86 \nMicrosoft.exchange.officegraph.graineventbasedassistants.dll| 15.2.858.15| 45,432| 08-Jul-2021| 22:46| x86 \nMicrosoft.exchange.officegraph.grainpropagationengine.dll| 15.2.858.15| 58,256| 08-Jul-2021| 22:41| x86 \nMicrosoft.exchange.officegraph.graintransactionstorage.dll| 15.2.858.15| 147,320| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.officegraph.graintransportdeliveryagent.dll| 15.2.858.15| 26,488| 08-Jul-2021| 22:44| x86 \nMicrosoft.exchange.officegraph.graphstore.dll| 15.2.858.15| 184,184| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.officegraph.permailboxkeys.dll| 15.2.858.15| 26,488| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.officegraph.secondarycopyquotamanagement.dll| 15.2.858.15| 38,264| 08-Jul-2021| 22:46| x86 \nMicrosoft.exchange.officegraph.secondaryshallowcopylocation.dll| 15.2.858.15| 55,672| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.officegraph.security.dll| 15.2.858.15| 147,336| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.officegraph.semanticgraph.dll| 15.2.858.15| 191,864| 08-Jul-2021| 22:44| x86 \nMicrosoft.exchange.officegraph.tasklogger.dll| 15.2.858.15| 33,680| 08-Jul-2021| 22:40| x86 \nMicrosoft.exchange.partitioncache.dll| 15.2.858.15| 28,048| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.passivemonitoringsettings.dll| 15.2.858.15| 32,632| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.photogarbagecollectionservicelet.dll| 15.2.858.15| 15,248| 08-Jul-2021| 22:46| x86 \nMicrosoft.exchange.pop3.eventlog.dll| 15.2.858.15| 17,296| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.pop3.eventlog.dll.fe| 15.2.858.15| 17,296| 08-Jul-2021| 21:42| Not applicable \nMicrosoft.exchange.pop3.exe| 15.2.858.15| 106,896| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.pop3.exe.fe| 15.2.858.15| 106,896| 08-Jul-2021| 22:39| Not applicable \nMicrosoft.exchange.pop3service.exe| 15.2.858.15| 24,952| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.pop3service.exe.fe| 15.2.858.15| 24,952| 08-Jul-2021| 22:39| Not applicable \nMicrosoft.exchange.popconfiguration.dl1| 15.2.858.15| 42,888| 08-Jul-2021| 21:51| Not applicable \nMicrosoft.exchange.popimap.core.dll| 15.2.858.15| 264,592| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.popimap.core.dll.fe| 15.2.858.15| 264,592| 08-Jul-2021| 22:39| Not applicable \nMicrosoft.exchange.powersharp.dll| 15.2.858.15| 358,272| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.powersharp.management.dll| 15.2.858.15| 4,166,520| 08-Jul-2021| 23:31| x86 \nMicrosoft.exchange.powershell.configuration.dll| 15.2.858.15| 308,600| 08-Jul-2021| 23:31| x64 \nMicrosoft.exchange.powershell.rbachostingtools.dll| 15.2.858.15| 41,360| 08-Jul-2021| 23:30| x86 \nMicrosoft.exchange.protectedservicehost.exe| 15.2.858.15| 30,608| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.protocols.fasttransfer.dll| 15.2.858.15| 137,096| 08-Jul-2021| 22:53| x86 \nMicrosoft.exchange.protocols.mapi.dll| 15.2.858.15| 441,744| 08-Jul-2021| 22:50| x86 \nMicrosoft.exchange.provisioning.eventlog.dll| 15.2.858.15| 14,224| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.provisioningagent.dll| 15.2.858.15| 224,656| 08-Jul-2021| 23:21| x86 \nMicrosoft.exchange.provisioningservicelet.dll| 15.2.858.15| 105,872| 08-Jul-2021| 23:20| x86 \nMicrosoft.exchange.pst.dll| 15.2.858.15| 168,848| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.pst.dll.deploy| 15.2.858.15| 168,848| 08-Jul-2021| 21:42| Not applicable \nMicrosoft.exchange.pswsclient.dll| 15.2.858.15| 259,472| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.publicfolders.dll| 15.2.858.15| 72,056| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.pushnotifications.crimsonevents.dll| 15.2.858.15| 215,944| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.pushnotifications.dll| 15.2.858.15| 106,896| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.pushnotifications.publishers.dll| 15.2.858.15| 425,848| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.pushnotifications.server.dll| 15.2.858.15| 70,520| 08-Jul-2021| 22:41| x86 \nMicrosoft.exchange.query.analysis.dll| 15.2.858.15| 46,480| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.query.configuration.dll| 15.2.858.15| 215,928| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.query.core.dll| 15.2.858.15| 168,824| 08-Jul-2021| 22:49| x86 \nMicrosoft.exchange.query.ranking.dll| 15.2.858.15| 343,440| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.query.retrieval.dll| 15.2.858.15| 174,456| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.query.suggestions.dll| 15.2.858.15| 95,112| 08-Jul-2021| 23:03| x86 \nMicrosoft.exchange.realtimeanalyticspublisherservicelet.dll| 15.2.858.15| 127,368| 08-Jul-2021| 22:53| x86 \nMicrosoft.exchange.relevance.core.dll| 15.2.858.15| 63,360| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.relevance.data.dll| 15.2.858.15| 36,744| 08-Jul-2021| 22:21| x64 \nMicrosoft.exchange.relevance.mailtagger.dll| 15.2.858.15| 17,784| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.relevance.people.dll| 15.2.858.15| 9,666,936| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.relevance.peopleindex.dll| 15.2.858.15| 20,788,088| 08-Jul-2021| 21:51| x64 \nMicrosoft.exchange.relevance.peopleranker.dll| 15.2.858.15| 36,752| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.relevance.perm.dll| 15.2.858.15| 97,680| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.relevance.sassuggest.dll| 15.2.858.15| 28,560| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.relevance.upm.dll| 15.2.858.15| 72,080| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.routing.client.dll| 15.2.858.15| 15,736| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.routing.eventlog.dll| 15.2.858.15| 13,192| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.routing.server.exe| 15.2.858.15| 59,256| 08-Jul-2021| 22:40| x86 \nMicrosoft.exchange.rpc.dll| 15.2.858.15| 1,647,496| 08-Jul-2021| 21:51| x64 \nMicrosoft.exchange.rpcclientaccess.dll| 15.2.858.15| 209,800| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.rpcclientaccess.exmonhandler.dll| 15.2.858.15| 60,296| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.rpcclientaccess.handler.dll| 15.2.858.15| 518,032| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.rpcclientaccess.monitoring.dll| 15.2.858.15| 161,144| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.rpcclientaccess.parser.dll| 15.2.858.15| 724,344| 08-Jul-2021| 21:47| x86 \nMicrosoft.exchange.rpcclientaccess.server.dll| 15.2.858.15| 243,080| 08-Jul-2021| 22:41| x86 \nMicrosoft.exchange.rpcclientaccess.service.eventlog.dll| 15.2.858.15| 20,880| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.rpcclientaccess.service.exe| 15.2.858.15| 35,208| 08-Jul-2021| 23:23| x86 \nMicrosoft.exchange.rpchttpmodules.dll| 15.2.858.15| 42,360| 08-Jul-2021| 22:43| x86 \nMicrosoft.exchange.rpcoverhttpautoconfig.dll| 15.2.858.15| 56,208| 08-Jul-2021| 23:21| x86 \nMicrosoft.exchange.rpcoverhttpautoconfig.eventlog.dll| 15.2.858.15| 27,536| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.rules.common.dll| 15.2.858.15| 130,424| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.saclwatcher.eventlog.dll| 15.2.858.15| 14,712| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.saclwatcherservicelet.dll| 15.2.858.15| 20,368| 08-Jul-2021| 22:46| x86 \nMicrosoft.exchange.safehtml.dll| 15.2.858.15| 21,384| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.sandbox.activities.dll| 15.2.858.15| 267,656| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.sandbox.contacts.dll| 15.2.858.15| 110,968| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.sandbox.core.dll| 15.2.858.15| 112,520| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.sandbox.services.dll| 15.2.858.15| 622,472| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.search.bigfunnel.dll| 15.2.858.15| 185,224| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.search.bigfunnel.eventlog.dll| 15.2.858.15| 12,168| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.search.blingwrapper.dll| 15.2.858.15| 19,344| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.search.core.dll| 15.2.858.15| 211,840| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.search.ediscoveryquery.dll| 15.2.858.15| 17,800| 08-Jul-2021| 23:08| x86 \nMicrosoft.exchange.search.engine.dll| 15.2.858.15| 97,672| 08-Jul-2021| 22:45| x86 \nMicrosoft.exchange.search.fast.configuration.dll| 15.2.858.15| 16,768| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.search.fast.dll| 15.2.858.15| 436,600| 08-Jul-2021| 22:44| x86 \nMicrosoft.exchange.search.files.dll| 15.2.858.15| 274,312| 08-Jul-2021| 22:48| x86 \nMicrosoft.exchange.search.flighting.dll| 15.2.858.15| 24,960| 08-Jul-2021| 21:52| x86 \nMicrosoft.exchange.search.mdb.dll| 15.2.858.15| 218,000| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.search.service.exe| 15.2.858.15| 26,504| 08-Jul-2021| 22:47| x86 \nMicrosoft.exchange.security.applicationencryption.dll| 15.2.858.15| 221,072| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.security.dll| 15.2.858.15| 1,559,952| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.security.msarpsservice.exe| 15.2.858.15| 19,848| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.security.securitymsg.dll| 15.2.858.15| 28,552| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.server.storage.admininterface.dll| 15.2.858.15| 225,160| 08-Jul-2021| 23:03| x86 \nMicrosoft.exchange.server.storage.common.dll| 15.2.858.15| 5,151,112| 08-Jul-2021| 22:12| x86 \nMicrosoft.exchange.server.storage.diagnostics.dll| 15.2.858.15| 214,904| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.server.storage.directoryservices.dll| 15.2.858.15| 115,592| 08-Jul-2021| 22:53| x86 \nMicrosoft.exchange.server.storage.esebackinterop.dll| 15.2.858.15| 82,832| 08-Jul-2021| 22:12| x64 \nMicrosoft.exchange.server.storage.eventlog.dll| 15.2.858.15| 80,776| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.server.storage.fulltextindex.dll| 15.2.858.15| 66,448| 08-Jul-2021| 22:41| x86 \nMicrosoft.exchange.server.storage.ha.dll| 15.2.858.15| 81,296| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.server.storage.lazyindexing.dll| 15.2.858.15| 211,848| 08-Jul-2021| 22:45| x86 \nMicrosoft.exchange.server.storage.logicaldatamodel.dll| 15.2.858.15| 1,341,304| 08-Jul-2021| 22:48| x86 \nMicrosoft.exchange.server.storage.mapidisp.dll| 15.2.858.15| 511,880| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.server.storage.multimailboxsearch.dll| 15.2.858.15| 47,496| 08-Jul-2021| 22:45| x86 \nMicrosoft.exchange.server.storage.physicalaccess.dll| 15.2.858.15| 873,872| 08-Jul-2021| 22:40| x86 \nMicrosoft.exchange.server.storage.propertydefinitions.dll| 15.2.858.15| 1,352,568| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.server.storage.propertytag.dll| 15.2.858.15| 30,608| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.server.storage.rpcproxy.dll| 15.2.858.15| 130,440| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.server.storage.storecommonservices.dll| 15.2.858.15| 1,018,768| 08-Jul-2021| 22:43| x86 \nMicrosoft.exchange.server.storage.storeintegritycheck.dll| 15.2.858.15| 111,496| 08-Jul-2021| 22:52| x86 \nMicrosoft.exchange.server.storage.workermanager.dll| 15.2.858.15| 34,704| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.server.storage.xpress.dll| 15.2.858.15| 19,336| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.servicehost.eventlog.dll| 15.2.858.15| 14,728| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.servicehost.exe| 15.2.858.15| 60,808| 08-Jul-2021| 22:44| x86 \nMicrosoft.exchange.servicelets.globallocatorcache.dll| 15.2.858.15| 50,568| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.servicelets.globallocatorcache.eventlog.dll| 15.2.858.15| 14,200| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.servicelets.unifiedpolicysyncservicelet.eventlog.dll| 15.2.858.15| 14,216| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.services.common.dll| 15.2.858.15| 74,120| 08-Jul-2021| 22:53| x86 \nMicrosoft.exchange.services.dll| 15.2.858.15| 8,480,656| 08-Jul-2021| 23:38| x86 \nMicrosoft.exchange.services.eventlogs.dll| 15.2.858.15| 30,088| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.services.ewshandler.dll| 15.2.858.15| 633,736| 08-Jul-2021| 23:49| x86 \nMicrosoft.exchange.services.ewsserialization.dll| 15.2.858.15| 1,651,080| 08-Jul-2021| 23:41| x86 \nMicrosoft.exchange.services.json.dll| 15.2.858.15| 296,328| 08-Jul-2021| 23:45| x86 \nMicrosoft.exchange.services.messaging.dll| 15.2.858.15| 43,400| 08-Jul-2021| 23:39| x86 \nMicrosoft.exchange.services.onlinemeetings.dll| 15.2.858.15| 233,336| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.services.surface.dll| 15.2.858.15| 178,552| 08-Jul-2021| 23:48| x86 \nMicrosoft.exchange.services.wcf.dll| 15.2.858.15| 348,560| 08-Jul-2021| 23:43| x86 \nMicrosoft.exchange.setup.acquirelanguagepack.dll| 15.2.858.15| 56,712| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.setup.bootstrapper.common.dll| 15.2.858.15| 93,048| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.setup.common.dll| 15.2.858.15| 296,328| 08-Jul-2021| 23:33| x86 \nMicrosoft.exchange.setup.commonbase.dll| 15.2.858.15| 35,720| 08-Jul-2021| 23:24| x86 \nMicrosoft.exchange.setup.console.dll| 15.2.858.15| 27,016| 08-Jul-2021| 23:36| x86 \nMicrosoft.exchange.setup.gui.dll| 15.2.858.15| 114,576| 08-Jul-2021| 23:36| x86 \nMicrosoft.exchange.setup.parser.dll| 15.2.858.15| 53,648| 08-Jul-2021| 23:21| x86 \nMicrosoft.exchange.setup.signverfwrapper.dll| 15.2.858.15| 75,152| 08-Jul-2021| 21:43| x64 \nMicrosoft.exchange.sharedcache.caches.dll| 15.2.858.15| 142,736| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.sharedcache.client.dll| 15.2.858.15| 24,976| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.sharedcache.eventlog.dll| 15.2.858.15| 15,248| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.sharedcache.exe| 15.2.858.15| 58,760| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.sharepointsignalstore.dll| 15.2.858.15| 27,024| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.slabmanifest.dll| 15.2.858.15| 46,984| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.sqm.dll| 15.2.858.15| 46,992| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.store.service.exe| 15.2.858.15| 28,040| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.store.worker.exe| 15.2.858.15| 26,512| 08-Jul-2021| 23:07| x86 \nMicrosoft.exchange.storeobjectsservice.eventlog.dll| 15.2.858.15| 13,712| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.storeobjectsservice.exe| 15.2.858.15| 31,632| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.storeprovider.dll| 15.2.858.15| 1,205,128| 08-Jul-2021| 21:52| x86 \nMicrosoft.exchange.structuredquery.dll| 15.2.858.15| 158,584| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.symphonyhandler.dll| 15.2.858.15| 628,088| 08-Jul-2021| 23:08| x86 \nMicrosoft.exchange.syncmigration.eventlog.dll| 15.2.858.15| 13,176| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.syncmigrationservicelet.dll| 15.2.858.15| 16,264| 08-Jul-2021| 23:22| x86 \nMicrosoft.exchange.systemprobemsg.dll| 15.2.858.15| 13,200| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.textprocessing.dll| 15.2.858.15| 221,560| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.textprocessing.eventlog.dll| 15.2.858.15| 13,712| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.transport.agent.addressbookpolicyroutingagent.dll| 15.2.858.15| 29,064| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.transport.agent.antispam.common.dll| 15.2.858.15| 138,640| 08-Jul-2021| 22:51| x86 \nMicrosoft.exchange.transport.agent.contentfilter.cominterop.dll| 15.2.858.15| 21,896| 08-Jul-2021| 22:12| x86 \nMicrosoft.exchange.transport.agent.controlflow.dll| 15.2.858.15| 40,312| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.transport.agent.faultinjectionagent.dll| 15.2.858.15| 22,920| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.transport.agent.frontendproxyagent.dll| 15.2.858.15| 21,368| 08-Jul-2021| 22:48| x86 \nMicrosoft.exchange.transport.agent.hygiene.dll| 15.2.858.15| 212,368| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.transport.agent.interceptoragent.dll| 15.2.858.15| 98,680| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.transport.agent.liveidauth.dll| 15.2.858.15| 22,904| 08-Jul-2021| 22:48| x86 \nMicrosoft.exchange.transport.agent.malware.dll| 15.2.858.15| 169,360| 08-Jul-2021| 23:09| x86 \nMicrosoft.exchange.transport.agent.malware.eventlog.dll| 15.2.858.15| 18,296| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.transport.agent.phishingdetection.dll| 15.2.858.15| 20,880| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.agent.prioritization.dll| 15.2.858.15| 31,608| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.transport.agent.protocolanalysis.dbaccess.dll| 15.2.858.15| 46,984| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.transport.agent.search.dll| 15.2.858.15| 30,072| 08-Jul-2021| 22:49| x86 \nMicrosoft.exchange.transport.agent.senderid.core.dll| 15.2.858.15| 53,128| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.agent.sharedmailboxsentitemsroutingagent.dll| 15.2.858.15| 44,920| 08-Jul-2021| 22:49| x86 \nMicrosoft.exchange.transport.agent.systemprobedrop.dll| 15.2.858.15| 18,312| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.transport.agent.transportfeatureoverrideagent.dll| 15.2.858.15| 46,472| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.transport.agent.trustedmailagents.dll| 15.2.858.15| 46,472| 08-Jul-2021| 22:53| x86 \nMicrosoft.exchange.transport.cloudmonitor.common.dll| 15.2.858.15| 28,040| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.transport.common.dll| 15.2.858.15| 457,080| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.contracts.dll| 15.2.858.15| 18,296| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.decisionengine.dll| 15.2.858.15| 30,608| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.transport.dll| 15.2.858.15| 4,183,952| 08-Jul-2021| 22:46| x86 \nMicrosoft.exchange.transport.dsapiclient.dll| 15.2.858.15| 182,136| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.eventlog.dll| 15.2.858.15| 121,744| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.transport.extensibility.dll| 15.2.858.15| 403,848| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.extensibilityeventlog.dll| 15.2.858.15| 14,728| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.transport.flighting.dll| 15.2.858.15| 90,000| 08-Jul-2021| 22:11| x86 \nMicrosoft.exchange.transport.logging.dll| 15.2.858.15| 88,952| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.logging.search.dll| 15.2.858.15| 68,488| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.transport.loggingcommon.dll| 15.2.858.15| 63,352| 08-Jul-2021| 22:19| x86 \nMicrosoft.exchange.transport.monitoring.dll| 15.2.858.15| 430,480| 09-Jul-2021| 00:07| x86 \nMicrosoft.exchange.transport.net.dll| 15.2.858.15| 122,248| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.protocols.contracts.dll| 15.2.858.15| 17,808| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.protocols.dll| 15.2.858.15| 29,072| 08-Jul-2021| 22:40| x86 \nMicrosoft.exchange.transport.protocols.httpsubmission.dll| 15.2.858.15| 60,792| 08-Jul-2021| 22:41| x86 \nMicrosoft.exchange.transport.requestbroker.dll| 15.2.858.15| 50,064| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.transport.scheduler.contracts.dll| 15.2.858.15| 33,168| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.scheduler.dll| 15.2.858.15| 113,040| 08-Jul-2021| 22:40| x86 \nMicrosoft.exchange.transport.smtpshared.dll| 15.2.858.15| 18,296| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.transport.storage.contracts.dll| 15.2.858.15| 52,112| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.storage.dll| 15.2.858.15| 675,216| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.transport.storage.management.dll| 15.2.858.15| 23,936| 08-Jul-2021| 22:49| x86 \nMicrosoft.exchange.transport.sync.agents.dll| 15.2.858.15| 17,800| 08-Jul-2021| 23:03| x86 \nMicrosoft.exchange.transport.sync.common.dll| 15.2.858.15| 487,288| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.transport.sync.common.eventlog.dll| 15.2.858.15| 12,672| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.transport.sync.manager.dll| 15.2.858.15| 306,056| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.transport.sync.manager.eventlog.dll| 15.2.858.15| 15,752| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.transport.sync.migrationrpc.dll| 15.2.858.15| 46,480| 08-Jul-2021| 23:02| x86 \nMicrosoft.exchange.transport.sync.worker.dll| 15.2.858.15| 1,044,344| 08-Jul-2021| 23:04| x86 \nMicrosoft.exchange.transport.sync.worker.eventlog.dll| 15.2.858.15| 15,224| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.transportlogsearch.eventlog.dll| 15.2.858.15| 18,824| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.transportsyncmanagersvc.exe| 15.2.858.15| 18,808| 08-Jul-2021| 23:03| x86 \nMicrosoft.exchange.um.troubleshootingtool.shared.dll| 15.2.858.15| 118,664| 08-Jul-2021| 21:47| x86 \nMicrosoft.exchange.um.umcommon.dll| 15.2.858.15| 924,536| 08-Jul-2021| 22:54| x86 \nMicrosoft.exchange.um.umcore.dll| 15.2.858.15| 1,469,328| 08-Jul-2021| 23:00| x86 \nMicrosoft.exchange.um.umvariantconfiguration.dll| 15.2.858.15| 32,656| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.unifiedcontent.dll| 15.2.858.15| 41,864| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.unifiedcontent.exchange.dll| 15.2.858.15| 24,976| 08-Jul-2021| 22:21| x86 \nMicrosoft.exchange.unifiedpolicyfilesync.eventlog.dll| 15.2.858.15| 15,224| 08-Jul-2021| 21:48| x64 \nMicrosoft.exchange.unifiedpolicyfilesyncservicelet.dll| 15.2.858.15| 83,344| 08-Jul-2021| 23:20| x86 \nMicrosoft.exchange.unifiedpolicysyncservicelet.dll| 15.2.858.15| 50,064| 08-Jul-2021| 23:20| x86 \nMicrosoft.exchange.variantconfiguration.antispam.dll| 15.2.858.15| 642,424| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.variantconfiguration.core.dll| 15.2.858.15| 186,248| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.variantconfiguration.dll| 15.2.858.15| 67,448| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.variantconfiguration.eventlog.dll| 15.2.858.15| 12,664| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.variantconfiguration.excore.dll| 15.2.858.15| 56,696| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.variantconfiguration.globalsettings.dll| 15.2.858.15| 27,536| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.variantconfiguration.hygiene.dll| 15.2.858.15| 120,696| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.variantconfiguration.protectionservice.dll| 15.2.858.15| 31,608| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.variantconfiguration.threatintel.dll| 15.2.858.15| 57,208| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.webservices.auth.dll| 15.2.858.15| 35,720| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.webservices.dll| 15.2.858.15| 1,054,072| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.webservices.xrm.dll| 15.2.858.15| 67,984| 08-Jul-2021| 21:42| x86 \nMicrosoft.exchange.wlmservicelet.dll| 15.2.858.15| 23,440| 08-Jul-2021| 22:46| x86 \nMicrosoft.exchange.wopiclient.dll| 15.2.858.15| 77,200| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.workingset.signalapi.dll| 15.2.858.15| 17,272| 08-Jul-2021| 21:48| x86 \nMicrosoft.exchange.workingsetabstraction.signalapiabstraction.dll| 15.2.858.15| 29,072| 08-Jul-2021| 21:43| x86 \nMicrosoft.exchange.workloadmanagement.dll| 15.2.858.15| 505,232| 08-Jul-2021| 22:39| x86 \nMicrosoft.exchange.workloadmanagement.eventlogs.dll| 15.2.858.15| 14,712| 08-Jul-2021| 21:42| x64 \nMicrosoft.exchange.workloadmanagement.throttling.configuration.dll| 15.2.858.15| 36,728| 08-Jul-2021| 21:51| x86 \nMicrosoft.exchange.workloadmanagement.throttling.dll| 15.2.858.15| 66,432| 08-Jul-2021| 22:39| x86 \nMicrosoft.fast.contextlogger.json.dll| 15.2.858.15| 19,344| 08-Jul-2021| 21:42| x86 \nMicrosoft.filtering.dll| 15.2.858.15| 113,016| 08-Jul-2021| 22:12| x86 \nMicrosoft.filtering.exchange.dll| 15.2.858.15| 57,208| 08-Jul-2021| 22:50| x86 \nMicrosoft.filtering.interop.dll| 15.2.858.15| 15,224| 08-Jul-2021| 22:11| x86 \nMicrosoft.forefront.activedirectoryconnector.dll| 15.2.858.15| 46,968| 08-Jul-2021| 22:20| x86 \nMicrosoft.forefront.activedirectoryconnector.eventlog.dll| 15.2.858.15| 15,752| 08-Jul-2021| 21:43| x64 \nMicrosoft.forefront.filtering.common.dll| 15.2.858.15| 23,952| 08-Jul-2021| 21:42| x86 \nMicrosoft.forefront.filtering.diagnostics.dll| 15.2.858.15| 22,416| 08-Jul-2021| 21:42| x86 \nMicrosoft.forefront.filtering.eventpublisher.dll| 15.2.858.15| 34,680| 08-Jul-2021| 21:42| x86 \nMicrosoft.forefront.management.powershell.format.ps1xml| Not applicable| 48,914| 08-Jul-2021| 23:32| Not applicable \nMicrosoft.forefront.management.powershell.types.ps1xml| Not applicable| 16,290| 08-Jul-2021| 23:32| Not applicable \nMicrosoft.forefront.monitoring.activemonitoring.local.components.dll| 15.2.858.15| 1,518,984| 09-Jul-2021| 00:08| x86 \nMicrosoft.forefront.monitoring.activemonitoring.local.components.messages.dll| 15.2.858.15| 13,200| 08-Jul-2021| 21:48| x64 \nMicrosoft.forefront.monitoring.management.outsidein.dll| 15.2.858.15| 33,144| 08-Jul-2021| 23:51| x86 \nMicrosoft.forefront.recoveryactionarbiter.contract.dll| 15.2.858.15| 18,312| 08-Jul-2021| 21:42| x86 \nMicrosoft.forefront.reporting.common.dll| 15.2.858.15| 46,472| 08-Jul-2021| 22:51| x86 \nMicrosoft.forefront.reporting.ondemandquery.dll| 15.2.858.15| 50,552| 08-Jul-2021| 22:54| x86 \nMicrosoft.isam.esent.collections.dll| 15.2.858.15| 72,568| 08-Jul-2021| 21:48| x86 \nMicrosoft.isam.esent.interop.dll| 15.2.858.15| 541,584| 08-Jul-2021| 21:42| x86 \nMicrosoft.managementgui.dll| 15.2.858.15| 133,496| 08-Jul-2021| 21:43| x86 \nMicrosoft.mce.interop.dll| 15.2.858.15| 24,464| 08-Jul-2021| 21:42| x86 \nMicrosoft.office.audit.dll| 15.2.858.15| 124,808| 08-Jul-2021| 21:42| x86 \nMicrosoft.office.client.discovery.unifiedexport.dll| 15.2.858.15| 593,296| 08-Jul-2021| 22:11| x86 \nMicrosoft.office.common.ipcommonlogger.dll| 15.2.858.15| 42,360| 08-Jul-2021| 21:48| x86 \nMicrosoft.office.compliance.console.core.dll| 15.2.858.15| 217,976| 09-Jul-2021| 01:13| x86 \nMicrosoft.office.compliance.console.dll| 15.2.858.15| 854,920| 09-Jul-2021| 01:21| x86 \nMicrosoft.office.compliance.console.extensions.dll| 15.2.858.15| 485,776| 09-Jul-2021| 01:16| x86 \nMicrosoft.office.compliance.core.dll| 15.2.858.15| 413,064| 08-Jul-2021| 21:51| x86 \nMicrosoft.office.compliance.ingestion.dll| 15.2.858.15| 36,216| 08-Jul-2021| 21:48| x86 \nMicrosoft.office.compliancepolicy.exchange.dar.dll| 15.2.858.15| 84,872| 08-Jul-2021| 22:48| x86 \nMicrosoft.office.compliancepolicy.platform.dll| 15.2.858.15| 1,782,160| 08-Jul-2021| 21:42| x86 \nMicrosoft.office.datacenter.activemonitoring.management.common.dll| 15.2.858.15| 49,528| 08-Jul-2021| 22:46| x86 \nMicrosoft.office.datacenter.activemonitoring.management.dll| 15.2.858.15| 27,536| 08-Jul-2021| 22:52| x86 \nMicrosoft.office.datacenter.activemonitoringlocal.dll| 15.2.858.15| 174,984| 08-Jul-2021| 21:51| x86 \nMicrosoft.office.datacenter.monitoring.activemonitoring.recovery.dll| 15.2.858.15| 166,280| 08-Jul-2021| 22:22| x86 \nMicrosoft.office365.datainsights.uploader.dll| 15.2.858.15| 40,336| 08-Jul-2021| 21:42| x86 \nMicrosoft.online.box.shell.dll| 15.2.858.15| 46,472| 08-Jul-2021| 21:42| x86 \nMicrosoft.powershell.hostingtools.dll| 15.2.858.15| 67,984| 08-Jul-2021| 21:42| x86 \nMicrosoft.powershell.hostingtools_2.dll| 15.2.858.15| 67,984| 08-Jul-2021| 21:42| x86 \nMicrosoft.tailoredexperiences.core.dll| 15.2.858.15| 120,184| 08-Jul-2021| 21:48| x86 \nMigrateumcustomprompts.ps1| Not applicable| 19,134| 08-Jul-2021| 21:48| Not applicable \nModernpublicfoldertomailboxmapgenerator.ps1| Not applicable| 29,064| 08-Jul-2021| 21:48| Not applicable \nMovemailbox.ps1| Not applicable| 61,164| 08-Jul-2021| 21:48| Not applicable \nMovetransportdatabase.ps1| Not applicable| 30,586| 08-Jul-2021| 21:48| Not applicable \nMove_publicfolderbranch.ps1| Not applicable| 17,512| 08-Jul-2021| 21:48| Not applicable \nMpgearparser.dll| 15.2.858.15| 99,704| 08-Jul-2021| 21:48| x64 \nMsclassificationadapter.dll| 15.2.858.15| 248,696| 08-Jul-2021| 21:48| x64 \nMsexchangecompliance.exe| 15.2.858.15| 78,712| 08-Jul-2021| 23:13| x86 \nMsexchangedagmgmt.exe| 15.2.858.15| 25,480| 08-Jul-2021| 23:00| x86 \nMsexchangedelivery.exe| 15.2.858.15| 38,776| 08-Jul-2021| 23:00| x86 \nMsexchangefrontendtransport.exe| 15.2.858.15| 31,608| 08-Jul-2021| 22:50| x86 \nMsexchangehmhost.exe| 15.2.858.15| 27,000| 09-Jul-2021| 00:08| x86 \nMsexchangehmrecovery.exe| 15.2.858.15| 29,584| 08-Jul-2021| 22:22| x86 \nMsexchangemailboxassistants.exe| 15.2.858.15| 72,568| 08-Jul-2021| 23:00| x86 \nMsexchangemailboxreplication.exe| 15.2.858.15| 20,872| 08-Jul-2021| 23:07| x86 \nMsexchangemigrationworkflow.exe| 15.2.858.15| 69,000| 08-Jul-2021| 23:11| x86 \nMsexchangerepl.exe| 15.2.858.15| 71,048| 08-Jul-2021| 23:00| x86 \nMsexchangesubmission.exe| 15.2.858.15| 123,280| 08-Jul-2021| 23:07| x86 \nMsexchangethrottling.exe| 15.2.858.15| 39,800| 08-Jul-2021| 22:19| x86 \nMsexchangetransport.exe| 15.2.858.15| 74,112| 08-Jul-2021| 22:20| x86 \nMsexchangetransportlogsearch.exe| 15.2.858.15| 139,144| 08-Jul-2021| 22:51| x86 \nMsexchangewatchdog.exe| 15.2.858.15| 55,688| 08-Jul-2021| 21:48| x64 \nMspatchlinterop.dll| 15.2.858.15| 53,640| 08-Jul-2021| 21:48| x64 \nNativehttpproxy.dll| 15.2.858.15| 91,528| 08-Jul-2021| 21:48| x64 \nNavigatorparser.dll| 15.2.858.15| 636,792| 08-Jul-2021| 21:43| x64 \nNego2nativeinterface.dll| 15.2.858.15| 19,328| 08-Jul-2021| 21:48| x64 \nNegotiateclientcertificatemodule.dll| 15.2.858.15| 30,096| 08-Jul-2021| 21:42| x64 \nNewtestcasconnectivityuser.ps1| Not applicable| 19,744| 08-Jul-2021| 21:48| Not applicable \nNewtestcasconnectivityuserhosting.ps1| Not applicable| 24,563| 08-Jul-2021| 21:47| Not applicable \nNtspxgen.dll| 15.2.858.15| 80,760| 08-Jul-2021| 21:49| x64 \nOleconverter.exe| 15.2.858.15| 173,960| 08-Jul-2021| 21:48| x64 \nOutsideinmodule.dll| 15.2.858.15| 87,952| 08-Jul-2021| 21:48| x64 \nOwaauth.dll| 15.2.858.15| 92,024| 08-Jul-2021| 21:47| x64 \nPerf_common_extrace.dll| 15.2.858.15| 245,112| 08-Jul-2021| 21:42| x64 \nPerf_exchmem.dll| 15.2.858.15| 86,408| 08-Jul-2021| 21:42| x64 \nPipeline2.dll| 15.2.858.15| 1,454,480| 08-Jul-2021| 21:51| x64 \nPreparemoverequesthosting.ps1| Not applicable| 71,007| 08-Jul-2021| 21:48| Not applicable \nPrepare_moverequest.ps1| Not applicable| 73,249| 08-Jul-2021| 21:48| Not applicable \nProductinfo.managed.dll| 15.2.858.15| 27,008| 08-Jul-2021| 21:42| x86 \nProxybinclientsstringsdll| 15.2.858.15| 924,560| 08-Jul-2021| 21:42| x86 \nPublicfoldertomailboxmapgenerator.ps1| Not applicable| 23,258| 08-Jul-2021| 21:48| Not applicable \nQuietexe.exe| 15.2.858.15| 14,728| 08-Jul-2021| 21:42| x86 \nRedistributeactivedatabases.ps1| Not applicable| 250,532| 08-Jul-2021| 21:48| Not applicable \nReinstalldefaulttransportagents.ps1| Not applicable| 21,655| 08-Jul-2021| 23:26| Not applicable \nRemoteexchange.ps1| Not applicable| 23,573| 08-Jul-2021| 23:31| Not applicable \nRemoveuserfrompfrecursive.ps1| Not applicable| 14,696| 08-Jul-2021| 21:48| Not applicable \nReplaceuserpermissiononpfrecursive.ps1| Not applicable| 15,002| 08-Jul-2021| 21:48| Not applicable \nReplaceuserwithuseronpfrecursive.ps1| Not applicable| 14,992| 08-Jul-2021| 21:47| Not applicable \nReplaycrimsonmsg.dll| 15.2.858.15| 1,104,784| 08-Jul-2021| 21:42| x64 \nResetattachmentfilterentry.ps1| Not applicable| 15,476| 08-Jul-2021| 23:26| Not applicable \nResetcasservice.ps1| Not applicable| 21,691| 08-Jul-2021| 21:48| Not applicable \nReset_antispamupdates.ps1| Not applicable| 14,081| 08-Jul-2021| 21:42| Not applicable \nRestoreserveronprereqfailure.ps1| Not applicable| 15,125| 08-Jul-2021| 22:11| Not applicable \nResumemailboxdatabasecopy.ps1| Not applicable| 17,190| 08-Jul-2021| 21:48| Not applicable \nRightsmanagementwrapper.dll| 15.2.858.15| 86,416| 08-Jul-2021| 21:48| x64 \nRollalternateserviceaccountpassword.ps1| Not applicable| 55,810| 08-Jul-2021| 21:48| Not applicable \nRpcperf.dll| 15.2.858.15| 23,440| 08-Jul-2021| 21:42| x64 \nRpcproxyshim.dll| 15.2.858.15| 39,304| 08-Jul-2021| 21:49| x64 \nRulesauditmsg.dll| 15.2.858.15| 12,680| 08-Jul-2021| 21:48| x64 \nSafehtmlnativewrapper.dll| 15.2.858.15| 34,696| 08-Jul-2021| 21:48| x64 \nScanenginetest.exe| 15.2.858.15| 956,280| 08-Jul-2021| 21:48| x64 \nScanningprocess.exe| 15.2.858.15| 739,192| 08-Jul-2021| 21:52| x64 \nSearchdiagnosticinfo.ps1| Not applicable| 16,796| 08-Jul-2021| 21:48| Not applicable \nServicecontrol.ps1| Not applicable| 52,309| 08-Jul-2021| 22:11| Not applicable \nSetmailpublicfolderexternaladdress.ps1| Not applicable| 20,774| 08-Jul-2021| 21:48| Not applicable \nSettingsadapter.dll| 15.2.858.15| 116,088| 08-Jul-2021| 21:42| x64 \nSetup.exe| 15.2.858.15| 20,344| 08-Jul-2021| 21:51| x86 \nSetupui.exe| 15.2.858.15| 188,296| 08-Jul-2021| 23:26| x86 \nSplit_publicfoldermailbox.ps1| Not applicable| 52,169| 08-Jul-2021| 21:47| Not applicable \nStartdagservermaintenance.ps1| Not applicable| 27,847| 08-Jul-2021| 21:48| Not applicable \nStatisticsutil.dll| 15.2.858.15| 142,216| 08-Jul-2021| 21:48| x64 \nStopdagservermaintenance.ps1| Not applicable| 21,133| 08-Jul-2021| 21:48| Not applicable \nStoretsconstants.ps1| Not applicable| 15,842| 08-Jul-2021| 21:48| Not applicable \nStoretslibrary.ps1| Not applicable| 28,003| 08-Jul-2021| 21:48| Not applicable \nStore_mapi_net_bin_perf_x64_exrpcperf.dll| 15.2.858.15| 28,560| 08-Jul-2021| 21:48| x64 \nSync_mailpublicfolders.ps1| Not applicable| 43,911| 08-Jul-2021| 21:48| Not applicable \nSync_modernmailpublicfolders.ps1| Not applicable| 43,973| 08-Jul-2021| 21:48| Not applicable \nTextconversionmodule.dll| 15.2.858.15| 86,408| 08-Jul-2021| 21:48| x64 \nTroubleshoot_ci.ps1| Not applicable| 22,727| 08-Jul-2021| 21:48| Not applicable \nTroubleshoot_databaselatency.ps1| Not applicable| 33,433| 08-Jul-2021| 21:48| Not applicable \nTroubleshoot_databasespace.ps1| Not applicable| 30,049| 08-Jul-2021| 21:48| Not applicable \nUninstall_antispamagents.ps1| Not applicable| 15,453| 08-Jul-2021| 21:42| Not applicable \nUpdateapppoolmanagedframeworkversion.ps1| Not applicable| 14,042| 08-Jul-2021| 21:48| Not applicable \nUpdatecas.ps1| Not applicable| 35,782| 08-Jul-2021| 22:12| Not applicable \nUpdateconfigfiles.ps1| Not applicable| 19,722| 08-Jul-2021| 22:12| Not applicable \nUpdateserver.exe| 15.2.858.15| 3,014,536| 08-Jul-2021| 21:49| x64 \nUpdate_malwarefilteringserver.ps1| Not applicable| 18,176| 08-Jul-2021| 21:48| Not applicable \nWeb.config_053c31bdd6824e95b35d61b0a5e7b62d| Not applicable| 31,814| 09-Jul-2021| 01:10| Not applicable \nWsbexchange.exe| 15.2.858.15| 125,328| 08-Jul-2021| 21:48| x64 \nX400prox.dll| 15.2.858.15| 103,288| 08-Jul-2021| 21:43| x64 \n_search.lingoperators.a| 15.2.858.15| 34,688| 08-Jul-2021| 22:41| Not applicable \n_search.lingoperators.b| 15.2.858.15| 34,688| 08-Jul-2021| 22:41| Not applicable \n_search.mailboxoperators.a| 15.2.858.15| 290,168| 08-Jul-2021| 23:04| Not applicable \n_search.mailboxoperators.b| 15.2.858.15| 290,168| 08-Jul-2021| 23:04| Not applicable \n_search.operatorschema.a| 15.2.858.15| 485,776| 08-Jul-2021| 22:39| Not applicable \n_search.operatorschema.b| 15.2.858.15| 485,776| 08-Jul-2021| 22:39| Not applicable \n_search.tokenoperators.a| 15.2.858.15| 113,528| 08-Jul-2021| 22:39| Not applicable \n_search.tokenoperators.b| 15.2.858.15| 113,528| 08-Jul-2021| 22:39| Not applicable \n_search.transportoperators.a| 15.2.858.15| 67,976| 08-Jul-2021| 23:08| Not applicable \n_search.transportoperators.b| 15.2.858.15| 67,976| 08-Jul-2021| 23:08| Not applicable \n \n## Information about protection and security\n\nProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.0, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-07-13T07:00:00", "type": "mskb", "title": "Description of the security update for Microsoft Exchange Server 2019: July 13, 2021 (KB5004780)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 5.5, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.9, "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-33768"], "modified": "2021-07-13T07:00:00", "id": "KB5004780", "href": "https://support.microsoft.com/en-us/help/5004780", "cvss": {"score": 7.9, "vector": "AV:A/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-23T19:38:34", "description": "None\nThis security update rollup resolves vulnerabilities in Microsoft Exchange Server. To learn more about these vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE):\n\n * [CVE-2021-31196 | Microsoft Exchange Server Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-31196>)\n * [CVE-2021-31206 | Microsoft Exchange Server Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-31206>)\n * [CVE-2021-34470 | Microsoft Exchange Server Elevation of Privilege Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-34470>)\n\n## Improvements in this update\n\n * The Exchange Server version number is now added to the HTTP response reply header. You can use this information to validate the security update status of Exchange-based servers in your network.\n\n**Important: **To be able to successfully install this security update, you must first follow the steps [in this article](<https://docs.microsoft.com/en-us/exchange/troubleshoot/administration/cannot-access-owa-or-ecp-if-oauth-expired>) to make sure that the server authentication certificate is present and is not expired. If the OAuth certificate is not present or is expired, republish the certificate before you install this update.\n\n## Known issues in this update\n\n * **Issue 1** \n \nWhen you try to manually install this security update by double-clicking the update file (.msp) to run it in Normal mode (that is, not as an administrator), some files are not correctly updated.When this issue occurs, you don\u2019t receive an error message or any indication that the security update was not correctly installed. However, Outlook Web Access (OWA) and the Exchange Control Panel (ECP) might stop working. \n \nThis issue occurs on servers that are using User Account Control (UAC). The issue occurs because the security update doesn\u2019t correctly stop certain Exchange-related services.\n\n**Note: **This issue does not occur if you install the update through Microsoft Update.\n\nTo avoid this issue, follow these steps to manually install this security update:\n 1. Select **Start**, and type **cmd**.\n 2. In the results, right-click **Command Prompt**, and then select **Run as administrator**.\n 3. If the **User Account Control** dialog box appears, verify that the default action is the action that you want, and then select **Continue**.\n 4. Type the full path of the .msp file, and then press Enter.\n * **Issue 2** \n \nExchange services might remain in a disabled state after you install this security update. This condition does not indicate that the update is not installed correctly. This condition might occur if the service control scripts experience a problem when they try to return Exchange services to their usual state. \n \nTo fix this issue, use Services Manager to restore the startup type to **Automatic**, and then start the affected Exchange services manually. To avoid this issue, run the security update at an elevated command prompt. For more information about how to open an elevated Command Prompt window, see [Start a Command Prompt as an Administrator](<https://technet.microsoft.com/en-us/library/cc947813\\(v=ws.10\\).aspx>).\n * **Issue 3** \n \nWhen you block third-party cookies in a web browser, you might be continually prompted to trust a particular add-in even though you keep selecting the option to trust it. This issue occurs also in privacy window modes (such as InPrivate mode in Microsoft Edge). This issue occurs because browser restrictions prevent the response from being recorded. To record the response and enable the add-in, you must enable third-party cookies for the domain that's hosting OWA or Office Online Server in the browser settings. To enable this setting, refer to the specific support documentation for the browser.\n * **Issue 4** \n \nWhen you try to request free/busy information for a user in a different forest in a trusted cross-forest topology, the request fails and generates a \"(400) Bad Request\" error message. For more information and workarounds to this issue, see [\"(400) Bad Request\" error during Autodiscover for per-user free/busy in a trusted cross-forest topology](<https://support.microsoft.com/help/5003623>).\n * **Issue 5** \n \nAfter you install Microsoft Exchange Server 2019, 2016, or 2013, you can't access Outlook Web App (OWA) or Exchange Control Panel (ECP). For more information, see [Can't sign in to Outlook on the web or EAC if Exchange Server OAuth certificate is expired](<https://docs.microsoft.com/en-us/exchange/troubleshoot/administration/cannot-access-owa-or-ecp-if-oauth-expired>).\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5004778>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center.\n\n * [Download Security Update 10 for Exchange Server 2013 Cumulative Update 23 (KB5004778)](<https://www.microsoft.com/download/details.aspx?familyid=cae731a5-0d00-4f76-b2c6-84bd511e529f>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: July 13, 2021](<https://support.microsoft.com/topic/24aa34b8-b210-41cf-adbb-44b8a9ae84dc>).\n\n### Security update replacement information\n\nThis security update replaces the following previously released updates:\n\n * [Description of the security update for Microsoft Exchange Server 2019, 2016, and 2013: May 11, 2021 (KB5003435)](<https://support.microsoft.com/help/5003435>)\n\n## File information\n\n### File hash information\n\nUpdate name| File name| | SHA256 hash \n---|---|---|--- \nExchange Server 2013 Cumulative Update 23| Exchange2013-KB5004778-x64-en.msp| | 661A09E1AB2F195DED29F5579108782FBA6D00D2A900EF9EE0F5F2F9CCD61DB6 \n \n### Exchange Server file information\n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n### \n\n__\n\nMicrosoft Exchange Server 2013 Cumulative Update 23\n\nFile name| File version| File size| Date| Time| Platform \n---|---|---|---|---|--- \nAdduserstopfrecursive.ps1| Not applicable| 15,054| 07-Jul-2021| 23:44| Not applicable \nAjaxcontroltoolkit.dll| 15.0.1497.23| 96,696| 07-Jul-2021| 23:45| x86 \nCafe_owaauth_dll| 15.0.1497.23| 91,568| 07-Jul-2021| 23:44| x64 \nCheckinvalidrecipients.ps1| Not applicable| 23,121| 07-Jul-2021| 23:44| Not applicable \nCitsconstants.ps1| Not applicable| 15,877| 07-Jul-2021| 23:45| Not applicable \nCitslibrary.ps1| Not applicable| 82,740| 07-Jul-2021| 23:45| Not applicable \nCitstypes.ps1| Not applicable| 14,540| 07-Jul-2021| 23:45| Not applicable \nCommonconnectfunctions.ps1| Not applicable| 30,007| 07-Jul-2021| 23:44| Not applicable \nConfigureadam.ps1| Not applicable| 23,383| 07-Jul-2021| 23:44| Not applicable \nConfigurecaferesponseheaders.ps1| Not applicable| 19,977| 07-Jul-2021| 23:44| Not applicable \nConfigurenetworkprotocolparameters.ps1| Not applicable| 19,348| 07-Jul-2021| 23:44| Not applicable \nConfiguresmbipsec.ps1| Not applicable| 39,903| 07-Jul-2021| 23:44| Not applicable \nConfigure_enterprisepartnerapplication.ps1| Not applicable| 22,332| 07-Jul-2021| 23:44| Not applicable \nConnectfunctions.ps1| Not applicable| 38,379| 07-Jul-2021| 23:44| Not applicable \nConnect_exchangeserver_help.xml| Not applicable| 30,432| 07-Jul-2021| 23:43| Not applicable \nConsoleinitialize.ps1| Not applicable| 24,308| 07-Jul-2021| 23:44| Not applicable \nConvertoabvdir.ps1| Not applicable| 20,129| 07-Jul-2021| 23:44| Not applicable \nConverttomessagelatency.ps1| Not applicable| 14,608| 07-Jul-2021| 23:44| Not applicable \nCts_microsoft.exchange.data.common.dll| 15.0.1497.23| 1,653,248| 07-Jul-2021| 23:45| x86 \nDiagnosticscriptcommonlibrary.ps1| Not applicable| 16,410| 07-Jul-2021| 23:45| Not applicable \nDisableinmemorytracing.ps1| Not applicable| 13,438| 07-Jul-2021| 23:44| Not applicable \nDisable_antimalwarescanning.ps1| Not applicable| 15,265| 07-Jul-2021| 23:44| Not applicable \nDisable_outsidein.ps1| Not applicable| 13,730| 07-Jul-2021| 23:45| Not applicable \nDup_cts_microsoft.exchange.data.common.dll| 15.0.1497.23| 1,653,248| 07-Jul-2021| 23:45| x86 \nDup_ext_microsoft.exchange.data.transport.dll| 15.0.1497.23| 396,752| 07-Jul-2021| 23:46| x86 \nEdgetransport.exe| 15.0.1497.23| 40,944| 07-Jul-2021| 23:45| x86 \nEnableinmemorytracing.ps1| Not applicable| 13,436| 07-Jul-2021| 23:45| Not applicable \nEnable_antimalwarescanning.ps1| Not applicable| 17,639| 07-Jul-2021| 23:45| Not applicable \nEnable_crossforestconnector.ps1| Not applicable| 18,674| 07-Jul-2021| 23:45| Not applicable \nEnable_outlookcertificateauthentication.ps1| Not applicable| 22,975| 07-Jul-2021| 23:45| Not applicable \nEnable_outsidein.ps1| Not applicable| 13,723| 07-Jul-2021| 23:45| Not applicable \nExchange.depthtwo.types.ps1xml| Not applicable| 38,399| 07-Jul-2021| 23:44| Not applicable \nExchange.format.ps1xml| Not applicable| 502,262| 07-Jul-2021| 23:44| Not applicable \nExchange.partial.types.ps1xml| Not applicable| 32,625| 07-Jul-2021| 23:44| Not applicable \nExchange.ps1| Not applicable| 20,595| 07-Jul-2021| 23:44| Not applicable \nExchange.support.format.ps1xml| Not applicable| 26,618| 07-Jul-2021| 23:45| Not applicable \nExchange.types.ps1xml| Not applicable| 334,333| 07-Jul-2021| 23:44| Not applicable \nExchucutil.ps1| Not applicable| 23,996| 07-Jul-2021| 23:45| Not applicable \nExportedgeconfig.ps1| Not applicable| 27,467| 07-Jul-2021| 23:45| Not applicable \nExport_mailpublicfoldersformigration.ps1| Not applicable| 36,594| 07-Jul-2021| 23:45| Not applicable \nExport_publicfolderstatistics.ps1| Not applicable| 23,205| 07-Jul-2021| 23:45| Not applicable \nExport_retentiontags.ps1| Not applicable| 17,120| 07-Jul-2021| 23:45| Not applicable \nExrpc32.dll| 15.0.1497.23| 1,683,376| 07-Jul-2021| 23:45| x64 \nExsetdata.dll| 15.0.1497.23| 1,749,936| 07-Jul-2021| 23:44| x64 \nExsetup.exe| 15.0.1497.23| 35,328| 07-Jul-2021| 23:45| x86 \nExsetupui.exe| 15.0.1497.23| 199,168| 07-Jul-2021| 23:45| x86 \nExt_microsoft.exchange.data.transport.dll| 15.0.1497.23| 396,752| 07-Jul-2021| 23:46| x86 \nFil00a59b0bf9ad6dbefafaeb21bc52cadc| Not applicable| 160,921| 10-Sep-2020| 08:09| Not applicable \nFil01265e3f95fffa90f103d6045ee1b646| Not applicable| 207,584| 10-Sep-2020| 08:08| Not applicable \nFil01464b610a1b9ca44bfd4aa2b20a0a47| Not applicable| 242,360| 10-Sep-2020| 08:08| Not applicable \nFil024514f3668d7fae2909c604a07f2cae| Not applicable| 118,512| 10-Sep-2020| 08:09| Not applicable \nFil02886dbc65954c74ff5f004a4de087d0| Not applicable| 382,584| 10-Sep-2020| 08:10| Not applicable \nFil02aa6af1a7515d4d79a36ff53c2451cc| Not applicable| 202,224| 10-Sep-2020| 08:10| Not applicable \nFil03094a694b8e463b811188f1414aafd9| Not applicable| 1,562| 10-Sep-2020| 08:10| Not applicable \nFil0346bb60fed433908e0d629870fa234f| Not applicable| 42,453| 10-Sep-2020| 08:10| Not applicable \nFil03d6f5ce7cdbd650b4e31b9b17bfebdf| Not applicable| 63,034| 10-Sep-2020| 08:09| Not applicable \nFil03df293f7a64512c7994f03b06b1cc9d| Not applicable| 122,028| 10-Sep-2020| 08:08| Not applicable \nFil04648c9ff8319a4b2f4228ef41f3d558| Not applicable| 188,610| 10-Sep-2020| 08:09| Not applicable \nFil04be20231e54d4b1b9ae0adcee287d33| Not applicable| 3,319| 10-Sep-2020| 08:10| Not applicable \nFil05bd0d7761664f4f3447bc8b82cba551| Not applicable| 260,796| 10-Sep-2020| 08:08| Not applicable \nFil07291eda8c3b4bef35c20b117bc4dc89| Not applicable| 11,065| 10-Sep-2020| 08:03| Not applicable \nFil073611cea59a04ae5959ec5466f4f770| Not applicable| 206,119| 10-Sep-2020| 08:10| Not applicable \nFil07a54aa7bb7bff7a7ebaa792bbf2dcc3| Not applicable| 12,920| 10-Sep-2020| 08:10| Not applicable \nFil07d1178f9b4ec96c22a8240722e0bf9f| Not applicable| 381,584| 10-Sep-2020| 08:09| Not applicable \nFil0807d7ff1190d89482f9590435e63704| Not applicable| 376,675| 10-Sep-2020| 08:09| Not applicable \nFil08a4c36edaa0a358721425799ae714fa| Not applicable| 243,898| 10-Sep-2020| 08:08| Not applicable \nFil092fbdf7953d47bcaec4c494ad2a4620| Not applicable| 142,751| 10-Sep-2020| 08:11| Not applicable \nFil093c3f7e3d75f52ac3ae90f8d5c582cc| Not applicable| 229,663| 10-Sep-2020| 08:08| Not applicable \nFil095e2ae2aad7e5fe67147fa275cf3657| Not applicable| 200,119| 10-Sep-2020| 08:09| Not applicable \nFil097d6a2a5acff36af3b3de457fece43f| Not applicable| 317,272| 10-Sep-2020| 08:08| Not applicable \nFil098cd77950ecc93e59a6d478029be507| Not applicable| 2,003,210| 10-Sep-2020| 08:06| Not applicable \nFil0994fb28dc0ef8f87218c621ae86e134| Not applicable| 286,293| 10-Sep-2020| 08:11| Not applicable \nFil0aff9b8e03ff8a9bb1517388f2c44d1a| Not applicable| 14,524| 10-Sep-2020| 08:10| Not applicable \nFil0bfa47954dd042005e90c2bd01cd0a37| Not applicable| 142,850| 10-Sep-2020| 08:08| Not applicable \nFil0d721f7ce4137c3bd63bdc89da0bb5cb| Not applicable| 236,086| 10-Sep-2020| 08:08| Not applicable \nFil0dbb9c355360df6a4459d2007004c9e3| Not applicable| 208,728| 10-Sep-2020| 08:10| Not applicable \nFil0dcd409d2cf1a0fe1b1d23995972047e| Not applicable| 264,787| 10-Sep-2020| 08:09| Not applicable \nFil0dd00b83250a9921930f80dfadd64420| Not applicable| 167,266| 10-Sep-2020| 08:10| Not applicable \nFil0ee631acb4cbeba6a8ce8838790ffba3| Not applicable| 225,959| 10-Sep-2020| 08:08| Not applicable \nFil0fe6c543ad5dce68f8da1d128ebff332| Not applicable| 303,122| 10-Sep-2020| 08:10| Not applicable \nFil0fefc0bb7650de7a8e100f27290b316c| Not applicable| 939| 10-Sep-2020| 08:10| Not applicable \nFil1049e7dbf56476ddca7fbcdd54f1b796| Not applicable| 146,378| 10-Sep-2020| 08:10| Not applicable \nFil11364618faea90d632e254088444fc52| Not applicable| 3,359| 10-Sep-2020| 08:10| Not applicable \nFil1173f6b39fe7c9d910b8dc5bd19521f8| Not applicable| 361,118| 10-Sep-2020| 08:09| Not applicable \nFil119e3a5d3db8bc97fc7e5f8e81f2f8ca| Not applicable| 197,448| 10-Sep-2020| 08:08| Not applicable \nFil1270dc39571f9c7aa6cfaadeff4f3640| Not applicable| 171,559| 10-Sep-2020| 08:07| Not applicable \nFil129c1192b00260084863bfb442d9ef93| Not applicable| 1,303| 10-Sep-2020| 08:10| Not applicable \nFil13fb2417bf46b85b2993d051b8ab7c66| Not applicable| 330,130| 10-Sep-2020| 08:08| Not applicable \nFil1426532f337ffd248ad8526e66f9fed6| Not applicable| 147,629| 10-Sep-2020| 08:09| Not applicable \nFil1591caf2c0ed95d3d7dc675a20701ee6| Not applicable| 114,064| 10-Sep-2020| 08:08| Not applicable \nFil15f38a12988013e8d68ce239be0d5f3d| Not applicable| 171,283| 10-Sep-2020| 08:08| Not applicable \nFil162350ffb26be403359faaf6c45406cf| Not applicable| 163,899| 10-Sep-2020| 08:08| Not applicable \nFil162b0371ffc6ab85232d5f1c2f4997e7| Not applicable| 9,782| 10-Sep-2020| 08:10| Not applicable \nFil1696980eba48067e2ae900f45faad78e| Not applicable| 1,875| 10-Sep-2020| 08:10| Not applicable \nFil16fca2f0aaead1fbec7a463ca606a1ec| Not applicable| 370,126| 10-Sep-2020| 08:08| Not applicable \nFil19183400565ab2ccc44ecaa477a5e3d1| Not applicable| 15,230| 10-Sep-2020| 08:03| Not applicable \nFil199e6bdb4f3b2b47c763319633da1136| Not applicable| 327,350| 10-Sep-2020| 08:08| Not applicable \nFil19ccdd118db9bfc3475814a4b4e08c08| Not applicable| 584,377| 10-Sep-2020| 08:08| Not applicable \nFil1a3b1da5816e3bb64056cf149788066b| Not applicable| 480,547| 10-Sep-2020| 08:10| Not applicable \nFil1ac6267c3eb50d8e405d35e06e7c7878| Not applicable| 15,933| 10-Sep-2020| 08:10| Not applicable \nFil1b70faaee4a16f481d3565f701d210d2| Not applicable| 194,186| 10-Sep-2020| 08:10| Not applicable \nFil1bb83920715900f568a44fea64ebdf14| Not applicable| 409,070| 10-Sep-2020| 08:10| Not applicable \nFil1bbf3e38efe960ca2113daaab481b364| Not applicable| 3,474| 10-Sep-2020| 08:10| Not applicable \nFil1e3e47d491e73bf0ce9bd6368a869661| Not applicable| 114,721| 10-Sep-2020| 08:09| Not applicable \nFil1ebaeefd7727d6252ca22a5e152fc343| Not applicable| 8,138| 10-Sep-2020| 08:10| Not applicable \nFil1f3158c2364004336fefd7fa8c62086b| Not applicable| 327,640| 10-Sep-2020| 08:09| Not applicable \nFil1f475a8603a1bbd01e1a40d53c813c9c| Not applicable| 315,635| 10-Sep-2020| 08:10| Not applicable \nFil1fff4b705c9647b4ff3f83b020b2e237| Not applicable| 370,164| 10-Sep-2020| 08:10| Not applicable \nFil2039f6f47019d7eb8d50a7d7387e1326| Not applicable| 118,107| 10-Sep-2020| 08:10| Not applicable \nFil208b9e5328593cd0b5013b4cae2713f9| Not applicable| 335,423| 10-Sep-2020| 08:08| Not applicable \nFil2093384b2fd2dd4694e4452e9aacfc18| Not applicable| 383,683| 10-Sep-2020| 08:07| Not applicable \nFil20b9a11913964b245854e564a94544ed| Not applicable| 144,647| 10-Sep-2020| 08:08| Not applicable \nFil20e584fabe14655761b29e602eed5cc9| Not applicable| 182,170| 10-Sep-2020| 08:07| Not applicable \nFil2143e07c2cac620dfefafd058902b0d3| Not applicable| 2,915| 10-Sep-2020| 08:10| Not applicable \nFil222a09c547b07ae712f31cf9175a5717| Not applicable| 116,530| 10-Sep-2020| 08:08| Not applicable \nFil2294c86871eb9882419d11de13a0e558| Not applicable| 866| 10-Sep-2020| 08:10| Not applicable \nFil2294eb56822388c24312aee15bef4d72| Not applicable| 3,423| 10-Sep-2020| 08:10| Not applicable \nFil235c6fa467f8662a9bcbd6fac8df465b| Not applicable| 117,287| 10-Sep-2020| 08:07| Not applicable \nFil240bcf2747ef1821d63068b04d54a07d| Not applicable| 163,794| 10-Sep-2020| 08:11| Not applicable \nFil24622e71b4f201522c30b5396079ebf9| Not applicable| 151,701| 10-Sep-2020| 08:08| Not applicable \nFil247b22302db2287f03bd385ba61ffe55| Not applicable| 398,137| 10-Sep-2020| 08:07| Not applicable \nFil25727a6a764ebd6cd89550c2c031c37c| Not applicable| 160,115| 10-Sep-2020| 08:08| Not applicable \nFil265b8ec6d4ed498b5382cfc1027491a2| Not applicable| 82,741| 10-Sep-2020| 08:09| Not applicable \nFil280c8cbd4386b442b5c94af6708eaac8| Not applicable| 16,625| 10-Sep-2020| 08:10| Not applicable \nFil283358d58bb98df0557b67b6f747c86a| Not applicable| 460,146| 10-Sep-2020| 08:07| Not applicable \nFil28b2b9d1b7e313e502a8835045c2d0d0| Not applicable| 15,031| 10-Sep-2020| 08:10| Not applicable \nFil2a6b0663833d438eea50ffe81c51ec83| Not applicable| 2,003,228| 10-Sep-2020| 08:05| Not applicable \nFil2adab262add65203b0c7c5bc1251e47f| Not applicable| 312,638| 10-Sep-2020| 08:08| Not applicable \nFil2b2ac38f6e7b4a0553da72f403582cd5| Not applicable| 1,727| 10-Sep-2020| 08:10| Not applicable \nFil2bd8c15c9164155f212951a70631823f| Not applicable| 5,285| 10-Sep-2020| 08:10| Not applicable \nFil2c21ffd8eb5ecd0f7c89a27b86951a7d| Not applicable| 10,821| 10-Sep-2020| 08:09| Not applicable \nFil2db733aabd2264a64057e89820aca13c| Not applicable| 13,759| 10-Sep-2020| 08:10| Not applicable \nFil2e63bcb4a6d04e10c147a6c3f92bfcab| Not applicable| 670,945| 10-Sep-2020| 08:09| Not applicable \nFil2e6b2f8c3954b6bbc8ab2a22d1438d67| Not applicable| 114,990| 10-Sep-2020| 08:09| Not applicable \nFil2eba4c3b1398dc2169d3a58cf26d7494| Not applicable| 3,169| 10-Sep-2020| 08:10| Not applicable \nFil2f58bbe281f35794e1fadfd2d5372340| Not applicable| 151,951| 10-Sep-2020| 08:09| Not applicable \nFil31e9f5684b0b5ea70746907556f64515| Not applicable| 296,876| 10-Sep-2020| 08:09| Not applicable \nFil32c87816f9a713092dc110787ef42586| Not applicable| 35,050| 10-Sep-2020| 08:08| Not applicable \nFil32ede05fb6827d1a783e56be2937e471| Not applicable| 153,091| 10-Sep-2020| 08:08| Not applicable \nFil344d9c6f4f02142eba8c624f965acd67| Not applicable| 121,941| 10-Sep-2020| 08:08| Not applicable \nFil363d000c227039f27c69b128287ff68e| Not applicable| 186,041| 10-Sep-2020| 08:07| Not applicable \nFil36da999539f10f4939d3c19fb7e77d53| Not applicable| 11,324| 10-Sep-2020| 08:09| Not applicable \nFil37589a1bee605be2ae1422c6d19521cd| Not applicable| 384,396| 10-Sep-2020| 08:09| Not applicable \nFil3804327ae3bca4c1a589eed2acaf0909| Not applicable| 1,739| 10-Sep-2020| 08:10| Not applicable \nFil38494a0e60def94d88e8724029463551| Not applicable| 83,497| 10-Sep-2020| 08:07| Not applicable \nFil3859e6d9c6cf748d05be23536b9221c4| Not applicable| 124,060| 10-Sep-2020| 08:10| Not applicable \nFil39ee1f35ad97bd462c3ac5aec000a1c0| Not applicable| 210,413| 10-Sep-2020| 08:10| Not applicable \nFil3a42ef50a1ae3edbb7a00bc22f3434e3| Not applicable| 24,337| 10-Sep-2020| 08:03| Not applicable \nFil3b12709b2a6d1f6a5a9d96edbc2a9dd2| Not applicable| 211,288| 10-Sep-2020| 08:09| Not applicable \nFil3b8cc2b36f720baad95be0910e9346eb| Not applicable| 154,799| 10-Sep-2020| 08:10| Not applicable \nFil3c3fb88b0193db7b45726833c054d1ed| Not applicable| 4,920| 10-Sep-2020| 08:10| Not applicable \nFil3cccb1e1cc9707666a7232847b28158a| Not applicable| 148,810| 10-Sep-2020| 08:10| Not applicable \nFil3d3af8f03141aadd16d3951f471e4ecd| Not applicable| 472,586| 10-Sep-2020| 08:10| Not applicable \nFil3d952efb9613d0f0fa9c884c2e197c47| Not applicable| 64,742| 10-Sep-2020| 08:07| Not applicable \nFil3d96340571dcbbca40f9dda36cf8cc23| Not applicable| 376,491| 10-Sep-2020| 08:08| Not applicable \nFil3db21a7c265bee0f8897197ab8184cbb| Not applicable| 407,449| 10-Sep-2020| 08:11| Not applicable \nFil3e7cd5352ab27351d37dc5a0d70eb5da| Not applicable| 8,202| 10-Sep-2020| 08:10| Not applicable \nFil401dc81859f7ddf0518e04d60fb6f0f0| Not applicable| 127,242| 10-Sep-2020| 08:08| Not applicable \nFil4032894f9d18775fe5b8f517b9446ed2| Not applicable| 247,259| 10-Sep-2020| 08:09| Not applicable \nFil426e71bd7d39fbdac2f9aac2641b16f3| Not applicable| 1,923| 10-Sep-2020| 08:10| Not applicable \nFil4278d1df336a84435b4ce9034fb1a172| Not applicable| 718| 10-Sep-2020| 08:10| Not applicable \nFil42a5edd14a3d3f555fcd6172e48921fb| Not applicable| 157,961| 10-Sep-2020| 08:09| Not applicable \nFil42c22971f1d5dc2196265e92d6da872f| Not applicable| 150,392| 10-Sep-2020| 08:11| Not applicable \nFil442f08df8632cfa5f8638445f7151f04| Not applicable| 956| 10-Sep-2020| 08:10| Not applicable \nFil449a3b586a9163232e7d21b204dff9e2| Not applicable| 1,316| 10-Sep-2020| 08:10| Not applicable \nFil44a698d38545e9cd051d9db8fdfc900e| Not applicable| 225,606| 10-Sep-2020| 08:10| Not applicable \nFil44afe89b21b16bf4b609ab451085526a| Not applicable| 373,865| 10-Sep-2020| 08:08| Not applicable \nFil44d189470b9393ed19ca08defd240a38| Not applicable| 216,698| 10-Sep-2020| 08:10| Not applicable \nFil45cd37ad6b0169d99d0eb6dcba7d08d9| Not applicable| 166,781| 10-Sep-2020| 08:10| Not applicable \nFil46233812dcee5af00423b2fc332d0c5d| Not applicable| 2,015,045| 10-Sep-2020| 08:05| Not applicable \nFil46ef8081ccac6e0c239c52cfc8c58dcf| Not applicable| 4,743| 10-Sep-2020| 08:07| Not applicable \nFil476b430823a50cf77d9968f03858d69d| Not applicable| 359,078| 10-Sep-2020| 08:08| Not applicable \nFil481ea15e0071beee36e6711fe55c7372| Not applicable| 307,725| 10-Sep-2020| 08:08| Not applicable \nFil4a3306ef5eda0d022a521f8bd6c3d940| Not applicable| 158,115| 10-Sep-2020| 08:08| Not applicable \nFil4a79082a6a63aa24efbd3f71b1a9f8e8| Not applicable| 139,064| 10-Sep-2020| 08:09| Not applicable \nFil4aa30f91267dc1dffacc9bb3f9e43367| Not applicable| 1,972| 10-Sep-2020| 08:10| Not applicable \nFil4b622a1d73e8a02febd3ad6f59e8b98c| Not applicable| 12,107| 10-Sep-2020| 08:10| Not applicable \nFil4bc634eae6f3c142c6ed8d2927520cc3| Not applicable| 5,653| 10-Sep-2020| 08:10| Not applicable \nFil4bd7eb36b7c3567f715d5365f8047204| Not applicable| 142,286| 10-Sep-2020| 08:10| Not applicable \nFil4c0ab8720533c89e68ce63e86d429dde| Not applicable| 381,163| 10-Sep-2020| 08:08| Not applicable \nFil4c177d04b538b102de0bc7af504ade88| Not applicable| 1,264| 10-Sep-2020| 08:10| Not applicable \nFil4cc43ed047118c3c70489c99f391ad41| Not applicable| 570,339| 10-Sep-2020| 08:08| Not applicable \nFil4cfa7a61721252f62fb29a0f1805bd48| Not applicable| 151,467| 10-Sep-2020| 08:09| Not applicable \nFil4d0f14d8c2b6b77898bcc5954a8335d4| Not applicable| 12,161| 10-Sep-2020| 08:10| Not applicable \nFil4d393ab247c2ec19d982c087d694252e| Not applicable| 485,168| 10-Sep-2020| 08:09| Not applicable \nFil4e4dfdf527ace3b42d88eaea58ad4e00| Not applicable| 110,057| 10-Sep-2020| 08:11| Not applicable \nFil4f050d584b052cef56c611c7a6fc0b4d| Not applicable| 440,314| 10-Sep-2020| 08:10| Not applicable \nFil4f0ff802c3382fc6cb28e90145915a91| Not applicable| 155,232| 10-Sep-2020| 08:08| Not applicable \nFil4fbdcc69c6687636e427226aab76d82c| Not applicable| 165,120| 10-Sep-2020| 08:08| Not applicable \nFil50c8b757b4933533069fdb8f6b905e0d| Not applicable| 158,190| 10-Sep-2020| 08:09| Not applicable \nFil50e303dde9fe96807796a25979e2814a| Not applicable| 252,966| 10-Sep-2020| 08:08| Not applicable \nFil538089ef224df4976d311e8302364c00| Not applicable| 1,152,608| 10-Sep-2020| 08:12| Not applicable \nFil5387207480a1873bc7ed50c9eaed89c7| Not applicable| 2,003,225| 10-Sep-2020| 08:06| Not applicable \nFil53acea05108c4f46ff21c66f40cfaeec| Not applicable| 150,387| 10-Sep-2020| 08:08| Not applicable \nFil540e2d0af94e0e486cae7a4a9e109676| Not applicable| 215,778| 10-Sep-2020| 08:10| Not applicable \nFil541882cdf469df98dbf0ac462de46344| Not applicable| 575,597| 10-Sep-2020| 08:09| Not applicable \nFil543079c26bd28998e4563bbd4cac1644| Not applicable| 4,186| 10-Sep-2020| 08:10| Not applicable \nFil54337210b89f5380a40a0904d6d860f8| Not applicable| 1,729| 10-Sep-2020| 08:10| Not applicable \nFil5542b08a74ea880a5f2bd8b269fc1231| Not applicable| 250,545| 10-Sep-2020| 08:09| Not applicable \nFil57beb556aec2d6e97c7b317de9f72304| Not applicable| 322,662| 10-Sep-2020| 08:08| Not applicable \nFil57fcce90719eee5eff1f954327649e53| Not applicable| 222,952| 10-Sep-2020| 08:08| Not applicable \nFil58337dc668f3e1a94ebd035dc310ef3a| Not applicable| 3,653| 10-Sep-2020| 08:10| Not applicable \nFil59074b5deefeb2b4d32b58953cb77f9e| Not applicable| 202,678| 10-Sep-2020| 08:07| Not applicable \nFil596d2b532682a216aced5af81a34785e| Not applicable| 371,817| 10-Sep-2020| 08:08| Not applicable \nFil5aef2df4d623713792ff2e54a0abea77| Not applicable| 3,391| 10-Sep-2020| 08:10| Not applicable \nFil5b481af97947b02636fefbad6cf5332e| Not applicable| 10,504| 10-Sep-2020| 08:10| Not applicable \nFil5b51bde4cf501f9d89d6fdd6084fb0dc| Not applicable| 76,238| 10-Sep-2020| 08:07| Not applicable \nFil5c8127dbccdda444e35671ff4a274fc5| Not applicable| 164,462| 10-Sep-2020| 08:08| Not applicable \nFil5cd88aaf0a21ddb716f1da478f29fe22| Not applicable| 68,607| 10-Sep-2020| 08:03| Not applicable \nFil5d2722dc3289787a79451240b7a88ef3| Not applicable| 1,218| 10-Sep-2020| 08:10| Not applicable \nFil5d6827cff217e4dfce3affa1aa55d8f3| Not applicable| 476,341| 10-Sep-2020| 08:09| Not applicable \nFil5e56ac7a5a17eeba25534e146a5b96c5| Not applicable| 187,286| 10-Sep-2020| 08:10| Not applicable \nFil5f4f6a29ca46dc40a4f6ac9b8b772ce3| Not applicable| 203,484| 10-Sep-2020| 08:09| Not applicable \nFil5fd4bc51ae2ad462403cdc6a0cf9ffd0| Not applicable| 311,764| 10-Sep-2020| 08:10| Not applicable \nFil604f37df9e3b6c4d7c48f14c35a26977| Not applicable| 126,177| 10-Sep-2020| 08:08| Not applicable \nFil610677a0034b8232f2b460d83c22ce46| Not applicable| 481,442| 10-Sep-2020| 08:09| Not applicable \nFil6133c70794989aad906ec1c690498770| Not applicable| 1,669| 10-Sep-2020| 08:10| Not applicable \nFil63179e1cb286b0ef11dc63dc6af82432| Not applicable| 14,116| 10-Sep-2020| 08:10| Not applicable \nFil6356fbacb88d6b1b13e09aadb6887fbe| Not applicable| 161,576| 10-Sep-2020| 08:10| Not applicable \nFil64dd0c27769e484c139e2503ec3eef51| Not applicable| 218,860| 10-Sep-2020| 08:10| Not applicable \nFil65080648928ede60012994a0baeca00b| Not applicable| 309,691| 10-Sep-2020| 08:09| Not applicable \nFil6ad129a5d744ab89f7b431d1d495262a| Not applicable| 60,605| 10-Sep-2020| 08:08| Not applicable \nFil6ae5c571deb81c557347776937eec424| Not applicable| 327,120| 10-Sep-2020| 08:08| Not applicable \nFil6c511826bfeecb77f6559c6b60d65511| Not applicable| 360,888| 10-Sep-2020| 08:09| Not applicable \nFil6c6539569c8b5a20bd7f4dc318576341| Not applicable| 305,628| 10-Sep-2020| 08:09| Not applicable \nFil6d0c3c83a060d3235e4a034bf754cdde| Not applicable| 139,720| 10-Sep-2020| 08:09| Not applicable \nFil6ec9b1a61bc1b1de3666c8f074b638b0| Not applicable| 102,157,937| 10-Sep-2020| 08:12| Not applicable \nFil6f8d2fab306d136e7656db49710c3a48| Not applicable| 3,636| 10-Sep-2020| 08:10| Not applicable \nFil6fe7b10d2287827cf3c81b58b9c8b8ff| Not applicable| 304,524| 10-Sep-2020| 08:10| Not applicable \nFil7189adae9ca485f37c0c74269ff71aca| Not applicable| 12,644| 10-Sep-2020| 08:10| Not applicable \nFil71e73a51dc2a21736116b8807bb466e8| Not applicable| 156,649| 10-Sep-2020| 08:09| Not applicable \nFil7207154834a23fbc29d011e71d208a39| Not applicable| 163,997| 10-Sep-2020| 08:10| Not applicable \nFil720fe9713dec6be87ee03bce38fbfc36| Not applicable| 321,069| 10-Sep-2020| 08:08| Not applicable \nFil7332c61fe6101e9bae82c487d99082df| Not applicable| 916| 10-Sep-2020| 08:10| Not applicable \nFil736e7b808675fe35044733ce258a9a73| Not applicable| 209,717| 10-Sep-2020| 08:09| Not applicable \nFil73c9286d8470aa113cba01507403eeba| Not applicable| 123,453| 10-Sep-2020| 08:10| Not applicable \nFil73dbdc432c5bb5f29330a83a9faa7ae1| Not applicable| 319,119| 10-Sep-2020| 08:10| Not applicable \nFil74f06c9b75edb14687c2262ad6ae2557| Not applicable| 310,368| 10-Sep-2020| 08:08| Not applicable \nFil7511efbde449570e1079881ef478d89f| Not applicable| 328,987| 10-Sep-2020| 08:10| Not applicable \nFil75c2cda8a128e765ff0af0755bfd328b| Not applicable| 145,359| 10-Sep-2020| 08:09| Not applicable \nFil7622d867b4e32c321108f9585ae213e0| Not applicable| 143,754| 10-Sep-2020| 08:10| Not applicable \nFil764919a245fe2bc500925814cddfbdad| Not applicable| 72,860| 10-Sep-2020| 08:03| Not applicable \nFil76a84f20ffd55d7ea12ac35d8380efd5| Not applicable| 425,083| 10-Sep-2020| 08:10| Not applicable \nFil7700cf10ad703df7c8918a0563a5e129| Not applicable| 170,409| 10-Sep-2020| 08:10| Not applicable \nFil780df069c247b8094634ab0404623781| Not applicable| 3,146| 10-Sep-2020| 08:10| Not applicable \nFil78360aa0f236f838f94a573fa0e591eb| Not applicable| 306,391| 10-Sep-2020| 08:10| Not applicable \nFil788ad7e3f4abc8bfb4327d0b98934699| Not applicable| 3,264| 10-Sep-2020| 08:10| Not applicable \nFil789b96ff5e7f5c36651793db27c8b262| Not applicable| 156,482| 10-Sep-2020| 08:10| Not applicable \nFil7975d5410f26d07f08de47940983d903| Not applicable| 11,720| 10-Sep-2020| 08:10| Not applicable \nFil798d3f63fe34287c86fffb74428a321a| Not applicable| 298,444| 10-Sep-2020| 08:11| Not applicable \nFil79b13a2c33d13735946561479fc859fa| Not applicable| 133,726| 10-Sep-2020| 08:11| Not applicable \nFil79c7a259268acf783baef95ca5b23ec1| Not applicable| 152,767| 10-Sep-2020| 08:07| Not applicable \nFil7a2063c960c5cb61395e7839f1297cb5| Not applicable| 4,115| 10-Sep-2020| 08:10| Not applicable \nFil7a403fcd3c2773230c350d8e1d3cebf7| Not applicable| 104,032| 10-Sep-2020| 08:03| Not applicable \nFil7a9f06943db3abcb09bf15ae13ff2cd2| Not applicable| 137,922| 10-Sep-2020| 08:08| Not applicable \nFil7b670339ef54eea40a7516c12d2f0e92| Not applicable| 486,258| 10-Sep-2020| 08:08| Not applicable \nFil7b9dcb919f1fd2e3a1f6f379fbfaeef0| Not applicable| 165,327| 10-Sep-2020| 08:09| Not applicable \nFil7bc288d1803d8c01d917d4ae3424dd04| Not applicable| 371,056| 10-Sep-2020| 08:10| Not applicable \nFil7be03a57aa609693fcd744981699f067| Not applicable| 214,670| 10-Sep-2020| 08:10| Not applicable \nFil7cd60b323924095924a33c83b8160967| Not applicable| 515,462| 10-Sep-2020| 08:08| Not applicable \nFil7cddc3f217fc9bd77c3335a3bbe74040| Not applicable| 316,645| 10-Sep-2020| 08:10| Not applicable \nFil7d3d44cb179d947736c393335bc1d8a5| Not applicable| 323,379| 10-Sep-2020| 08:08| Not applicable \nFil7e1364e8b092a71503bb6ab4c0c8d043| Not applicable| 317,812| 10-Sep-2020| 08:10| Not applicable \nFil7f88ed25a2323690ef4603fcd5965e29| Not applicable| 146,052| 10-Sep-2020| 08:08| Not applicable \nFil7fc67e0ea132a46fa0c81ae793c6fafb| Not applicable| 1,751| 10-Sep-2020| 08:10| Not applicable \nFil7ffa598af3dc4eba6484cfca34eff091| Not applicable| 487,790| 10-Sep-2020| 08:10| Not applicable \nFil7fffbc3b910469a09b1d0670696bd038| Not applicable| 298,276| 10-Sep-2020| 08:09| Not applicable \nFil802e831d6cd841b23e31f3ede7146efa| Not applicable| 160,374| 10-Sep-2020| 08:09| Not applicable \nFil8032f47eeca48977d2f693f7644627ce| Not applicable| 123,440| 10-Sep-2020| 08:08| Not applicable \nFil809e41480ae24ce8f65630fb91e72e3e| Not applicable| 191,320| 10-Sep-2020| 08:10| Not applicable \nFil819cef16705be45debd0be4d68755dbb| Not applicable| 22,679| 10-Sep-2020| 08:10| Not applicable \nFil819e4ee2c73b6dac7c9b217a2edccf64| Not applicable| 10,875| 10-Sep-2020| 08:10| Not applicable \nFil81c79182b21820eb762d4cc2ac59769f| Not applicable| 165,056| 10-Sep-2020| 08:08| Not applicable \nFil828666eab0d3bdc61f9fe757bd60e3a2| Not applicable| 375,074| 10-Sep-2020| 08:09| Not applicable \nFil832eb962b387b4e7631ffa4158cb28cc| Not applicable| 14,837| 10-Sep-2020| 08:10| Not applicable \nFil851524c7c4958c3155502d781c920d9b| Not applicable| 81,295| 10-Sep-2020| 08:10| Not applicable \nFil86eb489656c398a89c25641e80f48303| Not applicable| 121,319| 10-Sep-2020| 08:09| Not applicable \nFil86fd0667d62cefa2ae6e49f317434bd6| Not applicable| 384,644| 10-Sep-2020| 08:08| Not applicable \nFil88ec4eef108486342f6b6921bccaea93| Not applicable| 943,740| 10-Sep-2020| 08:12| Not applicable \nFil89331bf5c45adb0d8a8ea178cc079709| Not applicable| 300,269| 10-Sep-2020| 08:08| Not applicable \nFil8a10c1556c031a0905905396871c93f7| Not applicable| 310,330| 10-Sep-2020| 08:09| Not applicable \nFil8b153dea503da810e5e578642a5c28fe| Not applicable| 3,822| 10-Sep-2020| 08:10| Not applicable \nFil8c35bfdd38d7db1a373ae3b3a87a84b5| Not applicable| 164,030| 10-Sep-2020| 08:09| Not applicable \nFil8cbd0cddb9a1705309ebeabfe75fe38a| Not applicable| 319,024| 10-Sep-2020| 08:08| Not applicable \nFil8dc3b8e19a7e2e60f48bf22687139503| Not applicable| 3,314| 10-Sep-2020| 08:10| Not applicable \nFil8e9637e486491d4df1ea670c5b33eb16| Not applicable| 3,600| 10-Sep-2020| 08:10| Not applicable \nFil9007d7a068a4430d0ebefa4b039db1b4| Not applicable| 162,200| 10-Sep-2020| 08:10| Not applicable \nFil9032e5295c43ed35e2cd2820ebd6af91| Not applicable| 308,546| 10-Sep-2020| 08:08| Not applicable \nFil9050234bc32f4d53dcf496a54c13c1f0| Not applicable| 362,146| 10-Sep-2020| 08:09| Not applicable \nFil9052d1a7df067454a5205ba61f60202c| Not applicable| 414,847| 10-Sep-2020| 08:10| Not applicable \nFil907968cb2bdeead0a4c3dd51374b84f1| Not applicable| 160,076| 10-Sep-2020| 08:08| Not applicable \nFil90cb08f524bc6f2fd5d5c59c9e880a3b| Not applicable| 408,856| 10-Sep-2020| 08:10| Not applicable \nFil9141167468612be7f7ce04061b4ba430| Not applicable| 221,454| 10-Sep-2020| 08:10| Not applicable \nFil915152e03c7027618c1570479b195120| Not applicable| 115,620| 10-Sep-2020| 08:09| Not applicable \nFil9178f92f0a34fc57e83a4224c5cd4c6f| Not applicable| 123,425| 10-Sep-2020| 08:10| Not applicable \nFil91b888a87f12e84cd76b09d8a8239110| Not applicable| 317,225| 10-Sep-2020| 08:10| Not applicable \nFil922f0dc015ce910e694c684667216edf| Not applicable| 85,712| 10-Sep-2020| 08:10| Not applicable \nFil92839d18408beb0ccdd398fa8d63d256| Not applicable| 304,785| 10-Sep-2020| 08:08| Not applicable \nFil92b9f91110f3fc68adbba7781dca69f7| Not applicable| 955,169| 10-Sep-2020| 08:12| Not applicable \nFil936f4520f1f1a23512af78649723bd24| Not applicable| 1,787| 10-Sep-2020| 08:10| Not applicable \nFil95c4c617e843522bcbc5f0ea98be1499| Not applicable| 494,807| 10-Sep-2020| 08:10| Not applicable \nFil96195cf594115b0dbe9a6f0231ef1047| Not applicable| 313,299| 10-Sep-2020| 08:09| Not applicable \nFil963c3ba8ce3369f28a234d725b21bc1c| Not applicable| 4,281| 10-Sep-2020| 08:10| Not applicable \nFil9650173f54879818e5ec095eeb16ed0b| Not applicable| 396,015| 10-Sep-2020| 08:08| Not applicable \nFil966154a8118d7385953a6d219e5eb17c| Not applicable| 1,414| 10-Sep-2020| 08:10| Not applicable \nFil969cef7f118d3f325203fd0cb688b9ec| Not applicable| 2,110,683| 10-Sep-2020| 08:07| Not applicable \nFil96d73a0c451e93f8ea3773e8fe0fbbfc| Not applicable| 33,811| 10-Sep-2020| 08:11| Not applicable \nFil972290622741630c40e4aa0864c01aa4| Not applicable| 1,616| 10-Sep-2020| 08:10| Not applicable \nFil97937f8123552bc8e9d12b174086d31c| Not applicable| 469,857| 10-Sep-2020| 08:08| Not applicable \nFil97cbf02bb228d8da0527ece430405ab2| Not applicable| 301,969| 10-Sep-2020| 08:09| Not applicable \nFil986b652b14f678fe052fed9bba96162e| Not applicable| 163,883| 10-Sep-2020| 08:08| Not applicable \nFil98ef484ce7150b406e3016cd9924d142| Not applicable| 13,961| 10-Sep-2020| 08:10| Not applicable \nFil9956a513417bb5463e0ba651a166baf0| Not applicable| 514,510| 10-Sep-2020| 08:09| Not applicable \nFil9ad3820a6c3baa899d30b5c2befddb0f| Not applicable| 501,780| 10-Sep-2020| 08:09| Not applicable \nFil9bc19d53264a55a58e5f699c80356bb2| Not applicable| 1,818| 10-Sep-2020| 08:10| Not applicable \nFil9be11b2ba300199597d09229eada5f26| Not applicable| 14,295| 10-Sep-2020| 08:10| Not applicable \nFil9c53e682ec387e24b826b5f20d0d7744| Not applicable| 258,852| 10-Sep-2020| 08:09| Not applicable \nFil9cc47a8297b69ca8b92c5c5fbc5a72a9| Not applicable| 146,219| 10-Sep-2020| 08:09| Not applicable \nFil9d179c67312a815f3d90f05dd98d935f| Not applicable| 295,260| 10-Sep-2020| 08:08| Not applicable \nFil9d3115e00dd3480f86694eb0171e2ab7| Not applicable| 147,427| 10-Sep-2020| 08:08| Not applicable \nFil9de60681dee78970a404d53a64af2f30| Not applicable| 16,604| 10-Sep-2020| 08:10| Not applicable \nFil9e9c8fdc13f8e3438936117f467c32f2| Not applicable| 3,647| 10-Sep-2020| 08:10| Not applicable \nFil9ea96f90dc98136d2990b368e30cba7f| Not applicable| 314,432| 10-Sep-2020| 08:08| Not applicable \nFil9ef7a49aadd91bd2e7723a793c4ececa| Not applicable| 196,624| 10-Sep-2020| 08:07| Not applicable \nFil9f4a9c9c0df85e4de8cef75ad843a4bf| Not applicable| 853| 10-Sep-2020| 08:10| Not applicable \nFil9fa4d749b570205397f22bb7798f1ad8| Not applicable| 191,467| 10-Sep-2020| 08:07| Not applicable \nFil9fb5c95485bb8d9d33d5f93c5aaf64b2| Not applicable| 16,227| 10-Sep-2020| 08:10| Not applicable \nFil9fecbd76d57255e27cc95507f3aaab07| Not applicable| 329,540| 10-Sep-2020| 08:10| Not applicable \nFila2743c24f7094b33d0d4449897c866a6| Not applicable| 119,408| 10-Sep-2020| 08:08| Not applicable \nFila2f6a440343bc9ff6660fce140eadd2d| Not applicable| 448,596| 10-Sep-2020| 08:08| Not applicable \nFila505629643c3e008b8bd0e23a5c4e25d| Not applicable| 413,212| 10-Sep-2020| 08:09| Not applicable \nFila50b2e8bd5431612810b0fcf988a1828| Not applicable| 209,253| 10-Sep-2020| 08:11| Not applicable \nFila5363cc509db7b571c6c4c3cd9062471| Not applicable| 208,443| 10-Sep-2020| 08:10| Not applicable \nFila57f8bbbe3218e6ecf4f4d70668de2dc| Not applicable| 314,531| 10-Sep-2020| 08:08| Not applicable \nFila62c0ced269195777d4d83700b448c00| Not applicable| 380,561| 10-Sep-2020| 08:08| Not applicable \nFila702279a2573d1ed8f2fcdee9713c0dd| Not applicable| 209,728| 10-Sep-2020| 08:09| Not applicable \nFila8ced4b496da09516e99919d4eaf64f6| Not applicable| 159,063| 10-Sep-2020| 08:08| Not applicable \nFila8f5e5a43d97dfb60f41dfc1b8459851| Not applicable| 508,891| 10-Sep-2020| 08:08| Not applicable \nFila913026b0e770b0a0f627ace5a752454| Not applicable| 322,902| 10-Sep-2020| 08:09| Not applicable \nFilaac5e88adcaaf27436c416aa7a0165bd| Not applicable| 249,029| 10-Sep-2020| 08:09| Not applicable \nFilab134bb61b2e10157e892c40df3c7e86| Not applicable| 159,193| 10-Sep-2020| 08:09| Not applicable \nFilab5e2407151586fb17aa6a5e23983146| Not applicable| 380,417| 10-Sep-2020| 08:07| Not applicable \nFilab7106fec6a571b081793e6fd0772840| Not applicable| 324,317| 10-Sep-2020| 08:10| Not applicable \nFilab84c7b0ea2c18151bdec3362357de28| Not applicable| 382,607| 10-Sep-2020| 08:10| Not applicable \nFilacb3fe0c456bdeb57f38467806292a12| Not applicable| 169,689| 10-Sep-2020| 08:08| Not applicable \nFilad3a7da52bfdbcdc556e7afee04e466d| Not applicable| 370,571| 10-Sep-2020| 08:09| Not applicable \nFilae12f186604e1e9a1564f0bd8d3f02d3| Not applicable| 422,675| 10-Sep-2020| 08:11| Not applicable \nFilaef6c0ddd04caa6d726d5335dd817311| Not applicable| 202,927| 10-Sep-2020| 08:10| Not applicable \nFilafc694642ba5b6098760517160b0e8bf| Not applicable| 157,170| 10-Sep-2020| 08:08| Not applicable \nFilafe4ec5e5c84f4cbbd605478cefc5629| Not applicable| 3,090| 10-Sep-2020| 08:10| Not applicable \nFilb0d5f04a53228a377d15814c78465b27| Not applicable| 669| 10-Sep-2020| 08:10| Not applicable \nFilb20b3cc21a25081a4bca14731ed24d46| Not applicable| 4,473| 10-Sep-2020| 08:10| Not applicable \nFilb2511eb8cb15578d5607802d13cb5c4f| Not applicable| 160,204| 10-Sep-2020| 08:11| Not applicable \nFilb2d8808ed734ba4cdde6c0bb616a5918| Not applicable| 234,774| 10-Sep-2020| 08:09| Not applicable \nFilb38126b47351a15bc93f1845dc8aba35| Not applicable| 326,044| 10-Sep-2020| 08:09| Not applicable \nFilb3ecb6b553aa136a95f785fae49b7290| Not applicable| 318,445| 10-Sep-2020| 08:09| Not applicable \nFilb4e11fab484f7e28061acd0a0b998b2b| Not applicable| 297,352| 10-Sep-2020| 08:09| Not applicable \nFilb52f287490a4bf46c9cead71b6c6d32f| Not applicable| 377,427| 10-Sep-2020| 08:10| Not applicable \nFilb6922820d7c8951d2c0a274c0247a024| Not applicable| 929| 10-Sep-2020| 08:10| Not applicable \nFilb7953f6142a677d96f918f4748d335e8| Not applicable| 142,609| 10-Sep-2020| 08:10| Not applicable \nFilb7980f151e3ac5df2176c1c9232a3a97| Not applicable| 422,398| 10-Sep-2020| 08:10| Not applicable \nFilb7ebe5ea802d62f201cecf33058afa68| Not applicable| 158,931| 10-Sep-2020| 08:10| Not applicable \nFilb94ca32f2654692263a5be009c0fe4ca| Not applicable| 218,643| 10-Sep-2020| 08:12| Not applicable \nFilbaada6b445e5d018d30bae5f55810cbb| Not applicable| 11,531| 10-Sep-2020| 08:10| Not applicable \nFilbac509fa0e072d1cea52129ba1408636| Not applicable| 5,470| 10-Sep-2020| 08:10| Not applicable \nFilbae1886423fa60040987b70277c99a66| Not applicable| 212,585| 10-Sep-2020| 08:10| Not applicable \nFilbaee23394142e54df188a3681e7b00e0| Not applicable| 588,271| 10-Sep-2020| 08:09| Not applicable \nFilbb4be32d89ad2d104df2959499c2c5dd| Not applicable| 424,381| 10-Sep-2020| 08:10| Not applicable \nFilbc0374f21dbcf9dcd43948267292d827| Not applicable| 151,684| 10-Sep-2020| 08:09| Not applicable \nFilbce863d9e87e78f7b216f9063068fd70| Not applicable| 13,803| 10-Sep-2020| 08:10| Not applicable \nFilbe0b71d79825d6251a88a486de2a0fae| Not applicable| 175,794| 10-Sep-2020| 08:08| Not applicable \nFilbe5c25571628b164d9b0abeae72c357a| Not applicable| 14,488| 10-Sep-2020| 08:03| Not applicable \nFilbe8804efe450de6f32592158385173af| Not applicable| 162,776| 10-Sep-2020| 08:09| Not applicable \nFilbec2fefb4339db1cb2a2a81c626af5b8| Not applicable| 148,912| 10-Sep-2020| 08:10| Not applicable \nFilbf439d900d8e8c938a91453ceef33748| Not applicable| 385,061| 10-Sep-2020| 08:10| Not applicable \nFilbfe5e54bbcd75097a2290bb9ffbf9129| Not applicable| 158,084| 10-Sep-2020| 08:09| Not applicable \nFilbfebb0e9f43c859d9b0a3079fb790dca| Not applicable| 140,997| 10-Sep-2020| 08:08| Not applicable \nFilc0360124072910524d4b1e78f11ea314| Not applicable| 149,305| 10-Sep-2020| 08:10| Not applicable \nFilc070c10edde57f91e2b923f53638b156| Not applicable| 122,287| 10-Sep-2020| 08:09| Not applicable \nFilc0a74236d5938545f3dd0d2e81fe5145| Not applicable| 609,713| 10-Sep-2020| 08:09| Not applicable \nFilc1246ec6443f5fdece97bee947f338b8| Not applicable| 163,350| 10-Sep-2020| 08:08| Not applicable \nFilc166412dec3b545aa718384ccdc0c3d1| Not applicable| 22,512| 10-Sep-2020| 08:10| Not applicable \nFilc244723fb935bd0d0901b33c0fa3fef4| Not applicable| 309,279| 10-Sep-2020| 08:09| Not applicable \nFilc2f5ff7a8957ea0ec0b802705b42e323| Not applicable| 166,161| 10-Sep-2020| 08:08| Not applicable \nFilc320fdef8521e5bb17a5c121a74e650e| Not applicable| 305,137| 10-Sep-2020| 08:11| Not applicable \nFilc3e271840e8b5de0e4ed893a9b69de17| Not applicable| 82,108| 10-Sep-2020| 08:10| Not applicable \nFilc3f3571f7d40d7ad31bcbde165570280| Not applicable| 7,684| 10-Sep-2020| 08:10| Not applicable \nFilc42459f85335dc5b0e754ebf75734c79| Not applicable| 118,946| 10-Sep-2020| 08:10| Not applicable \nFilc4ab4e05a6193193ef464c60fae6cbd7| Not applicable| 120,705| 10-Sep-2020| 08:09| Not applicable \nFilc5ae06f5615759f92b67380884df008e| Not applicable| 117,623| 10-Sep-2020| 08:10| Not applicable \nFilc5c55afa5d74d23f6b65f3216e37d317| Not applicable| 1,526| 10-Sep-2020| 08:10| Not applicable \nFilc786628612d2b1a245c8c71b29c30be3| Not applicable| 398,338| 10-Sep-2020| 08:09| Not applicable \nFilc830aa3bd6a85d79ebf456c5e64b8035| Not applicable| 379,187| 10-Sep-2020| 08:09| Not applicable \nFilc8e516689a540bc63bb961f4097b7e57| Not applicable| 160,137| 10-Sep-2020| 08:10| Not applicable \nFilc8e6da9f10502e8ad2295645fd80d4e5| Not applicable| 121,496| 10-Sep-2020| 08:08| Not applicable \nFilc96a599a80f3de2e07c515d63158e572| Not applicable| 330,578| 10-Sep-2020| 08:10| Not applicable \nFilc9c9f098bfe576e332d5448e341d7275| Not applicable| 153,366| 10-Sep-2020| 08:08| Not applicable \nFilca014992a789c86d642b1454a84b0471| Not applicable| 375,852| 10-Sep-2020| 08:08| Not applicable \nFilca135d6cdf9927dde76343b8e7366baf| Not applicable| 162,198| 10-Sep-2020| 08:10| Not applicable \nFilca3d26a73693291377b5eed5ddcaa0f1| Not applicable| 161,841| 10-Sep-2020| 08:10| Not applicable \nFilcac638de4b1f902ff58a662d4dac3d29| Not applicable| 56,854| 10-Sep-2020| 08:07| Not applicable \nFilcb5fa00024c3bc85ae7c993808e1b884| Not applicable| 120,208| 10-Sep-2020| 08:09| Not applicable \nFilcc0fdd022d9f5d8bc8ec46b80403d2e2| Not applicable| 1,589| 10-Sep-2020| 08:10| Not applicable \nFilcc30666b183d540fe06d8954d0f2413b| Not applicable| 3,297| 10-Sep-2020| 08:10| Not applicable \nFilcc721cc9dd7ee55eb0e0698f712731d7| Not applicable| 2,003,228| 10-Sep-2020| 08:07| Not applicable \nFilccbc2448b8815f8b825a84cc78bb511c| Not applicable| 11,405| 10-Sep-2020| 08:10| Not applicable \nFilcd270becc68f50bf28755be77714be9e| Not applicable| 394,132| 10-Sep-2020| 08:10| Not applicable \nFilcd886455496c5ec1862cf4aa506be262| Not applicable| 117,895| 10-Sep-2020| 08:08| Not applicable \nFilcddc4ce9e9c46991c0b22e91ba3704ba| Not applicable| 160,587| 10-Sep-2020| 08:10| Not applicable \nFilcff1dd14fb439fc7e9daa9dcb3e116c5| Not applicable| 12,932| 10-Sep-2020| 08:10| Not applicable \nFild034d7905a9a668488c8afd111f03890| Not applicable| 317,800| 10-Sep-2020| 08:11| Not applicable \nFild134087dcd6c80d2440a6f01ca531d43| Not applicable| 274,174| 10-Sep-2020| 08:09| Not applicable \nFild14c12465bfbd20e37f23e7a26295b48| Not applicable| 365,935| 10-Sep-2020| 08:07| Not applicable \nFild1b8d036a9c84b39ee432dce4f6d746f| Not applicable| 139,345| 10-Sep-2020| 08:09| Not applicable \nFild22b63170e5bf9a8ba95b20e77f6931a| Not applicable| 121,042| 10-Sep-2020| 08:10| Not applicable \nFild303b30a374c6671b361236e01f4b5cf| Not applicable| 164,590| 10-Sep-2020| 08:10| Not applicable \nFild4549c48b4b688ecc880a1f283799d3f| Not applicable| 498,379| 10-Sep-2020| 08:09| Not applicable \nFild4b4f55d65650fb68d8ae661f35a6cf3| Not applicable| 310,507| 10-Sep-2020| 08:09| Not applicable \nFild4cd251093d729f1a42047080c2778eb| Not applicable| 306,546| 10-Sep-2020| 08:08| Not applicable \nFild51a17d6f91520b346fc51bc3328726b| Not applicable| 145,877| 10-Sep-2020| 08:11| Not applicable \nFild59daa81d7473621e57441d6ea0f15c0| Not applicable| 194,497| 10-Sep-2020| 08:10| Not applicable \nFild5bfe2feae3b6b40e6b16de030127c67| Not applicable| 155,310| 10-Sep-2020| 08:10| Not applicable \nFild5d8126bec59238a69351a093c4464d0| Not applicable| 3,790| 10-Sep-2020| 08:10| Not applicable \nFild5f03da3e3a095d1f2b4a304a98bf729| Not applicable| 157,712| 10-Sep-2020| 08:10| Not applicable \nFild68d4f36aac52c3202cf238e1f1e2964| Not applicable| 145,618| 10-Sep-2020| 08:09| Not applicable \nFild7148cc0a8a831b0690ba7edff9c89fd| Not applicable| 309,585| 10-Sep-2020| 08:09| Not applicable \nFild83a4ac68665cb7498564f6a2fa90824| Not applicable| 192,430| 10-Sep-2020| 08:08| Not applicable \nFild84b6ccde6dad97a33cce010b6cf5541| Not applicable| 340,402| 10-Sep-2020| 08:08| Not applicable \nFild87dcf579f0d9dcbe4e7662caabee77e| Not applicable| 1,363| 10-Sep-2020| 08:10| Not applicable \nFild8a7c51dd3b9661c0d3937db06a0f6cc| Not applicable| 155,414| 10-Sep-2020| 08:11| Not applicable \nFild9013e15b94e09b08396c315e0631a52| Not applicable| 316,058| 10-Sep-2020| 08:10| Not applicable \nFild95c9ba0d427e30ab018118c4f8473b3| Not applicable| 389,600| 10-Sep-2020| 08:08| Not applicable \nFilda6a4ae71e1b6b7ccfcb6a63a2127d4d| Not applicable| 1,749| 10-Sep-2020| 08:10| Not applicable \nFildaad8f46b98411d7cb5457607ddc0097| Not applicable| 5,141| 10-Sep-2020| 08:10| Not applicable \nFildade2b2752b156e32704242e66737bf6| Not applicable| 3,404| 10-Sep-2020| 08:10| Not applicable \nFildaf7959b7c75db4261e040beb7293a13| Not applicable| 5,396| 10-Sep-2020| 08:10| Not applicable \nFildb3335f7da7296c0cebb1f9dcf0a13b6| Not applicable| 166,555| 10-Sep-2020| 08:10| Not applicable \nFildb508355a4e407081cba2130e65d580e| Not applicable| 327,332| 10-Sep-2020| 08:08| Not applicable \nFildb5fd75c40a38a12961a5701f3dd077c| Not applicable| 11,205| 10-Sep-2020| 08:08| Not applicable \nFildc8c47decc0a980dde3b8835cbb1da3b| Not applicable| 143,173| 10-Sep-2020| 08:09| Not applicable \nFildcfc7c65952f1370410a552a0c3bdacb| Not applicable| 143,634| 10-Sep-2020| 08:07| Not applicable \nFildd3233d5a669fbdbc6e1395b93273f67| Not applicable| 147,257| 10-Sep-2020| 08:08| Not applicable \nFildd420a21b6ff581e2f8cba46cf9cfc00| Not applicable| 13,697| 10-Sep-2020| 08:10| Not applicable \nFildd57d9330db1e4c1c5076183b76a0429| Not applicable| 159,581| 10-Sep-2020| 08:10| Not applicable \nFilde7edfbc94e0445055094a8412075849| Not applicable| 317,167| 10-Sep-2020| 08:08| Not applicable \nFildeb1eb5e06fd4f9ea01b736f7c5d3489| Not applicable| 4,463| 10-Sep-2020| 08:10| Not applicable \nFildeef0cc1dbfd12d4e4898acabeb8cc0a| Not applicable| 161,351| 10-Sep-2020| 08:10| Not applicable \nFildf1f940d4440482646f7e07b21c8977c| Not applicable| 400,048| 10-Sep-2020| 08:10| Not applicable \nFildf479c394a62a395362bac2175f263d9| Not applicable| 154,989| 10-Sep-2020| 08:08| Not applicable \nFile04ef21eb384d6ce69ac422ca5d202c8| Not applicable| 148,550| 10-Sep-2020| 08:08| Not applicable \nFile09f49833cf1f2443418e2be8f1e0004| Not applicable| 3,998| 10-Sep-2020| 08:10| Not applicable \nFile1425ffca08865888d2e0a662b85f22f| Not applicable| 194,027| 10-Sep-2020| 08:11| Not applicable \nFile2554c88cacc807d5b821e2d2e7977e7| Not applicable| 14,799| 10-Sep-2020| 08:10| Not applicable \nFile2a091148b8ca423a6f1f046e0adf881| Not applicable| 4,257| 10-Sep-2020| 08:10| Not applicable \nFile3b0bd2216637faabef0676a9e81a5a6| Not applicable| 215,571| 10-Sep-2020| 08:11| Not applicable \nFile3f54d4045f48da2f6084516bace3e1e| Not applicable| 163,145| 10-Sep-2020| 08:09| Not applicable \nFile45d1d7c137c59f6c1ffaab0ebc51f77| Not applicable| 292,978| 10-Sep-2020| 08:09| Not applicable \nFile54255e6002ed95d61afd7c75a5fa948| Not applicable| 370,103| 10-Sep-2020| 08:11| Not applicable \nFile5789132b8eb5f2f7efa7697590cf45c| Not applicable| 156,176| 10-Sep-2020| 08:09| Not applicable \nFile5dacfcc6f5dfff94990a84e026c4de2| Not applicable| 17,437| 10-Sep-2020| 08:10| Not applicable \nFile70589c97d754e78d2fe2fed99eaebcc| Not applicable| 314,666| 10-Sep-2020| 08:09| Not applicable \nFile71648118f1d0c1951edbcaa777d3a56| Not applicable| 251,235| 10-Sep-2020| 08:09| Not applicable \nFile783cced0fcba1ff313575bb1ca1c68c| Not applicable| 364,541| 10-Sep-2020| 08:08| Not applicable \nFile7c5afad77df85fd91512963f2fbf6e6| Not applicable| 34,450| 10-Sep-2020| 08:09| Not applicable \nFile88a06b53e20b9e6752aa61d8e189c10| Not applicable| 155,990| 10-Sep-2020| 08:09| Not applicable \nFile8b19ea66e7ffe68e3352d0de6ef2729| Not applicable| 407,248| 10-Sep-2020| 08:10| Not applicable \nFile93062b648276336059fa449db4153a3| Not applicable| 12,123| 10-Sep-2020| 08:10| Not applicable \nFilea581cb50d1d2cd077771d63c5b6dc51| Not applicable| 21,265| 10-Sep-2020| 08:10| Not applicable \nFileae73d48fc92a17e014b0abe1700f303| Not applicable| 156,338| 10-Sep-2020| 08:09| Not applicable \nFilec4338229af7da65b4b819322b30edda| Not applicable| 3,944| 10-Sep-2020| 08:10| Not applicable \nFilec7f6fc187f8be14de5ec034c2d85229| Not applicable| 118,511| 10-Sep-2020| 08:11| Not applicable \nFilecdb8669c113ce265be59f27aebb63c7| Not applicable| 201,438| 10-Sep-2020| 08:08| Not applicable \nFileeb9f8d46d03aa02e3a639c1190925ca| Not applicable| 4,194| 10-Sep-2020| 08:10| Not applicable \nFilefd2c6f724098d78412ccee1a36009ec| Not applicable| 367,647| 10-Sep-2020| 08:10| Not applicable \nFilf0c07502f8d3141d66a6c1fd4a71ca59| Not applicable| 4,352| 10-Sep-2020| 08:10| Not applicable \nFilf1324936e054d2474bba214d9e6855a0| Not applicable| 390,378| 10-Sep-2020| 08:08| Not applicable \nFilf1b4b77518eb47dc1959750fec59dcdc| Not applicable| 558,426| 10-Sep-2020| 08:08| Not applicable \nFilf1dbefccbfa368491a69955663586af4| Not applicable| 234,623| 10-Sep-2020| 08:09| Not applicable \nFilf21ccdcd3e87189b3373cbe88465bbed| Not applicable| 160,091| 10-Sep-2020| 08:08| Not applicable \nFilf257fa6642fbb757e3f26de753df4489| Not applicable| 322,187| 10-Sep-2020| 08:09| Not applicable \nFilf29a31a400ab7bfd670be114c615e00e| Not applicable| 440,018| 10-Sep-2020| 08:07| Not applicable \nFilf3015d007a6f5f56a11032dcd1ce8969| Not applicable| 1,875| 10-Sep-2020| 08:10| Not applicable \nFilf312b9f00ef669d78efe9b0d80f99896| Not applicable| 209,647| 10-Sep-2020| 08:10| Not applicable \nFilf31637de0f0a1e59a079df18e7f11f70| Not applicable| 532,038| 10-Sep-2020| 08:09| Not applicable \nFilf423a2f8e32497160710c8152115c908| Not applicable| 739| 10-Sep-2020| 08:10| Not applicable \nFilf4f7477b721b363112253d772077f40a| Not applicable| 44,908| 10-Sep-2020| 08:10| Not applicable \nFilf57cc0e30babe3fc1f5dcf14ffe60ce6| Not applicable| 569,467| 10-Sep-2020| 08:09| Not applicable \nFilf588408b53c88d5458d0bdfcabd56663| Not applicable| 162,184| 10-Sep-2020| 08:08| Not applicable \nFilf5c3373f3ffd93654bd1b1876513b75f| Not applicable| 63,356| 10-Sep-2020| 08:08| Not applicable \nFilf6d8842a14339881592611f23bb7b252| Not applicable| 11,215| 10-Sep-2020| 08:11| Not applicable \nFilf703fe4b5a67deaaa43a5f6ec9473805| Not applicable| 510,613| 10-Sep-2020| 08:10| Not applicable \nFilf7b4e504538e95c386061696b9d45120| Not applicable| 487,727| 10-Sep-2020| 08:11| Not applicable \nFilf7ecfde79d2a28e873992ce54d255fa4| Not applicable| 12,496| 10-Sep-2020| 08:10| Not applicable \nFilf8694f2cec5c365c0ef11b2f23dec843| Not applicable| 348,665| 10-Sep-2020| 08:11| Not applicable \nFilf90a123a3d43f3927c5318df051b9542| Not applicable| 492,011| 10-Sep-2020| 08:08| Not applicable \nFilf90f4fab546e82b6ef9b90297aef9ad7| Not applicable| 449,767| 10-Sep-2020| 08:08| Not applicable \nFilf992eef20268ccc0eb06557927ff1afd| Not applicable| 1,226| 10-Sep-2020| 08:10| Not applicable \nFilf9a6877dcf00a67a311f48dad50b7e9b| Not applicable| 62,482| 10-Sep-2020| 08:08| Not applicable \nFilf9b49c84aebc070c43e273a673e1cf99| Not applicable| 14,419| 10-Sep-2020| 08:03| Not applicable \nFilf9e067ad79a7547e26462a712cbd2234| Not applicable| 166,529| 10-Sep-2020| 08:08| Not applicable \nFilf9f6edd39dceaf9e49f9eb33efd6947e| Not applicable| 13,469| 10-Sep-2020| 08:10| Not applicable \nFilfac323bdf8297e52cb9758bc0f107bdf| Not applicable| 272,915| 10-Sep-2020| 08:09| Not applicable \nFilfc185af7dea156a27d3ffbbb82d11e73| Not applicable| 1,874| 10-Sep-2020| 08:10| Not applicable \nFilfca646dd1df179d1706cdf713ccc1069| Not applicable| 11,309| 10-Sep-2020| 08:10| Not applicable \nFilfd686744556fc950cd80295cb80aff43| Not applicable| 249,760| 10-Sep-2020| 08:08| Not applicable \nFilfe0ef3ae7100cf23dd43d3efa4f0a0e9| Not applicable| 433,228| 10-Sep-2020| 08:08| Not applicable \nFilfe13d9d3d88bb5b431d4a796b8541c66| Not applicable| 63,672| 10-Sep-2020| 08:08| Not applicable \nFilfe1f533df46bf985ea2b2ab30e5d6a35| Not applicable| 161,408| 10-Sep-2020| 08:08| Not applicable \nFilfefeffa72c0a131333c1a98e9bb695c0| Not applicable| 45,162| 10-Sep-2020| 08:10| Not applicable \nFilff7006991aa221e3c40687aae0081106| Not applicable| 3,184| 10-Sep-2020| 08:10| Not applicable \nFilteringconfigurationcommands.ps1| Not applicable| 18,299| 07-Jul-2021| 23:45| Not applicable \nGetucpool.ps1| Not applicable| 19,851| 07-Jul-2021| 23:45| Not applicable \nGetvalidengines.ps1| Not applicable| 13,350| 07-Jul-2021| 23:45| Not applicable \nGet_publicfoldermailboxsize.ps1| Not applicable| 15,102| 07-Jul-2021| 23:45| Not applicable \nImportedgeconfig.ps1| Not applicable| 77,324| 07-Jul-2021| 23:45| Not applicable \nImport_mailpublicfoldersformigration.ps1| Not applicable| 36,514| 07-Jul-2021| 23:45| Not applicable \nImport_retentiontags.ps1| Not applicable| 28,894| 07-Jul-2021| 23:45| Not applicable \nLpversioning.xml| Not applicable| 20,418| 07-Jul-2021| 23:44| Not applicable \nMerge_publicfoldermailbox.ps1| Not applicable| 45,400| 07-Jul-2021| 23:45| Not applicable \nMicrosoft.ceres.datalossprevention.dll.90160000_1164_0000_1000_1000000ff1ce| 16.0.1497.23| 873,992| 07-Jul-2021| 23:41| Not applicable \nMicrosoft.dkm.proxy.dll| 15.0.1497.23| 32,704| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.addressbook.service.dll| 15.0.1497.23| 218,576| 07-Jul-2021| 23:46| x86 \nMicrosoft.exchange.airsync.dll1| 15.0.1497.23| 1,676,288| 07-Jul-2021| 23:45| Not applicable \nMicrosoft.exchange.airsynchandler.dll| 15.0.1497.23| 59,392| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.anchorservice.dll| 15.0.1497.23| 137,688| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.antispamupdatesvc.exe| 15.0.1497.23| 27,624| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.approval.applications.dll| 15.0.1497.23| 53,208| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.assistants.dll| 15.0.1497.23| 339,416| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.auditlogsearchservicelet.dll| 15.0.1497.23| 70,616| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.authadminservicelet.dll| 15.0.1497.23| 36,312| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.authservicehostservicelet.dll| 15.0.1497.23| 15,832| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.autodiscover.dll| 15.0.1497.23| 360,408| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.autodiscoverv2.dll| 15.0.1497.23| 31,680| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.batchservice.dll| 15.0.1497.23| 33,200| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.certificatedeploymentservicelet.dll| 15.0.1497.23| 26,584| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.certificatenotificationservicelet.dll| 15.0.1497.23| 23,536| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.clients.common.dll| 15.0.1497.23| 165,320| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.clients.owa.dll| 15.0.1497.23| 3,030,464| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.clients.owa2.server.dll| 15.0.1497.23| 2,269,632| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.clients.security.dll| 15.0.1497.23| 156,096| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.cluster.common.extensions.dll| 15.0.1497.23| 22,464| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.cluster.replay.dll| 15.0.1497.23| 2,698,688| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.cluster.replicaseeder.dll| 15.0.1497.23| 107,968| 07-Jul-2021| 23:48| x64 \nMicrosoft.exchange.cluster.replicavsswriter.dll| 15.0.1497.23| 287,680| 07-Jul-2021| 23:48| x64 \nMicrosoft.exchange.cluster.shared.dll| 15.0.1497.23| 462,784| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.common.diskmanagement.dll| 15.0.1497.23| 55,744| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.common.dll| 15.0.1497.23| 157,632| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.common.inference.dll| 15.0.1497.23| 39,360| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.compliance.dll| 15.0.1497.23| 85,440| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.compliance.taskdistributioncommon.dll| 15.0.1497.23| 173,032| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.compliance.taskdistributionfabric.dll| 15.0.1497.23| 74,704| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.compliance.taskplugins.dll| 15.0.1497.23| 25,552| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.compression.dll| 15.0.1497.23| 17,856| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.configuration.certificateauth.dll| 15.0.1497.23| 37,832| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.configuration.core.dll| 15.0.1497.23| 111,048| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.configuration.delegatedauth.dll| 15.0.1497.23| 53,712| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.configuration.diagnosticsmodules.dll| 15.0.1497.23| 24,024| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.configuration.failfast.dll| 15.0.1497.23| 55,272| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.configuration.objectmodel.dll| 15.0.1497.23| 1,455,080| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.configuration.redirectionmodule.dll| 15.0.1497.23| 71,656| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.configuration.remotepowershellbackendcmdletproxymodule.dll| 15.0.1497.23| 21,456| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.connections.common.dll| 15.0.1497.23| 77,248| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.connections.eas.dll| 15.0.1497.23| 235,952| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.connections.imap.dll| 15.0.1497.23| 115,136| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.connections.pop.dll| 15.0.1497.23| 74,688| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.core.strings.dll| 15.0.1497.23| 599,488| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.data.applicationlogic.dll| 15.0.1497.23| 1,271,816| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.data.directory.dll| 15.0.1497.23| 6,639,112| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.data.dll| 15.0.1497.23| 1,378,808| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.data.groupmailboxaccesslayer.dll| 15.0.1497.23| 314,368| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.data.ha.dll| 15.0.1497.23| 82,440| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.data.imageanalysis.dll| 15.0.1497.23| 108,040| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.data.mapi.dll| 15.0.1497.23| 175,104| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.data.metering.contracts.dll| 15.0.1497.23| 31,240| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.data.metering.dll| 15.0.1497.23| 99,336| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.data.providers.dll| 15.0.1497.23| 141,312| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.data.storage.clientstrings.dll| 15.0.1497.23| 143,872| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.data.storage.dll| 15.0.1497.23| 8,145,928| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.data.throttlingservice.client.dll| 15.0.1497.23| 36,360| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.datacenterstrings.dll| 15.0.1497.23| 75,224| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.diagnostics.certificatelogger.dll| 15.0.1497.23| 22,960| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.diagnostics.dll| 15.0.1497.23| 1,934,784| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.diagnostics.performancelogger.dll| 15.0.1497.23| 24,008| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.diagnostics.service.common.dll| 15.0.1497.23| 321,968| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.diagnostics.service.exchangejobs.dll| 15.0.1497.23| 134,600| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.diagnostics.service.exe| 15.0.1497.23| 127,432| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.diagnosticsaggregationservicelet.dll| 15.0.1497.23| 50,648| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.directory.topologyservice.exe| 15.0.1497.23| 192,992| 07-Jul-2021| 23:46| x86 \nMicrosoft.exchange.dxstore.dll| 15.0.1497.23| 279,488| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.dxstore.ha.instance.exe| 15.0.1497.23| 20,928| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.edgecredentialsvc.exe| 15.0.1497.23| 21,992| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.edgesync.common.dll| 15.0.1497.23| 153,552| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.edgesync.datacenterproviders.dll| 15.0.1497.23| 225,256| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.edgesyncsvc.exe| 15.0.1497.23| 98,256| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.ediscovery.export.dll| 15.0.1497.23| 1,126,376| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.ediscovery.export.dll.deploy| 15.0.1497.23| 1,126,376| 07-Jul-2021| 23:44| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.application| Not applicable| 16,490| 08-Jul-2021| 00:41| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.manifest| Not applicable| 67,554| 08-Jul-2021| 00:19| Not applicable \nMicrosoft.exchange.ediscovery.mailboxsearch.dll| 15.0.1497.23| 295,888| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.entities.birthdaycalendar.dll| 15.0.1497.23| 56,272| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.entities.calendaring.dll| 15.0.1497.23| 208,360| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.entities.common.dll| 15.0.1497.23| 155,088| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.entities.datamodel.dll| 15.0.1497.23| 137,168| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.entities.holidaycalendars.dll| 15.0.1497.23| 35,280| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.entities.people.dll| 15.0.1497.23| 37,328| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.eserepl.configuration.dll| 15.0.1497.23| 16,320| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.eserepl.dll| 15.0.1497.23| 118,720| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.exchangecertificateservicelet.dll| 15.0.1497.23| 37,336| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.extensibility.internal.dll| 15.0.1497.23| 560,104| 07-Jul-2021| 23:46| x86 \nMicrosoft.exchange.extensibility.partner.dll| 15.0.1497.23| 15,824| 07-Jul-2021| 23:46| x86 \nMicrosoft.exchange.federateddirectory.dll| 15.0.1497.23| 76,760| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.frontendhttpproxy.dll| 15.0.1497.23| 571,840| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.hathirdpartyreplication.dll| 15.0.1497.23| 42,944| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.helpprovider.dll| 15.0.1497.23| 39,416| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.httpproxy.addressfinder.dll| 15.0.1497.23| 31,168| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.httpproxy.common.dll| 15.0.1497.23| 95,680| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.httpproxy.diagnostics.dll| 15.0.1497.23| 35,264| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.httpproxy.proxyassistant.dll| 15.0.1497.23| 17,856| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.httpproxy.routerefresher.dll| 15.0.1497.23| 21,448| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.httpproxy.routeselector.dll| 15.0.1497.23| 35,264| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.httpproxy.routing.dll| 15.0.1497.23| 63,936| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.httpredirectmodules.dll| 15.0.1497.23| 27,072| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.httputilities.dll| 15.0.1497.23| 20,928| 07-Jul-2021| 23:48| x86 \nMicrosoft.exchange.hygiene.data.dll| 15.0.1497.23| 1,033,696| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.imap4.exe| 15.0.1497.23| 230,320| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.imap4.exe.fe| 15.0.1497.23| 230,320| 07-Jul-2021| 23:44| Not applicable \nMicrosoft.exchange.imap4service.exe| 15.0.1497.23| 25,024| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.imap4service.exe.fe| 15.0.1497.23| 25,024| 07-Jul-2021| 23:44| Not applicable \nMicrosoft.exchange.inference.common.dll| 15.0.1497.23| 71,680| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.inference.mdbcommon.dll| 15.0.1497.23| 75,776| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.inference.peoplerelevance.dll| 15.0.1497.23| 93,696| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.inference.pipeline.dll| 15.0.1497.23| 21,480| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.inference.ranking.dll| 15.0.1497.23| 19,448| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.infoworker.assistantsclientresources.dll| 15.0.1497.23| 35,328| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.infoworker.common.dll| 15.0.1497.23| 1,662,464| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.infoworker.meetingvalidator.dll| 15.0.1497.23| 164,352| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.jobqueueservicelet.dll| 15.0.1497.23| 84,952| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.live.domainservices.dll| 15.0.1497.23| 122,352| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.loganalyzer.analyzers.oabdownloadlog.dll| 15.0.1497.23| 20,424| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.loganalyzer.extensions.oabdownloadlog.dll| 15.0.1497.23| 18,888| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.loguploader.dll| 15.0.1497.23| 159,680| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.loguploaderproxy.dll| 15.0.1497.23| 61,376| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.mailboxloadbalance.dll| 15.0.1497.23| 346,032| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxloadbalance.serverstrings.dll| 15.0.1497.23| 43,440| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxloadbalanceclient.dll| 15.0.1497.23| 24,504| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.common.dll| 15.0.1497.23| 1,523,656| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.dll| 15.0.1497.23| 639,424| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.easprovider.dll| 15.0.1497.23| 106,432| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.imapprovider.dll| 15.0.1497.23| 61,872| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.mapiprovider.dll| 15.0.1497.23| 91,568| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.popprovider.dll| 15.0.1497.23| 42,416| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyclient.dll| 15.0.1497.23| 121,776| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyservice.dll| 15.0.1497.23| 148,424| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.pstprovider.dll| 15.0.1497.23| 82,352| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.remoteprovider.dll| 15.0.1497.23| 72,624| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.storageprovider.dll| 15.0.1497.23| 120,240| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.upgrade14to15.dll| 15.0.1497.23| 276,424| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxtransport.storedrivercommon.dll| 15.0.1497.23| 140,248| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxtransport.storedriverdelivery.dll| 15.0.1497.23| 517,104| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mailboxtransport.submission.storedriversubmission.dll| 15.0.1497.23| 191,960| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.management.compliancepolicy.dll| 15.0.1497.23| 38,872| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.management.controlpanel.dll| 15.0.1497.23| 6,405,544| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.management.controlpanel.owaoptionstrings.dll| 15.0.1497.23| 286,120| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.management.deployment.analysis.dll| 15.0.1497.23| 96,728| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.management.deployment.dll| 15.0.1497.23| 614,872| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.management.detailstemplates.dll| 15.0.1497.23| 70,072| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.management.dll| 15.0.1497.23| 19,303,408| 07-Jul-2021| 23:44| x64 \nMicrosoft.exchange.management.edge.systemmanager.dll| 15.0.1497.23| 60,840| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.management.mobility.dll| 15.0.1497.23| 306,648| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.management.powershell.support.dll| 15.0.1497.23| 229,336| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.management.psdirectinvoke.dll| 15.0.1497.23| 47,064| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.management.rbacdefinition.dll| 15.0.1497.23| 6,657,520| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.management.recipient.dll| 15.0.1497.23| 854,488| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.management.reportingwebservice.dll| 15.0.1497.23| 146,344| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.management.snapin.esm.dll| 15.0.1497.23| 73,144| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.management.systemmanager.dll| 15.0.1497.23| 1,273,768| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.management.transport.dll| 15.0.1497.23| 764,376| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.managementgui.dll| 15.0.1497.23| 5,352,360| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.mapihttpclient.dll| 15.0.1497.23| 115,136| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.mapihttphandler.dll| 15.0.1497.23| 192,488| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.messagesecurity.dll| 15.0.1497.23| 78,824| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.messagingpolicies.edgeagents.dll| 15.0.1497.23| 66,024| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.messagingpolicies.hygienerules.dll| 15.0.1497.23| 28,648| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.messagingpolicies.journalagent.dll| 15.0.1497.23| 173,032| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.messagingpolicies.redirectionagent.dll| 15.0.1497.23| 25,576| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.messagingpolicies.rmsvcagent.dll| 15.0.1497.23| 153,064| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.messagingpolicies.rules.dll| 15.0.1497.23| 309,736| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.messagingpolicies.transportruleagent.dll| 15.0.1497.23| 34,280| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.messagingpolicies.unjournalagent.dll| 15.0.1497.23| 98,784| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.migration.dll| 15.0.1497.23| 962,032| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.migrationmonitor.dll| 15.0.1497.23| 144,880| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.mobiledriver.dll| 15.0.1497.23| 139,256| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.monitoring.activemonitoring.local.components.dll| 15.0.1497.23| 3,922,944| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.monitoring.servicecontextprovider.dll| 15.0.1497.23| 20,480| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.net.dll| 15.0.1497.23| 4,034,504| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.notifications.broker.exe| 15.0.1497.23| 173,000| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.notifications.brokerapi.dll| 15.0.1497.23| 56,240| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.oabauthmodule.dll| 15.0.1497.23| 20,992| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.oabrequesthandler.dll| 15.0.1497.23| 73,216| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.photogarbagecollectionservicelet.dll| 15.0.1497.23| 15,320| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.pop3.exe| 15.0.1497.23| 92,616| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.pop3.exe.fe| 15.0.1497.23| 92,616| 07-Jul-2021| 23:44| Not applicable \nMicrosoft.exchange.pop3service.exe| 15.0.1497.23| 25,032| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.pop3service.exe.fe| 15.0.1497.23| 25,032| 07-Jul-2021| 23:44| Not applicable \nMicrosoft.exchange.popimap.core.dll| 15.0.1497.23| 209,864| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.popimap.core.dll.fe| 15.0.1497.23| 209,864| 07-Jul-2021| 23:44| Not applicable \nMicrosoft.exchange.powersharp.management.dll| 15.0.1497.23| 4,177,904| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.powershell.configuration.dll| 15.0.1497.23| 261,544| 07-Jul-2021| 23:45| x64 \nMicrosoft.exchange.powershell.rbachostingtools.dll| 15.0.1497.23| 41,384| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.protectedservicehost.exe| 15.0.1497.23| 29,144| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.protocols.fasttransfer.dll| 15.0.1497.23| 134,120| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.protocols.mapi.dll| 15.0.1497.23| 406,488| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.provisioningagent.dll| 15.0.1497.23| 228,312| 07-Jul-2021| 23:44| x64 \nMicrosoft.exchange.provisioningservicelet.dll| 15.0.1497.23| 80,880| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.pushnotifications.dll| 15.0.1497.23| 105,416| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.pushnotifications.publishers.dll| 15.0.1497.23| 408,008| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.pushnotifications.server.dll| 15.0.1497.23| 72,648| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.rpc.dll| 15.0.1497.23| 1,466,824| 07-Jul-2021| 23:49| x64 \nMicrosoft.exchange.rpcclientaccess.dll| 15.0.1497.23| 150,504| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.rpcclientaccess.exmonhandler.dll| 15.0.1497.23| 62,440| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.rpcclientaccess.handler.dll| 15.0.1497.23| 483,816| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.rpcclientaccess.monitoring.dll| 15.0.1497.23| 149,480| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.rpcclientaccess.parser.dll| 15.0.1497.23| 733,632| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.rpcclientaccess.server.dll| 15.0.1497.23| 207,848| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.rpcclientaccess.service.exe| 15.0.1497.23| 31,688| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.rpchttpmodules.dll| 15.0.1497.23| 41,448| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.rpcoverhttpautoconfig.dll| 15.0.1497.23| 51,160| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.rules.common.dll| 15.0.1497.23| 137,152| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.saclwatcherservicelet.dll| 15.0.1497.23| 20,440| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.search.core.dll| 15.0.1497.23| 290,248| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.search.engine.dll| 15.0.1497.23| 97,224| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.search.fast.dll| 15.0.1497.23| 329,160| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.search.mdb.dll| 15.0.1497.23| 175,048| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.search.query.dll| 15.0.1497.23| 95,176| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.search.service.exe| 15.0.1497.23| 29,128| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.security.dll| 15.0.1497.23| 804,352| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.security.msarpsservice.exe| 15.0.1497.23| 19,968| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.server.storage.admininterface.dll| 15.0.1497.23| 216,024| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.common.dll| 15.0.1497.23| 413,144| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.diagnostics.dll| 15.0.1497.23| 190,960| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.directoryservices.dll| 15.0.1497.23| 95,704| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.esebackinterop.dll| 15.0.1497.23| 82,904| 07-Jul-2021| 23:44| x64 \nMicrosoft.exchange.server.storage.fulltextindex.dll| 15.0.1497.23| 67,056| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.ha.dll| 15.0.1497.23| 82,392| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.lazyindexing.dll| 15.0.1497.23| 190,936| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.logicaldatamodel.dll| 15.0.1497.23| 822,744| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.mapidisp.dll| 15.0.1497.23| 426,968| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.multimailboxsearch.dll| 15.0.1497.23| 48,088| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.physicalaccess.dll| 15.0.1497.23| 561,112| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.propertydefinitions.dll| 15.0.1497.23| 784,856| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.propertytag.dll| 15.0.1497.23| 30,680| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.rpcproxy.dll| 15.0.1497.23| 118,744| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.storecommonservices.dll| 15.0.1497.23| 738,264| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.storeintegritycheck.dll| 15.0.1497.23| 93,144| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.server.storage.workermanager.dll| 15.0.1497.23| 34,800| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.servicehost.exe| 15.0.1497.23| 54,744| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.servicelets.globallocatorcache.dll| 15.0.1497.23| 49,136| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.services.dll| 15.0.1497.23| 7,786,480| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.services.onlinemeetings.dll| 15.0.1497.23| 214,528| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.setup.acquirelanguagepack.dll| 15.0.1497.23| 58,880| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.setup.bootstrapper.common.dll| 15.0.1497.23| 84,992| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.setup.common.dll| 15.0.1497.23| 308,224| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.setup.commonbase.dll| 15.0.1497.23| 35,832| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.setup.console.dll| 15.0.1497.23| 27,648| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.setup.gui.dll| 15.0.1497.23| 120,832| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.setup.parser.dll| 15.0.1497.23| 54,272| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.sharedcache.client.dll| 15.0.1497.23| 22,976| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.sharedcache.exe| 15.0.1497.23| 56,824| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.sharepointsignalstore.dll| 15.0.1497.23| 29,632| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.sqm.dll| 15.0.1497.23| 48,064| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.store.service.exe| 15.0.1497.23| 25,072| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.store.worker.exe| 15.0.1497.23| 26,592| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.storedriver.dll| 15.0.1497.23| 77,296| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.storeprovider.dll| 15.0.1497.23| 998,392| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.syncmigrationservicelet.dll| 15.0.1497.23| 15,832| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.textprocessing.dll| 15.0.1497.23| 151,488| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.transport.agent.addressbookpolicyroutingagent.dll| 15.0.1497.23| 24,592| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.antispam.common.dll| 15.0.1497.23| 96,272| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.contentfilter.cominterop.dll| 15.0.1497.23| 22,544| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.frontendproxyagent.dll| 15.0.1497.23| 20,496| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.hygiene.dll| 15.0.1497.23| 217,104| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.interceptoragent.dll| 15.0.1497.23| 103,952| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.liveidauth.dll| 15.0.1497.23| 17,936| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.malware.dll| 15.0.1497.23| 133,088| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.agent.phishingdetection.dll| 15.0.1497.23| 21,520| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.prioritization.dll| 15.0.1497.23| 29,712| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.protocolanalysis.dbaccess.dll| 15.0.1497.23| 48,144| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.search.dll| 15.0.1497.23| 30,216| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.senderid.core.dll| 15.0.1497.23| 54,288| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.sharedmailboxsentitemsroutingagent.dll| 15.0.1497.23| 28,648| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.agent.systemprobedrop.dll| 15.0.1497.23| 17,936| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.agent.trustedmailagents.dll| 15.0.1497.23| 45,072| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.transport.common.dll| 15.0.1497.23| 39,416| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.dll| 15.0.1497.23| 3,539,960| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.logging.search.dll| 15.0.1497.23| 73,720| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.loggingcommon.dll| 15.0.1497.23| 59,896| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.scheduler.contracts.dll| 15.0.1497.23| 21,496| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.scheduler.dll| 15.0.1497.23| 61,944| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.storage.contracts.dll| 15.0.1497.23| 27,640| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.storage.dll| 15.0.1497.23| 35,320| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.sync.agents.dll| 15.0.1497.23| 17,904| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.sync.common.dll| 15.0.1497.23| 515,584| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.sync.manager.dll| 15.0.1497.23| 316,920| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.sync.migrationrpc.dll| 15.0.1497.23| 47,104| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transport.sync.worker.dll| 15.0.1497.23| 1,079,800| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.transportsyncmanagersvc.exe| 15.0.1497.23| 18,424| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.um.callrouter.exe| 15.0.1497.23| 22,528| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.um.clientstrings.dll| 15.0.1497.23| 63,464| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.um.ucmaplatform.dll| 15.0.1497.23| 244,712| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.um.umcommon.dll| 15.0.1497.23| 967,168| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.um.umcore.dll| 15.0.1497.23| 1,515,520| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.unifiedcontent.dll| 15.0.1497.23| 40,448| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.unifiedcontent.exchange.dll| 15.0.1497.23| 23,040| 07-Jul-2021| 23:45| x86 \nMicrosoft.exchange.unifiedpolicysyncservicelet.dll| 15.0.1497.23| 38,888| 07-Jul-2021| 23:44| x86 \nMicrosoft.exchange.variantconfiguration.dll| 15.0.1497.23| 761,792| 07-Jul-2021| 23:49| x86 \nMicrosoft.exchange.workloadmanagement.dll| 15.0.1497.23| 193,528| 07-Jul-2021| 23:41| x86 \nMicrosoft.filtering.exchange.dll| 15.0.1497.23| 47,584| 07-Jul-2021| 23:45| x86 \nMicrosoft.forefront.activedirectoryconnector.dll| 15.0.1497.23| 47,072| 07-Jul-2021| 23:45| x86 \nMicrosoft.forefront.management.powershell.format.ps1xml| Not applicable| 23,730| 07-Jul-2021| 23:44| Not applicable \nMicrosoft.forefront.management.powershell.types.ps1xml| Not applicable| 16,361| 07-Jul-2021| 23:44| Not applicable \nMicrosoft.forefront.monitoring.activemonitoring.local.components.dll| 15.0.1497.23| 1,170,960| 07-Jul-2021| 23:45| x86 \nMicrosoft.forefront.monitoring.management.outsidein.dll| 15.0.1497.23| 31,232| 07-Jul-2021| 23:45| x86 \nMicrosoft.forefront.reporting.common.dll| 15.0.1497.23| 42,464| 07-Jul-2021| 23:45| x86 \nMicrosoft.forefront.reporting.ondemandquery.dll| 15.0.1497.23| 37,856| 07-Jul-2021| 23:45| x86 \nMicrosoft.isam.esent.interop.dll| 15.0.1497.23| 473,568| 07-Jul-2021| 23:45| x86 \nMicrosoft.office.compliancepolicy.exchange.dar.dll| 15.0.1497.23| 80,360| 07-Jul-2021| 23:44| x86 \nMicrosoft.office.compliancepolicy.platform.dll| 15.0.1497.23| 1,244,096| 07-Jul-2021| 23:49| x86 \nMicrosoft.office.datacenter.activemonitoring.management.common.dll| 15.0.1497.23| 51,712| 07-Jul-2021| 23:44| x86 \nMicrosoft.office.datacenter.activemonitoring.management.dll| 15.0.1497.23| 28,160| 07-Jul-2021| 23:45| x86 \nMicrosoft.office.datacenter.activemonitoringlocal.dll| 15.0.1497.23| 544,704| 07-Jul-2021| 23:49| x86 \nMicrosoft.office.datacenter.monitoring.activemonitoring.recovery.dll| 15.0.1497.23| 166,400| 07-Jul-2021| 23:45| x86 \nMicrosoft.office.datacenter.workertaskframeworkinternalprovider.dll| 15.0.1497.23| 252,352| 07-Jul-2021| 23:49| x86 \nMigrateumcustomprompts.ps1| Not applicable| 19,186| 07-Jul-2021| 23:45| Not applicable \nMovemailbox.ps1| Not applicable| 61,268| 07-Jul-2021| 23:45| Not applicable \nMovetransportdatabase.ps1| Not applicable| 30,666| 07-Jul-2021| 23:45| Not applicable \nMove_publicfolderbranch.ps1| Not applicable| 35,194| 07-Jul-2021| 23:45| Not applicable \nMsexchangedagmgmt.exe| 15.0.1497.23| 22,976| 07-Jul-2021| 23:48| x86 \nMsexchangedelivery.exe| 15.0.1497.23| 31,720| 07-Jul-2021| 23:44| x86 \nMsexchangefrontendtransport.exe| 15.0.1497.23| 25,592| 07-Jul-2021| 23:45| x86 \nMsexchangehmhost.exe| 15.0.1497.23| 25,600| 07-Jul-2021| 23:45| x86 \nMsexchangehmworker.exe| 15.0.1497.23| 34,816| 07-Jul-2021| 23:45| x86 \nMsexchangemailboxassistants.exe| 15.0.1497.23| 2,391,512| 07-Jul-2021| 23:44| x86 \nMsexchangemailboxreplication.exe| 15.0.1497.23| 20,400| 07-Jul-2021| 23:44| x86 \nMsexchangemigrationworkflow.exe| 15.0.1497.23| 46,000| 07-Jul-2021| 23:44| x86 \nMsexchangerepl.exe| 15.0.1497.23| 65,984| 07-Jul-2021| 23:48| x86 \nMsexchangesubmission.exe| 15.0.1497.23| 61,912| 07-Jul-2021| 23:44| x86 \nMsexchangethrottling.exe| 15.0.1497.23| 40,456| 07-Jul-2021| 23:45| x86 \nMsexchangetransport.exe| 15.0.1497.23| 77,304| 07-Jul-2021| 23:45| x86 \nMsexchangetransportlogsearch.exe| 15.0.1497.23| 143,352| 07-Jul-2021| 23:45| x86 \nMspatchlinterop.dll| 15.0.1497.23| 53,680| 07-Jul-2021| 23:44| x64 \nNewtestcasconnectivityuser.ps1| Not applicable| 22,328| 07-Jul-2021| 23:45| Not applicable \nNewtestcasconnectivityuserhosting.ps1| Not applicable| 24,643| 07-Jul-2021| 23:45| Not applicable \nOwaauth.dll| 15.0.1497.23| 91,568| 07-Jul-2021| 23:44| x64 \nPostexchange2000_schema99.ldf| Not applicable| 6,495| 07-Jul-2021| 19:16| Not applicable \nPostexchange2003_schema99.ldf| Not applicable| 41,776| 07-Jul-2021| 19:16| Not applicable \nPostwindows2003_schema99.ldf| Not applicable| 5,544| 07-Jul-2021| 19:16| Not applicable \nPowershell.rbachostingtools.dll_1bf4f3e363ef418781685d1a60da11c1| 15.0.1497.23| 41,384| 07-Jul-2021| 23:45| Not applicable \nPreparemoverequesthosting.ps1| Not applicable| 71,059| 07-Jul-2021| 23:45| Not applicable \nPrepare_moverequest.ps1| Not applicable| 73,293| 07-Jul-2021| 23:45| Not applicable \nPublicfoldertomailboxmapgenerator.ps1| Not applicable| 46,538| 07-Jul-2021| 23:45| Not applicable \nReinstalldefaulttransportagents.ps1| Not applicable| 20,800| 07-Jul-2021| 23:45| Not applicable \nRemoteexchange.ps1| Not applicable| 21,845| 07-Jul-2021| 23:44| Not applicable \nRemoveuserfrompfrecursive.ps1| Not applicable| 14,795| 07-Jul-2021| 23:45| Not applicable \nReplaceuserpermissiononpfrecursive.ps1| Not applicable| 15,111| 07-Jul-2021| 23:45| Not applicable \nReplaceuserwithuseronpfrecursive.ps1| Not applicable| 15,125| 07-Jul-2021| 23:45| Not applicable \nResetattachmentfilterentry.ps1| Not applicable| 15,540| 07-Jul-2021| 23:45| Not applicable \nResetcasservice.ps1| Not applicable| 21,771| 07-Jul-2021| 23:45| Not applicable \nRightsmanagementwrapper.dll| 15.0.1497.23| 79,280| 07-Jul-2021| 23:45| x64 \nRollalternateserviceaccountpassword.ps1| Not applicable| 55,850| 07-Jul-2021| 23:45| Not applicable \nRpcproxyshim.dll| 15.0.1497.23| 40,368| 07-Jul-2021| 23:45| x64 \nRwsperfcounters.xml| Not applicable| 22,996| 07-Jul-2021| 23:44| Not applicable \nSchema99.ldf| Not applicable| 26,237| 07-Jul-2021| 19:16| Not applicable \nSchemaadam.ldf| Not applicable| 348,383| 07-Jul-2021| 19:16| Not applicable \nSchemaversion.ldf| Not applicable| 1,905| 07-Jul-2021| 19:16| Not applicable \nSearchdiagnosticinfo.ps1| Not applicable| 16,876| 07-Jul-2021| 23:45| Not applicable \nSetup.exe| 15.0.1497.23| 20,992| 07-Jul-2021| 23:45| x86 \nSetupui.exe| 15.0.1497.23| 49,152| 07-Jul-2021| 23:45| x86 \nSplit_publicfoldermailbox.ps1| Not applicable| 104,500| 07-Jul-2021| 23:45| Not applicable \nStoretsconstants.ps1| Not applicable| 15,894| 07-Jul-2021| 23:45| Not applicable \nStoretslibrary.ps1| Not applicable| 28,067| 07-Jul-2021| 23:45| Not applicable \nTranscodingservice.exe| 15.0.1497.23| 124,336| 07-Jul-2021| 23:45| x64 \nTroubleshoot_ci.ps1| Not applicable| 22,791| 07-Jul-2021| 23:45| Not applicable \nTroubleshoot_databaselatency.ps1| Not applicable| 33,497| 07-Jul-2021| 23:45| Not applicable \nTroubleshoot_databasespace.ps1| Not applicable| 30,093| 07-Jul-2021| 23:45| Not applicable \nUglobal.js| Not applicable| 866,860| 07-Jul-2021| 23:01| Not applicable \nUmservice.exe| 15.0.1497.23| 102,888| 07-Jul-2021| 23:44| x86 \nUmworkerprocess.exe| 15.0.1497.23| 38,400| 07-Jul-2021| 23:44| x86 \nUpdateapppoolmanagedframeworkversion.ps1| Not applicable| 14,094| 07-Jul-2021| 23:45| Not applicable \nUpdate_malwarefilteringserver.ps1| Not applicable| 18,587| 07-Jul-2021| 23:45| Not applicable \nWeb.config_053c31bdd6824e95b35d61b0a5e7b62d| Not applicable| 30,135| 07-Jul-2021| 23:06| Not applicable \nWsbexchange.exe| 15.0.1497.23| 124,848| 07-Jul-2021| 23:45| x64 \n_search.mailboxoperators.a| 15.0.1497.23| 130,504| 07-Jul-2021| 23:44| Not applicable \n_search.mailboxoperators.b| 15.0.1497.23| 130,504| 07-Jul-2021| 23:44| Not applicable \n_search.tokenoperators.a| 15.0.1497.23| 80,320| 07-Jul-2021| 23:44| Not applicable \n_search.tokenoperators.b| 15.0.1497.23| 80,320| 07-Jul-2021| 23:44| Not applicable \n_search.transportoperators.a| 15.0.1497.23| 43,976| 07-Jul-2021| 23:44| Not applicable \n_search.transportoperators.b| 15.0.1497.23| 43,976| 07-Jul-2021| 23:44| Not applicable \n \n## Information about protection and security\n\nProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 2.1, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.0, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-07-13T07:00:00", "type": "mskb", "title": "Description of the security update for Microsoft Exchange Server 2013: July 13, 2021 (KB5004778)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 5.5, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.9, "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31196", "CVE-2021-31206", "CVE-2021-34470"], "modified": "2021-07-13T07:00:00", "id": "KB5004778", "href": "https://support.microsoft.com/en-us/help/5004778", "cvss": {"score": 7.9, "vector": "AV:A/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-06-23T19:31:39", "description": "None\n**Important: **Please install the May 2021 security update. That update supersedes this security fix. For more information, see the following Exchange Team Blog article:\n\n * [Released: May 2021 Exchange Server Security Updates](<https://techcommunity.microsoft.com/t5/exchange-team-blog/released-may-2021-exchange-server-security-updates/ba-p/2335209>)\n * This security update rollup resolves vulnerabilities in Microsoft Exchange Server. To learn more about these vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE):\n\n * [CVE-2021-28480 | Microsoft Exchange Server Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-28480>)\n * [CVE-2021-28481 | Microsoft Exchange Server Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-28481>)\n * [CVE-2021-28482 | Microsoft Exchange Server Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-28482>)\n * [CVE-2021-28483 | Microsoft Exchange Server Remote Code Execution Vulnerability](<https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2021-28483>)\n * [CVE-2021-34473 | Microsoft Exchange Server Remote Code Execution Vulnerability](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473>)\n * [CVE-2021-34523 | Microsoft Exchange Server Elevation of Privilege Vulnerability](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34523>)\n * [CVE-2021-33766 | Microsoft Exchange Server Information Disclosure Vulnerability](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33766>)\n\n## Known issues in this update\n\n * **Known issue 1** \n \nWhen you try to manually install this security update by double-clicking the update file (.msp) to run it in Normal mode (that is, not as an administrator), some files are not correctly updated.When this issue occurs, you don\u2019t receive an error message or any indication that the security update was not correctly installed. However, Outlook Web Access (OWA) and the Exchange Control Panel (ECP) might stop working. \n \nThis issue occurs on servers that are using User Account Control (UAC). The issue occurs because the security update doesn\u2019t correctly stop certain Exchange-related services.To avoid this issue, follow these steps to manually install this security update.\n\n**Note: **This issue does not occur if you install the update through Microsoft Update.\n\n 1. Select **Start**, and type **cmd**.\n 2. In the results, right-click **Command Prompt**, and then select **Run as administrator**.\n 3. If the **User Account Control** dialog box appears, verify that the default action is the action that you want, and then select **Continue**.\n 4. Type the full path of the .msp file, and then press Enter.\n**Notes: **\n * Exchange services might remain in a disabled state after you install this security update. This condition does not indicate that the update is not installed correctly. This condition might occur if the service control scripts experience a problem when they try to return Exchange services to their usual state. \n \nTo fix this issue, use Services Manager to restore the startup type to **Automatic**, and then start the affected Exchange services manually. To avoid this issue, run the security update at an elevated command prompt. For more information about how to open an elevated Command Prompt window, see [Start a Command Prompt as an Administrator](<https://technet.microsoft.com/en-us/library/cc947813\\(v=ws.10\\).aspx>).\n * When you block third-party cookies in a web browser, you may be continually prompted to trust a particular add-in even though you keep selecting the option to trust it. This issue occurs also in privacy window modes (such as InPrivate mode in Microsoft Edge). This issue occurs because browser restrictions prevent the response from being recorded. To record the response and enable the add-in, you must enable third-party cookies for the domain that's hosting OWA or Office Online Server in the browser settings. To enable this setting, refer to the specific support documentation for the browser.\n * **Known issue 2** \n \nAfter you install the Exchange Server April security update, cmdlets that are run through the Exchange Management Shell by using an invoked runspace might fail and return the following error message: \n\n**Note: **The syntax is not supported by this runspace. This can occur if the runspace is in no-language mode. \n\nFor more information, see [\u201cThe syntax is not supported by this runspace\u201d error after installing April 2021 Exchange security update (or later updates)](<https://support.microsoft.com/en-us/topic/-the-syntax-is-not-supported-by-this-runspace-error-after-installing-april-2021-exchange-security-update-ac2d4e97-62f6-4ad4-9dbb-0ade9b79f599>)\n * **Known issue 3** \n \nRequesting free/busy information for a user in a different forest in a trusted cross-forest topology might fail and return the following Autodiscover error message: \n\n**Note: **The remote server returned an error: (400) Bad Request.\n\nFor more information, see [\"(400) Bad Request\" error during Autodiscover for per-user free/busy in a trusted cross-forest topology](<https://support.microsoft.com/en-us/topic/-400-bad-request-error-during-autodiscover-for-per-user-free-busy-in-a-trusted-cross-forest-topology-a1d6296b-1b2b-4ecd-9ab6-d8637fe20a21>)\n * **Known issue 4** \n \nAdministrator or Service accounts that end in a dollar sign character ($) might fail when they try to connect to Exchange Management Shell or EAC. The only workaround at this time is to use accounts that don't have a dollar sign at the end of the name.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB5001779>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center.\n\n * [Download Security Update For Exchange Server 2019 Cumulative Update 9 (KB5001779)](<https://www.microsoft.com/download/details.aspx?familyid=5aa2aaf7-860d-4977-acd4-82096c83c5f0>)\n * [Download Security Update For Exchange Server 2019 Cumulative Update 8 (KB5001779)](<https://www.microsoft.com/download/details.aspx?familyid=93809dc0-0265-4116-bc51-510ce641008b>)\n * [Download Security Update For Exchange Server 2016 Cumulative Update 20 (KB5001779)](<https://www.microsoft.com/download/details.aspx?familyid=b13f23a9-5603-4b13-8e16-6d35b5b33524>)\n * [Download Security Update For Exchange Server 2016 Cumulative Update 19 (KB5001779)](<https://www.microsoft.com/download/details.aspx?familyid=52da6d67-e0c4-4af0-a133-1e47217b6309>)\n * [Download Security Update For Exchange Server 2013 Cumulative Update 23 (KB5001779)](<https://www.microsoft.com/download/details.aspx?familyid=f827ff3b-194c-4470-aa8f-6cedc0d95d07>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: April 13, 2021](<https://support.microsoft.com/help/5001866>).\n\n### Security update replacement information\n\nThis security update replaces the following previously released updates:\n\n * [Description of the security update for Microsoft Exchange Server 2019, 2016, and 2013: March 2, 2021 (KB5000871)](<https://support.microsoft.com/help/5000871>)\n\n## File information\n\n### File hash information\n\nUpdate name| File name| | SHA1 hash| SHA256 hash \n---|---|---|---|--- \nExchange Server 2019 Cumulative Update 9| Exchange2019-KB5001779-x64-en.msp| | 6BF217B876381DB769BA8D4EF8FE2F1739841BDE| 557245D2B52C708A193DAAB46D35CA1683DCF1F651CC362B53DC6D7CAEB0E2F9 \nExchange Server 2019 Cumulative Update 8| Exchange2019-KB5001779-x64-en.msp| | B228041E258836DCC03B16B485DC7AA4FDDE7DC0| 58DC3AEA33E5014BCE03FC905FA59332B5C1E673F9195C646AF5F1541E33AF87 \nExchange Server 2016 Cumulative Update 20| Exchange2016-KB5001779-x64-en.msp| | 6481BC6EE060541641EE21F0368F45563C03CFD8| F428F4F667539E1D7D2F7FC5A526E699D86718990622F8724E0258F4B4107518 \nExchange Server 2016 Cumulative Update 19| Exchange2016-KB5001779-x64-en.msp| | 0368F19923C70B1824297FD333D056B5CB20AF37| 7A2DF56EC99A6DF13258360DF79C01713C19AA0D35A33FB1FC8DC2CB12669123 \nExchange Server 2013 Cumulative Update 23| Exchange2013-KB5001779-x64-en.msp| | CC0DAAE493A268E495CA7B547CB1EA2A5A7A0556| 2987759DFEDA4A2E7FCEC234938E1629A288D097E585BAAEEF40C5982DFE709A \n \n### Exchange server file information\n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n#### \n\n__\n\nMicrosoft Exchange Server 2019 Cumulative Update 9\n\nFile name| File version| File size| Date| Time| Platform \n---|---|---|---|---|--- \nActivemonitoringeventmsg.dll| 15.2.858.9| 71,048| 04-Apr-2021| 08:28| x64 \nActivemonitoringexecutionlibrary.ps1| Not applicable| 29,522| 04-Apr-2021| 08:33| Not applicable \nAdduserstopfrecursive.ps1| Not applicable| 14,969| 04-Apr-2021| 08:38| Not applicable \nAdemodule.dll| 15.2.858.9| 106,392| 04-Apr-2021| 08:29| x64 \nAirfilter.dll| 15.2.858.9| 42,872| 04-Apr-2021| 08:33| x64 \nAjaxcontroltoolkit.dll| 15.2.858.9| 92,568| 04-Apr-2021| 08:28| x86 \nAntispamcommon.ps1| Not applicable| 13,505| 04-Apr-2021| 08:38| Not applicable \nAsdat.msi| Not applicable| 5,087,232| 04-Apr-2021| 08:35| Not applicable \nAsentirs.msi| Not applicable| 77,824| 04-Apr-2021| 08:33| Not applicable \nAsentsig.msi| Not applicable| 73,728| 04-Apr-2021| 08:35| Not applicable \nBigfunnel.bondtypes.dll| 15.2.858.9| 45,464| 04-Apr-2021| 08:33| x86 \nBigfunnel.common.dll| 15.2.858.9| 66,440| 04-Apr-2021| 08:30| x86 \nBigfunnel.configuration.dll| 15.2.858.9| 118,152| 04-Apr-2021| 08:31| x86 \nBigfunnel.entropy.dll| 15.2.858.9| 44,424| 04-Apr-2021| 08:30| x86 \nBigfunnel.filter.dll| 15.2.858.9| 54,160| 04-Apr-2021| 08:43| x86 \nBigfunnel.indexstream.dll| 15.2.858.9| 68,992| 04-Apr-2021| 08:32| x86 \nBigfunnel.neuraltree.dll| Not applicable| 694,168| 04-Apr-2021| 08:30| x64 \nBigfunnel.neuraltreeranking.dll| 15.2.858.9| 19,864| 04-Apr-2021| 08:31| x86 \nBigfunnel.poi.dll| 15.2.858.9| 245,128| 04-Apr-2021| 08:33| x86 \nBigfunnel.postinglist.dll| 15.2.858.9| 189,320| 04-Apr-2021| 08:37| x86 \nBigfunnel.query.dll| 15.2.858.9| 101,248| 04-Apr-2021| 08:43| x86 \nBigfunnel.ranking.dll| 15.2.858.9| 109,448| 04-Apr-2021| 08:36| x86 \nBigfunnel.syntheticdatalib.dll| 15.2.858.9| 3,634,568| 04-Apr-2021| 08:43| x86 \nBigfunnel.tracing.dll| 15.2.858.9| 42,880| 04-Apr-2021| 08:31| x86 \nBigfunnel.wordbreakers.dll| 15.2.858.9| 46,472| 04-Apr-2021| 08:33| x86 \nCafe_airfilter_dll| 15.2.858.9| 42,872| 04-Apr-2021| 08:33| x64 \nCafe_exppw_dll| 15.2.858.9| 83,352| 04-Apr-2021| 08:39| x64 \nCafe_owaauth_dll| 15.2.858.9| 92,040| 04-Apr-2021| 08:39| x64 \nCalcalculation.ps1| Not applicable| 42,097| 04-Apr-2021| 08:39| Not applicable \nCheckdatabaseredundancy.ps1| Not applicable| 94,606| 04-Apr-2021| 08:39| Not applicable \nChksgfiles.dll| 15.2.858.9| 57,216| 04-Apr-2021| 08:39| x64 \nCitsconstants.ps1| Not applicable| 15,805| 04-Apr-2021| 08:36| Not applicable \nCitslibrary.ps1| Not applicable| 82,680| 04-Apr-2021| 08:36| Not applicable \nCitstypes.ps1| Not applicable| 14,464| 04-Apr-2021| 08:36| Not applicable \nClassificationengine_mce| 15.2.858.9| 1,693,576| 04-Apr-2021| 08:27| Not applicable \nClusmsg.dll| 15.2.858.9| 134,024| 04-Apr-2021| 08:41| x64 \nCoconet.dll| 15.2.858.9| 48,008| 04-Apr-2021| 08:31| x64 \nCollectovermetrics.ps1| Not applicable| 81,684| 04-Apr-2021| 08:39| Not applicable \nCollectreplicationmetrics.ps1| Not applicable| 41,870| 04-Apr-2021| 08:38| Not applicable \nCommonconnectfunctions.ps1| Not applicable| 29,931| 04-Apr-2021| 08:33| Not applicable \nComplianceauditservice.exe| 15.2.858.10| 39,832| 04-Apr-2021| 08:39| x86 \nConfigureadam.ps1| Not applicable| 22,804| 04-Apr-2021| 08:35| Not applicable \nConfigurecaferesponseheaders.ps1| Not applicable| 20,348| 04-Apr-2021| 08:38| Not applicable \nConfigurecryptodefaults.ps1| Not applicable| 42,035| 04-Apr-2021| 08:39| Not applicable \nConfigurenetworkprotocolparameters.ps1| Not applicable| 19,810| 04-Apr-2021| 08:36| Not applicable \nConfiguresmbipsec.ps1| Not applicable| 39,868| 04-Apr-2021| 08:37| Not applicable \nConfigure_enterprisepartnerapplication.ps1| Not applicable| 22,323| 04-Apr-2021| 08:37| Not applicable \nConnectfunctions.ps1| Not applicable| 37,141| 04-Apr-2021| 08:43| Not applicable \nConnect_exchangeserver_help.xml| Not applicable| 30,420| 04-Apr-2021| 08:43| Not applicable \nConsoleinitialize.ps1| Not applicable| 24,272| 04-Apr-2021| 08:31| Not applicable \nConvertoabvdir.ps1| Not applicable| 20,089| 04-Apr-2021| 08:37| Not applicable \nConverttomessagelatency.ps1| Not applicable| 14,572| 04-Apr-2021| 08:38| Not applicable \nConvert_distributiongrouptounifiedgroup.ps1| Not applicable| 34,805| 04-Apr-2021| 08:37| Not applicable \nCreate_publicfoldermailboxesformigration.ps1| Not applicable| 27,952| 04-Apr-2021| 08:38| Not applicable \nCts.14.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts.14.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts.14.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts.14.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts.14.4.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts.15.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts.15.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts.15.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts.15.20.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts.8.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts.8.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts.8.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts_exsmime.dll| 15.2.858.9| 380,792| 04-Apr-2021| 08:31| x64 \nCts_microsoft.exchange.data.common.dll| 15.2.858.9| 1,686,936| 04-Apr-2021| 08:32| x86 \nCts_microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 502| 04-Apr-2021| 06:23| Not applicable \nCts_policy.14.0.microsoft.exchange.data.common.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:39| x86 \nCts_policy.14.1.microsoft.exchange.data.common.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:38| x86 \nCts_policy.14.2.microsoft.exchange.data.common.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:39| x86 \nCts_policy.14.3.microsoft.exchange.data.common.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:39| x86 \nCts_policy.14.4.microsoft.exchange.data.common.dll| 15.2.858.9| 12,696| 04-Apr-2021| 08:38| x86 \nCts_policy.15.0.microsoft.exchange.data.common.dll| 15.2.858.9| 12,672| 04-Apr-2021| 08:39| x86 \nCts_policy.15.1.microsoft.exchange.data.common.dll| 15.2.858.9| 12,696| 04-Apr-2021| 08:39| x86 \nCts_policy.15.2.microsoft.exchange.data.common.dll| 15.2.858.9| 12,696| 04-Apr-2021| 08:39| x86 \nCts_policy.15.20.microsoft.exchange.data.common.dll| 15.2.858.9| 12,688| 04-Apr-2021| 08:38| x86 \nCts_policy.8.0.microsoft.exchange.data.common.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:38| x86 \nCts_policy.8.1.microsoft.exchange.data.common.dll| 15.2.858.9| 12,672| 04-Apr-2021| 08:39| x86 \nCts_policy.8.2.microsoft.exchange.data.common.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:39| x86 \nCts_policy.8.3.microsoft.exchange.data.common.dll| 15.2.858.9| 12,672| 04-Apr-2021| 08:35| x86 \nDagcommonlibrary.ps1| Not applicable| 60,226| 04-Apr-2021| 08:36| Not applicable \nDependentassemblygenerator.exe| 15.2.858.9| 22,416| 04-Apr-2021| 08:39| x86 \nDiaghelper.dll| 15.2.858.9| 66,968| 04-Apr-2021| 08:32| x86 \nDiagnosticscriptcommonlibrary.ps1| Not applicable| 16,334| 04-Apr-2021| 08:38| Not applicable \nDisableinmemorytracing.ps1| Not applicable| 13,402| 04-Apr-2021| 08:37| Not applicable \nDisable_antimalwarescanning.ps1| Not applicable| 15,229| 04-Apr-2021| 08:37| Not applicable \nDisable_outsidein.ps1| Not applicable| 13,690| 04-Apr-2021| 08:33| Not applicable \nDisklockerapi.dll| Not applicable| 22,392| 04-Apr-2021| 08:38| x64 \nDlmigrationmodule.psm1| Not applicable| 39,620| 04-Apr-2021| 08:36| Not applicable \nDsaccessperf.dll| 15.2.858.9| 45,960| 04-Apr-2021| 08:30| x64 \nDscperf.dll| 15.2.858.9| 32,640| 04-Apr-2021| 08:42| x64 \nDup_cts_microsoft.exchange.data.common.dll| 15.2.858.9| 1,686,936| 04-Apr-2021| 08:32| x86 \nDup_ext_microsoft.exchange.data.transport.dll| 15.2.858.9| 601,464| 04-Apr-2021| 08:33| x86 \nEcpperfcounters.xml| Not applicable| 31,144| 04-Apr-2021| 08:28| Not applicable \nEdgeextensibility_microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEdgeextensibility_policy.8.0.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,672| 04-Apr-2021| 08:39| x86 \nEdgetransport.exe| 15.2.858.10| 49,536| 04-Apr-2021| 08:39| x86 \nEext.14.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext.14.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext.14.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext.14.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext.14.4.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext.15.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext.15.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext.15.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext.15.20.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext.8.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext.8.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext.8.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 505| 04-Apr-2021| 06:23| Not applicable \nEext_policy.14.0.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,688| 04-Apr-2021| 08:39| x86 \nEext_policy.14.1.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,672| 04-Apr-2021| 08:39| x86 \nEext_policy.14.2.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:39| x86 \nEext_policy.14.3.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,688| 04-Apr-2021| 08:43| x86 \nEext_policy.14.4.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,672| 04-Apr-2021| 08:39| x86 \nEext_policy.15.0.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,688| 04-Apr-2021| 08:44| x86 \nEext_policy.15.1.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:39| x86 \nEext_policy.15.2.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:38| x86 \nEext_policy.15.20.microsoft.exchange.data.transport.dll| 15.2.858.9| 13,192| 04-Apr-2021| 08:38| x86 \nEext_policy.8.1.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,672| 04-Apr-2021| 08:39| x86 \nEext_policy.8.2.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,664| 04-Apr-2021| 08:39| x86 \nEext_policy.8.3.microsoft.exchange.data.transport.dll| 15.2.858.9| 12,672| 04-Apr-2021| 08:44| x86 \nEnableinmemorytracing.ps1| Not applicable| 13,404| 04-Apr-2021| 08:35| Not applicable \nEnable_antimalwarescanning.ps1| Not applicable| 17,603| 04-Apr-2021| 08:36| Not applicable \nEnable_basicauthtooauthconverterhttpmodule.ps1| Not applicable| 18,624| 04-Apr-2021| 08:36| Not applicable \nEnable_crossforestconnector.ps1| Not applicable| 18,634| 04-Apr-2021| 08:38| Not applicable \nEnable_outlookcertificateauthentication.ps1| Not applicable| 22,952| 04-Apr-2021| 08:37| Not applicable \nEnable_outsidein.ps1| Not applicable| 13,687| 04-Apr-2021| 08:33| Not applicable \nEngineupdateserviceinterfaces.dll| 15.2.858.9| 17,800| 04-Apr-2021| 08:27| x86 \nEscprint.dll| 15.2.858.9| 20,360| 04-Apr-2021| 08:39| x64 \nEse.dll| 15.2.858.9| 3,741,584| 04-Apr-2021| 08:31| x64 \nEseback2.dll| 15.2.858.9| 350,080| 04-Apr-2021| 08:29| x64 \nEsebcli2.dll| 15.2.858.9| 318,328| 04-Apr-2021| 08:41| x64 \nEseperf.dll| 15.2.858.9| 108,928| 04-Apr-2021| 08:40| x64 \nEseutil.exe| 15.2.858.9| 425,368| 04-Apr-2021| 08:42| x64 \nEsevss.dll| 15.2.858.9| 44,440| 04-Apr-2021| 08:35| x64 \nEtweseproviderresources.dll| 15.2.858.9| 101,256| 04-Apr-2021| 08:39| x64 \nEventperf.dll| 15.2.858.9| 59,768| 04-Apr-2021| 08:27| x64 \nExchange.depthtwo.types.ps1xml| Not applicable| 40,093| 04-Apr-2021| 08:44| Not applicable \nExchange.format.ps1xml| Not applicable| 649,694| 04-Apr-2021| 08:43| Not applicable \nExchange.partial.types.ps1xml| Not applicable| 44,323| 04-Apr-2021| 08:43| Not applicable \nExchange.ps1| Not applicable| 20,807| 04-Apr-2021| 08:43| Not applicable \nExchange.support.format.ps1xml| Not applicable| 26,535| 04-Apr-2021| 08:38| Not applicable \nExchange.types.ps1xml| Not applicable| 365,149| 04-Apr-2021| 08:44| Not applicable \nExchangeudfcommon.dll| 15.2.858.9| 122,744| 04-Apr-2021| 08:39| x86 \nExchangeudfs.dll| 15.2.858.9| 272,776| 04-Apr-2021| 08:39| x86 \nExchmem.dll| 15.2.858.9| 86,400| 04-Apr-2021| 08:29| x64 \nExchsetupmsg.dll| 15.2.858.9| 19,336| 04-Apr-2021| 08:39| x64 \nExdbfailureitemapi.dll| Not applicable| 27,032| 04-Apr-2021| 08:38| x64 \nExdbmsg.dll| 15.2.858.9| 230,800| 04-Apr-2021| 08:39| x64 \nExeventperfplugin.dll| 15.2.858.9| 25,472| 04-Apr-2021| 08:32| x64 \nExmime.dll| 15.2.858.9| 364,928| 04-Apr-2021| 08:39| x64 \nExportedgeconfig.ps1| Not applicable| 27,431| 04-Apr-2021| 08:37| Not applicable \nExport_mailpublicfoldersformigration.ps1| Not applicable| 18,594| 04-Apr-2021| 08:38| Not applicable \nExport_modernpublicfolderstatistics.ps1| Not applicable| 29,242| 04-Apr-2021| 08:36| Not applicable \nExport_outlookclassification.ps1| Not applicable| 14,374| 04-Apr-2021| 08:39| Not applicable \nExport_publicfolderstatistics.ps1| Not applicable| 23,157| 04-Apr-2021| 08:37| Not applicable \nExport_retentiontags.ps1| Not applicable| 17,080| 04-Apr-2021| 08:37| Not applicable \nExppw.dll| 15.2.858.9| 83,352| 04-Apr-2021| 08:39| x64 \nExprfdll.dll| 15.2.858.9| 26,520| 04-Apr-2021| 08:43| x64 \nExrpc32.dll| 15.2.858.9| 2,029,448| 04-Apr-2021| 08:34| x64 \nExrw.dll| 15.2.858.9| 28,056| 04-Apr-2021| 08:30| x64 \nExsetdata.dll| 15.2.858.9| 2,779,528| 04-Apr-2021| 08:39| x64 \nExsetup.exe| 15.2.858.10| 35,224| 04-Apr-2021| 08:39| x86 \nExsetupui.exe| 15.2.858.10| 471,936| 04-Apr-2021| 08:39| x86 \nExtrace.dll| 15.2.858.9| 245,128| 04-Apr-2021| 08:31| x64 \nExt_microsoft.exchange.data.transport.dll| 15.2.858.9| 601,464| 04-Apr-2021| 08:33| x86 \nExwatson.dll| 15.2.858.9| 44,936| 04-Apr-2021| 08:27| x64 \nFastioext.dll| 15.2.858.9| 60,312| 04-Apr-2021| 08:39| x64 \nFil06f84122c94c91a0458cad45c22cce20| Not applicable| 784,630| 04-Apr-2021| 08:38| Not applicable \nFil143a7a5d4894478a85eefc89a6539fc8| Not applicable| 1,909,227| 04-Apr-2021| 08:39| Not applicable \nFil19f527f284a0bb584915f9994f4885c3| Not applicable| 648,759| 04-Apr-2021| 08:39| Not applicable \nFil1a9540363a531e7fb18ffe600cffc3ce| Not applicable| 358,404| 04-Apr-2021| 08:33| Not applicable \nFil220d95210c8697448312eee6628c815c| Not applicable| 303,656| 04-Apr-2021| 08:33| Not applicable \nFil2cf5a31e239a45fabea48687373b547c| Not applicable| 652,758| 04-Apr-2021| 08:39| Not applicable \nFil397f0b1f1d7bd44d6e57e496decea2ec| Not applicable| 784,627| 04-Apr-2021| 08:39| Not applicable \nFil3ab126057b34eee68c4fd4b127ff7aee| Not applicable| 784,603| 04-Apr-2021| 08:38| Not applicable \nFil41bb2e5743e3bde4ecb1e07a76c5a7a8| Not applicable| 149,154| 04-Apr-2021| 08:28| Not applicable \nFil51669bfbda26e56e3a43791df94c1e9c| Not applicable| 9,344| 04-Apr-2021| 08:39| Not applicable \nFil558cb84302edfc96e553bcfce2b85286| Not applicable| 85,258| 04-Apr-2021| 08:39| Not applicable \nFil55ce217251b77b97a46e914579fc4c64| Not applicable| 648,753| 04-Apr-2021| 08:39| Not applicable \nFil5a9e78a51a18d05bc36b5e8b822d43a8| Not applicable| 1,596,145| 04-Apr-2021| 08:27| Not applicable \nFil5c7d10e5f1f9ada1e877c9aa087182a9| Not applicable| 1,596,145| 04-Apr-2021| 08:27| Not applicable \nFil6569a92c80a1e14949e4282ae2cc699c| Not applicable| 1,596,145| 04-Apr-2021| 08:27| Not applicable \nFil6a01daba551306a1e55f0bf6894f4d9f| Not applicable| 648,729| 04-Apr-2021| 08:39| Not applicable \nFil8863143ea7cd93a5f197c9fff13686bf| Not applicable| 648,759| 04-Apr-2021| 08:39| Not applicable \nFil8a8c76f225c7205db1000e8864c10038| Not applicable| 1,596,145| 04-Apr-2021| 08:27| Not applicable \nFil8cd999415d36ba78a3ac16a080c47458| Not applicable| 784,633| 04-Apr-2021| 08:38| Not applicable \nFil97913e630ff02079ce9889505a517ec0| Not applicable| 1,596,145| 04-Apr-2021| 08:27| Not applicable \nFilaa49badb2892075a28d58d06560f8da2| Not applicable| 785,657| 04-Apr-2021| 08:39| Not applicable \nFilae28aeed23ccb4b9b80accc2d43175b5| Not applicable| 648,756| 04-Apr-2021| 08:38| Not applicable \nFilb17f496f9d880a684b5c13f6b02d7203| Not applicable| 784,633| 04-Apr-2021| 08:38| Not applicable \nFilb94ca32f2654692263a5be009c0fe4ca| Not applicable| 2,564,949| 04-Apr-2021| 08:29| Not applicable \nFilbabdc4808eba0c4f18103f12ae955e5c| Not applicable| 342,639,490| 04-Apr-2021| 08:28| Not applicable \nFilc92cf2bf29bed21bd5555163330a3d07| Not applicable| 652,776| 04-Apr-2021| 08:39| Not applicable \nFilcc478d2a8346db20c4e2dc36f3400628| Not applicable| 784,633| 04-Apr-2021| 08:39| Not applicable \nFild26cd6b13cfe2ec2a16703819da6d043| Not applicable| 1,596,145| 04-Apr-2021| 08:27| Not applicable \nFilf2719f9dc8f7b74df78ad558ad3ee8a6| Not applicable| 785,639| 04-Apr-2021| 08:39| Not applicable \nFilfa5378dc76359a55ef20cc34f8a23fee| Not applicable| 1,427,187| 04-Apr-2021| 08:27| Not applicable \nFilteringconfigurationcommands.ps1| Not applicable| 18,267| 04-Apr-2021| 08:34| Not applicable \nFilteringpowershell.dll| 15.2.858.9| 223,096| 04-Apr-2021| 08:28| x86 \nFilteringpowershell.format.ps1xml| Not applicable| 29,668| 04-Apr-2021| 08:27| Not applicable \nFiltermodule.dll| 15.2.858.9| 180,120| 04-Apr-2021| 08:28| x64 \nFipexeuperfctrresource.dll| 15.2.858.9| 15,256| 04-Apr-2021| 08:32| x64 \nFipexeventsresource.dll| 15.2.858.9| 44,944| 04-Apr-2021| 08:33| x64 \nFipexperfctrresource.dll| 15.2.858.9| 32,664| 04-Apr-2021| 08:27| x64 \nFirewallres.dll| 15.2.858.9| 72,584| 04-Apr-2021| 08:32| x64 \nFms.exe| 15.2.858.9| 1,350,016| 04-Apr-2021| 08:28| x64 \nForefrontactivedirectoryconnector.exe| 15.2.858.9| 110,968| 04-Apr-2021| 08:39| x64 \nFpsdiag.exe| 15.2.858.9| 18,824| 04-Apr-2021| 08:28| x86 \nFsccachedfilemanagedlocal.dll| 15.2.858.9| 822,144| 04-Apr-2021| 08:29| x64 \nFscconfigsupport.dll| 15.2.858.9| 56,712| 04-Apr-2021| 08:28| x86 \nFscconfigurationserver.exe| 15.2.858.9| 430,976| 04-Apr-2021| 08:27| x64 \nFscconfigurationserverinterfaces.dll| 15.2.858.9| 15,744| 04-Apr-2021| 08:32| x86 \nFsccrypto.dll| 15.2.858.9| 208,792| 04-Apr-2021| 08:28| x64 \nFscipcinterfaceslocal.dll| 15.2.858.9| 28,544| 04-Apr-2021| 08:27| x86 \nFscipclocal.dll| 15.2.858.9| 38,264| 04-Apr-2021| 08:27| x86 \nFscsqmuploader.exe| 15.2.858.9| 453,528| 04-Apr-2021| 08:28| x64 \nGetucpool.ps1| Not applicable| 19,811| 04-Apr-2021| 08:36| Not applicable \nGetvalidengines.ps1| Not applicable| 13,274| 04-Apr-2021| 08:36| Not applicable \nGet_antispamfilteringreport.ps1| Not applicable| 15,829| 04-Apr-2021| 08:38| Not applicable \nGet_antispamsclhistogram.ps1| Not applicable| 14,655| 04-Apr-2021| 08:38| Not applicable \nGet_antispamtopblockedsenderdomains.ps1| Not applicable| 15,711| 04-Apr-2021| 08:39| Not applicable \nGet_antispamtopblockedsenderips.ps1| Not applicable| 14,775| 04-Apr-2021| 08:39| Not applicable \nGet_antispamtopblockedsenders.ps1| Not applicable| 15,498| 04-Apr-2021| 08:39| Not applicable \nGet_antispamtoprblproviders.ps1| Not applicable| 14,689| 04-Apr-2021| 08:38| Not applicable \nGet_antispamtoprecipients.ps1| Not applicable| 14,790| 04-Apr-2021| 08:39| Not applicable \nGet_dleligibilitylist.ps1| Not applicable| 42,376| 04-Apr-2021| 08:36| Not applicable \nGet_exchangeetwtrace.ps1| Not applicable| 28,983| 04-Apr-2021| 08:36| Not applicable \nGet_publicfoldermailboxsize.ps1| Not applicable| 15,062| 04-Apr-2021| 08:38| Not applicable \nGet_storetrace.ps1| Not applicable| 51,871| 04-Apr-2021| 08:39| Not applicable \nHuffman_xpress.dll| 15.2.858.9| 32,648| 04-Apr-2021| 08:30| x64 \nImportedgeconfig.ps1| Not applicable| 77,280| 04-Apr-2021| 08:37| Not applicable \nImport_mailpublicfoldersformigration.ps1| Not applicable| 29,516| 04-Apr-2021| 08:37| Not applicable \nImport_retentiontags.ps1| Not applicable| 28,858| 04-Apr-2021| 08:38| Not applicable \nInproxy.dll| 15.2.858.9| 85,896| 04-Apr-2021| 08:34| x64 \nInstallwindowscomponent.ps1| Not applicable| 34,523| 04-Apr-2021| 08:39| Not applicable \nInstall_antispamagents.ps1| Not applicable| 17,929| 04-Apr-2021| 08:39| Not applicable \nInstall_odatavirtualdirectory.ps1| Not applicable| 17,983| 04-Apr-2021| 08:38| Not applicable \nInterop.activeds.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.858.9| 107,392| 04-Apr-2021| 08:30| Not applicable \nInterop.adsiis.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.858.9| 20,360| 04-Apr-2021| 08:33| Not applicable \nInterop.certenroll.dll| 15.2.858.9| 142,736| 04-Apr-2021| 08:31| x86 \nInterop.licenseinfointerface.dll| 15.2.858.9| 14,216| 04-Apr-2021| 08:33| x86 \nInterop.netfw.dll| 15.2.858.9| 34,184| 04-Apr-2021| 08:28| x86 \nInterop.plalibrary.dll| 15.2.858.9| 72,600| 04-Apr-2021| 08:28| x86 \nInterop.stdole2.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.858.9| 27,016| 04-Apr-2021| 08:33| Not applicable \nInterop.taskscheduler.dll| 15.2.858.9| 46,472| 04-Apr-2021| 08:27| x86 \nInterop.wuapilib.dll| 15.2.858.9| 60,800| 04-Apr-2021| 08:39| x86 \nInterop.xenroll.dll| 15.2.858.9| 39,816| 04-Apr-2021| 08:31| x86 \nKerbauth.dll| 15.2.858.9| 62,848| 04-Apr-2021| 08:42| x64 \nLicenseinfointerface.dll| 15.2.858.9| 643,464| 04-Apr-2021| 08:29| x64 \nLpversioning.xml| Not applicable| 20,470| 04-Apr-2021| 08:34| Not applicable \nMailboxdatabasereseedusingspares.ps1| Not applicable| 31,920| 04-Apr-2021| 08:39| Not applicable \nManagedavailabilitycrimsonmsg.dll| 15.2.858.9| 138,640| 04-Apr-2021| 08:34| x64 \nManagedstorediagnosticfunctions.ps1| Not applicable| 126,277| 04-Apr-2021| 08:39| Not applicable \nManagescheduledtask.ps1| Not applicable| 36,372| 04-Apr-2021| 08:38| Not applicable \nManage_metacachedatabase.ps1| Not applicable| 51,127| 04-Apr-2021| 08:36| Not applicable \nMce.dll| 15.2.858.9| 1,693,576| 04-Apr-2021| 08:27| x64 \nMeasure_storeusagestatistics.ps1| Not applicable| 29,487| 04-Apr-2021| 08:39| Not applicable \nMerge_publicfoldermailbox.ps1| Not applicable| 22,663| 04-Apr-2021| 08:37| Not applicable \nMicrosoft.database.isam.dll| 15.2.858.9| 127,880| 04-Apr-2021| 08:39| x86 \nMicrosoft.dkm.proxy.dll| 15.2.858.9| 26,008| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.activemonitoring.activemonitoringvariantconfig.dll| 15.2.858.9| 68,488| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.activemonitoring.eventlog.dll| 15.2.858.9| 17,816| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.addressbook.service.dll| 15.2.858.10| 233,368| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.addressbook.service.eventlog.dll| 15.2.858.9| 15,752| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.airsync.airsyncmsg.dll| 15.2.858.9| 43,400| 04-Apr-2021| 08:38| x64 \nMicrosoft.exchange.airsync.comon.dll| 15.2.858.10| 1,776,000| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.airsync.dll1| 15.2.858.10| 505,216| 04-Apr-2021| 08:29| Not applicable \nMicrosoft.exchange.airsynchandler.dll| 15.2.858.10| 76,160| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.anchorservice.dll| 15.2.858.10| 135,568| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.antispam.eventlog.dll| 15.2.858.9| 23,448| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.antispamupdate.eventlog.dll| 15.2.858.9| 15,752| 04-Apr-2021| 08:44| x64 \nMicrosoft.exchange.antispamupdatesvc.exe| 15.2.858.10| 27,016| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.approval.applications.dll| 15.2.858.10| 53,656| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.assistants.dll| 15.2.858.10| 925,056| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.assistants.eventlog.dll| 15.2.858.9| 25,976| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.assistants.interfaces.dll| 15.2.858.9| 43,400| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.audit.azureclient.dll| 15.2.858.10| 15,232| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.auditlogsearch.eventlog.dll| 15.2.858.9| 14,720| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.auditlogsearchservicelet.dll| 15.2.858.10| 70,528| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.dll| 15.2.858.10| 94,600| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.eventlog.dll| 15.2.858.9| 13,192| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.authadmin.eventlog.dll| 15.2.858.9| 15,752| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.authadminservicelet.dll| 15.2.858.10| 36,744| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.authservicehostservicelet.dll| 15.2.858.9| 15,752| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.autodiscover.configuration.dll| 15.2.858.9| 79,752| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.autodiscover.dll| 15.2.858.10| 396,184| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.autodiscover.eventlogs.dll| 15.2.858.9| 21,400| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.autodiscoverv2.dll| 15.2.858.10| 57,240| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.bandwidthmonitorservicelet.dll| 15.2.858.10| 14,744| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.batchservice.dll| 15.2.858.10| 35,720| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.cabutility.dll| 15.2.858.9| 276,352| 04-Apr-2021| 08:31| x64 \nMicrosoft.exchange.certificatedeployment.eventlog.dll| 15.2.858.9| 16,256| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.certificatedeploymentservicelet.dll| 15.2.858.10| 25,984| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.certificatenotification.eventlog.dll| 15.2.858.9| 13,704| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.certificatenotificationservicelet.dll| 15.2.858.10| 23,448| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.clients.common.dll| 15.2.858.10| 377,752| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.clients.eventlogs.dll| 15.2.858.9| 83,848| 04-Apr-2021| 08:30| x64 \nMicrosoft.exchange.clients.owa.dll| 15.2.858.10| 2,971,008| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.clients.owa2.server.dll| 15.2.858.10| 5,029,784| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.clients.owa2.servervariantconfiguration.dll| 15.2.858.9| 893,848| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.clients.security.dll| 15.2.858.10| 413,584| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.clients.strings.dll| 15.2.858.9| 924,552| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.cluster.bandwidthmonitor.dll| 15.2.858.10| 31,624| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.cluster.common.dll| 15.2.858.9| 52,112| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.cluster.common.extensions.dll| 15.2.858.9| 21,896| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.cluster.diskmonitor.dll| 15.2.858.10| 33,664| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.cluster.replay.dll| 15.2.858.10| 3,515,288| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.cluster.replicaseeder.dll| 15.2.858.9| 108,416| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.cluster.replicavsswriter.dll| 15.2.858.10| 288,648| 04-Apr-2021| 08:44| x64 \nMicrosoft.exchange.cluster.shared.dll| 15.2.858.9| 625,544| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.common.agentconfig.transport.dll| 15.2.858.9| 86,408| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.common.componentconfig.transport.dll| 15.2.858.9| 1,830,288| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.common.directory.adagentservicevariantconfig.dll| 15.2.858.9| 31,624| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.common.directory.directoryvariantconfig.dll| 15.2.858.9| 466,328| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.common.directory.domtvariantconfig.dll| 15.2.858.10| 25,984| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.common.directory.ismemberofresolverconfig.dll| 15.2.858.9| 38,288| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.common.directory.tenantrelocationvariantconfig.dll| 15.2.858.9| 102,800| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.common.directory.topologyservicevariantconfig.dll| 15.2.858.9| 48,520| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.common.diskmanagement.dll| 15.2.858.9| 67,480| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.common.dll| 15.2.858.9| 172,936| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.common.encryption.variantconfig.dll| 15.2.858.9| 113,544| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.common.il.dll| 15.2.858.9| 13,720| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.common.inference.dll| 15.2.858.9| 130,440| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.common.optics.dll| 15.2.858.9| 63,872| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.common.processmanagermsg.dll| 15.2.858.9| 19,848| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.common.protocols.popimap.dll| 15.2.858.9| 15,248| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.common.search.dll| 15.2.858.9| 108,928| 04-Apr-2021| 08:36| x86 \nMicrosoft.exchange.common.search.eventlog.dll| 15.2.858.9| 17,800| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.common.smtp.dll| 15.2.858.9| 51,584| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.common.suiteservices.suiteservicesvariantconfig.dll| 15.2.858.9| 36,744| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.common.transport.azure.dll| 15.2.858.9| 27,512| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.common.transport.monitoringconfig.dll| 15.2.858.9| 1,042,304| 04-Apr-2021| 08:35| x86 \nMicrosoft.exchange.commonmsg.dll| 15.2.858.9| 29,072| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.compliance.auditlogpumper.messages.dll| 15.2.858.9| 13,192| 04-Apr-2021| 08:44| x64 \nMicrosoft.exchange.compliance.auditservice.core.dll| 15.2.858.10| 181,128| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.compliance.auditservice.messages.dll| 15.2.858.9| 30,088| 04-Apr-2021| 08:39| x64 \nMicrosoft.exchange.compliance.common.dll| 15.2.858.9| 22,392| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.compliance.crimsonevents.dll| 15.2.858.9| 85,912| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.compliance.dll| 15.2.858.9| 41,368| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.compliance.recordreview.dll| 15.2.858.9| 37,240| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.compliance.supervision.dll| 15.2.858.10| 50,560| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.compliance.taskcreator.dll| 15.2.858.10| 33,176| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.compliance.taskdistributioncommon.dll| 15.2.858.10| 1,100,160| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.compliance.taskdistributionfabric.dll| 15.2.858.10| 206,744| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.compliance.taskplugins.dll| 15.2.858.10| 210,840| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.compression.dll| 15.2.858.9| 17,288| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.configuration.certificateauth.dll| 15.2.858.9| 37,784| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.configuration.certificateauth.eventlog.dll| 15.2.858.9| 14,208| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.configuration.core.dll| 15.2.858.9| 145,800| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.configuration.core.eventlog.dll| 15.2.858.9| 14,224| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.configuration.delegatedauth.dll| 15.2.858.9| 53,128| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.configuration.delegatedauth.eventlog.dll| 15.2.858.9| 15,744| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.configuration.diagnosticsmodules.dll| 15.2.858.9| 23,448| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.configuration.diagnosticsmodules.eventlog.dll| 15.2.858.9| 13,208| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.configuration.failfast.dll| 15.2.858.9| 54,680| 04-Apr-2021| 08:42| x86 \nMicrosoft.exchange.configuration.failfast.eventlog.dll| 15.2.858.9| 13,704| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.configuration.objectmodel.dll| 15.2.858.10| 1,846,152| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.configuration.objectmodel.eventlog.dll| 15.2.858.9| 30,104| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.configuration.redirectionmodule.dll| 15.2.858.9| 68,496| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.configuration.redirectionmodule.eventlog.dll| 15.2.858.9| 15,232| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.configuration.remotepowershellbackendcmdletproxymodule.dll| 15.2.858.9| 21,376| 04-Apr-2021| 08:42| x86 \nMicrosoft.exchange.configuration.remotepowershellbackendcmdletproxymodule.eventlog.dll| 15.2.858.9| 13,192| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.connectiondatacollector.dll| 15.2.858.9| 25,984| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.connections.common.dll| 15.2.858.9| 169,856| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.connections.eas.dll| 15.2.858.9| 330,136| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.connections.imap.dll| 15.2.858.9| 173,960| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.connections.pop.dll| 15.2.858.9| 71,048| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.contentfilter.wrapper.exe| 15.2.858.9| 203,672| 04-Apr-2021| 08:43| x64 \nMicrosoft.exchange.context.client.dll| 15.2.858.9| 27,008| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.context.configuration.dll| 15.2.858.9| 51,592| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.context.core.dll| 15.2.858.9| 51,080| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.context.datamodel.dll| 15.2.858.9| 46,984| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.core.strings.dll| 15.2.858.9| 1,093,520| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.core.timezone.dll| 15.2.858.9| 57,240| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.data.applicationlogic.deep.dll| 15.2.858.9| 326,536| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.data.applicationlogic.dll| 15.2.858.9| 3,354,504| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.data.applicationlogic.eventlog.dll| 15.2.858.9| 35,728| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.data.applicationlogic.monitoring.ifx.dll| 15.2.858.9| 17,816| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.data.connectors.dll| 15.2.858.9| 165,248| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.data.consumermailboxprovisioning.dll| 15.2.858.9| 619,384| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.data.directory.dll| 15.2.858.9| 7,792,016| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.data.directory.eventlog.dll| 15.2.858.9| 80,280| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.data.dll| 15.2.858.9| 1,790,360| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.data.groupmailboxaccesslayer.dll| 15.2.858.10| 1,626,488| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.data.ha.dll| 15.2.858.9| 375,192| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.data.imageanalysis.dll| 15.2.858.9| 105,352| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.data.mailboxfeatures.dll| 15.2.858.9| 15,744| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.data.mailboxloadbalance.dll| 15.2.858.9| 224,632| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.data.mapi.dll| 15.2.858.9| 186,752| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.data.metering.contracts.dll| 15.2.858.9| 39,832| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.data.metering.dll| 15.2.858.9| 119,176| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.data.msosyncxsd.dll| 15.2.858.9| 968,072| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.data.notification.dll| 15.2.858.9| 141,184| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.data.personaldataplatform.dll| 15.2.858.9| 769,416| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.data.providers.dll| 15.2.858.9| 139,640| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.data.provisioning.dll| 15.2.858.9| 56,720| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.data.rightsmanagement.dll| 15.2.858.9| 453,008| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.data.scheduledtimers.dll| 15.2.858.9| 32,632| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.data.storage.clientstrings.dll| 15.2.858.9| 256,912| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.data.storage.dll| 15.2.858.9| 11,816,840| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.data.storage.eventlog.dll| 15.2.858.9| 37,768| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.data.storageconfigurationresources.dll| 15.2.858.9| 655,768| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.data.storeobjects.dll| 15.2.858.9| 175,488| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.data.throttlingservice.client.dll| 15.2.858.9| 36,240| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.data.throttlingservice.client.eventlog.dll| 15.2.858.9| 14,216| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.data.throttlingservice.eventlog.dll| 15.2.858.9| 14,224| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.datacenter.management.activemonitoring.recoveryservice.eventlog.dll| 15.2.858.9| 14,728| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.datacenterstrings.dll| 15.2.858.10| 72,600| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.delivery.eventlog.dll| 15.2.858.9| 13,176| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.diagnostics.certificatelogger.dll| 15.2.858.9| 22,912| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.diagnostics.dll| 15.2.858.9| 2,213,272| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.diagnostics.dll.deploy| 15.2.858.9| 2,213,272| 04-Apr-2021| 08:27| Not applicable \nMicrosoft.exchange.diagnostics.performancelogger.dll| 15.2.858.9| 23,936| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.diagnostics.service.common.dll| 15.2.858.9| 546,696| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.diagnostics.service.eventlog.dll| 15.2.858.9| 215,416| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.diagnostics.service.exchangejobs.dll| 15.2.858.9| 194,440| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.diagnostics.service.exe| 15.2.858.9| 146,296| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.diagnostics.service.fuseboxperfcounters.dll| 15.2.858.9| 27,512| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.diagnosticsaggregation.eventlog.dll| 15.2.858.9| 13,696| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.diagnosticsaggregationservicelet.dll| 15.2.858.10| 49,536| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.directory.topologyservice.eventlog.dll| 15.2.858.9| 28,024| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.directory.topologyservice.exe| 15.2.858.9| 208,792| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.disklocker.events.dll| 15.2.858.9| 88,984| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.disklocker.interop.dll| 15.2.858.9| 32,664| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.drumtesting.calendarmigration.dll| 15.2.858.10| 45,952| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.drumtesting.common.dll| 15.2.858.10| 18,840| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.dxstore.dll| 15.2.858.9| 473,464| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.dxstore.ha.events.dll| 15.2.858.9| 206,224| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.dxstore.ha.instance.exe| 15.2.858.10| 36,744| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.eac.flighting.dll| 15.2.858.9| 131,464| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.edgecredentialsvc.exe| 15.2.858.9| 21,896| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.edgesync.common.dll| 15.2.858.9| 148,360| 04-Apr-2021| 08:44| x86 \nMicrosoft.exchange.edgesync.datacenterproviders.dll| 15.2.858.9| 220,032| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.edgesync.eventlog.dll| 15.2.858.9| 23,944| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.edgesyncsvc.exe| 15.2.858.9| 97,664| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.ediscovery.export.dll| 15.2.858.9| 1,266,048| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.ediscovery.export.dll.deploy| 15.2.858.9| 1,266,048| 04-Apr-2021| 08:28| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.application| Not applicable| 16,508| 04-Apr-2021| 08:29| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.exe.deploy| 15.2.858.9| 87,416| 04-Apr-2021| 08:27| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.manifest| Not applicable| 67,495| 04-Apr-2021| 08:32| Not applicable \nMicrosoft.exchange.ediscovery.exporttool.strings.dll.deploy| 15.2.858.9| 52,104| 04-Apr-2021| 08:33| Not applicable \nMicrosoft.exchange.ediscovery.mailboxsearch.dll| 15.2.858.10| 292,232| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.birthdaycalendar.dll| 15.2.858.10| 73,112| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.entities.booking.defaultservicesettings.dll| 15.2.858.9| 45,976| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.entities.booking.dll| 15.2.858.10| 218,504| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.booking.management.dll| 15.2.858.9| 78,232| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.bookings.dll| 15.2.858.9| 35,704| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.entities.calendaring.dll| 15.2.858.10| 935,296| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.common.dll| 15.2.858.9| 336,264| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.entities.connectors.dll| 15.2.858.9| 52,616| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.entities.contentsubmissions.dll| 15.2.858.9| 32,128| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.context.dll| 15.2.858.9| 60,800| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.entities.datamodel.dll| 15.2.858.9| 854,400| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.entities.fileproviders.dll| 15.2.858.10| 291,736| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.foldersharing.dll| 15.2.858.9| 39,320| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.entities.holidaycalendars.dll| 15.2.858.10| 76,184| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.insights.dll| 15.2.858.10| 166,776| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.meetinglocation.dll| 15.2.858.10| 1,486,736| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.meetingparticipants.dll| 15.2.858.10| 122,232| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.meetingtimecandidates.dll| 15.2.858.10| 12,327,320| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.onlinemeetings.dll| 15.2.858.9| 264,072| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.entities.people.dll| 15.2.858.9| 37,760| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.entities.peopleinsights.dll| 15.2.858.10| 186,776| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.entities.reminders.dll| 15.2.858.10| 64,384| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.entities.schedules.dll| 15.2.858.10| 83,856| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.entities.shellservice.dll| 15.2.858.9| 63,864| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.tasks.dll| 15.2.858.9| 100,232| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entities.xrm.dll| 15.2.858.9| 144,776| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.entityextraction.calendar.dll| 15.2.858.10| 270,208| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.eserepl.common.dll| 15.2.858.9| 15,256| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.eserepl.configuration.dll| 15.2.858.9| 15,760| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.eserepl.dll| 15.2.858.9| 130,440| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.ews.configuration.dll| 15.2.858.9| 254,336| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.exchangecertificate.eventlog.dll| 15.2.858.9| 13,192| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.exchangecertificateservicelet.dll| 15.2.858.10| 37,256| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.extensibility.internal.dll| 15.2.858.9| 640,904| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.extensibility.partner.dll| 15.2.858.9| 37,272| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.federateddirectory.dll| 15.2.858.10| 146,328| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.ffosynclogmsg.dll| 15.2.858.9| 13,192| 04-Apr-2021| 08:31| x64 \nMicrosoft.exchange.frontendhttpproxy.dll| 15.2.858.10| 595,840| 04-Apr-2021| 08:42| x86 \nMicrosoft.exchange.frontendhttpproxy.eventlogs.dll| 15.2.858.9| 14,728| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.frontendtransport.monitoring.dll| 15.2.858.10| 30,104| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.griffin.variantconfiguration.dll| 15.2.858.9| 99,720| 04-Apr-2021| 08:37| x86 \nMicrosoft.exchange.hathirdpartyreplication.dll| 15.2.858.9| 42,368| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.helpprovider.dll| 15.2.858.10| 40,344| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.httpproxy.addressfinder.dll| 15.2.858.10| 54,152| 04-Apr-2021| 08:41| x86 \nMicrosoft.exchange.httpproxy.common.dll| 15.2.858.9| 164,224| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.httpproxy.diagnostics.dll| 15.2.858.10| 58,768| 04-Apr-2021| 08:42| x86 \nMicrosoft.exchange.httpproxy.flighting.dll| 15.2.858.9| 204,168| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.httpproxy.passivemonitor.dll| 15.2.858.9| 17,800| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.httpproxy.proxyassistant.dll| 15.2.858.10| 30,600| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.httpproxy.routerefresher.dll| 15.2.858.10| 38,792| 04-Apr-2021| 08:42| x86 \nMicrosoft.exchange.httpproxy.routeselector.dll| 15.2.858.10| 48,520| 04-Apr-2021| 08:42| x86 \nMicrosoft.exchange.httpproxy.routing.dll| 15.2.858.9| 180,608| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.httpredirectmodules.dll| 15.2.858.10| 36,736| 04-Apr-2021| 08:41| x86 \nMicrosoft.exchange.httputilities.dll| 15.2.858.10| 25,992| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.hygiene.data.dll| 15.2.858.10| 1,868,184| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.hygiene.diagnosisutil.dll| 15.2.858.9| 54,680| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.hygiene.eopinstantprovisioning.dll| 15.2.858.10| 35,720| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.idserialization.dll| 15.2.858.9| 35,736| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.imap4.eventlog.dll| 15.2.858.9| 18,312| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.imap4.eventlog.dll.fe| 15.2.858.9| 18,312| 04-Apr-2021| 08:28| Not applicable \nMicrosoft.exchange.imap4.exe| 15.2.858.9| 263,040| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.imap4.exe.fe| 15.2.858.9| 263,040| 04-Apr-2021| 08:28| Not applicable \nMicrosoft.exchange.imap4service.exe| 15.2.858.9| 24,960| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.imap4service.exe.fe| 15.2.858.9| 24,960| 04-Apr-2021| 08:29| Not applicable \nMicrosoft.exchange.imapconfiguration.dl1| 15.2.858.9| 53,128| 04-Apr-2021| 08:28| Not applicable \nMicrosoft.exchange.inference.common.dll| 15.2.858.9| 216,960| 04-Apr-2021| 08:37| x86 \nMicrosoft.exchange.inference.hashtagsrelevance.dll| 15.2.858.10| 32,152| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.inference.peoplerelevance.dll| 15.2.858.10| 281,984| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.inference.ranking.dll| 15.2.858.9| 18,816| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.inference.safetylibrary.dll| 15.2.858.10| 83,848| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.inference.service.eventlog.dll| 15.2.858.9| 15,240| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.infoworker.assistantsclientresources.dll| 15.2.858.9| 94,088| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.infoworker.common.dll| 15.2.858.10| 1,840,536| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.infoworker.eventlog.dll| 15.2.858.9| 71,552| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.infoworker.meetingvalidator.dll| 15.2.858.10| 175,488| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.instantmessaging.dll| 15.2.858.9| 45,960| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.irm.formprotector.dll| 15.2.858.9| 159,616| 04-Apr-2021| 08:39| x64 \nMicrosoft.exchange.irm.msoprotector.dll| 15.2.858.9| 51,080| 04-Apr-2021| 08:39| x64 \nMicrosoft.exchange.irm.ofcprotector.dll| 15.2.858.9| 45,960| 04-Apr-2021| 08:39| x64 \nMicrosoft.exchange.isam.databasemanager.dll| 15.2.858.9| 32,136| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.isam.esebcli.dll| 15.2.858.9| 100,248| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.jobqueue.eventlog.dll| 15.2.858.9| 13,192| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.jobqueueservicelet.dll| 15.2.858.10| 271,248| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.killswitch.dll| 15.2.858.9| 22,408| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.killswitchconfiguration.dll| 15.2.858.9| 33,680| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.loganalyzer.analyzers.auditing.dll| 15.2.858.9| 18,328| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.loganalyzer.analyzers.certificatelog.dll| 15.2.858.9| 15,240| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.loganalyzer.analyzers.cmdletinfralog.dll| 15.2.858.9| 27,536| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.easlog.dll| 15.2.858.9| 30,608| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.loganalyzer.analyzers.ecplog.dll| 15.2.858.9| 22,400| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.eventlog.dll| 15.2.858.9| 66,456| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.loganalyzer.analyzers.ewslog.dll| 15.2.858.9| 29,592| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.loganalyzer.analyzers.griffinperfcounter.dll| 15.2.858.9| 19,848| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.loganalyzer.analyzers.groupescalationlog.dll| 15.2.858.9| 20,352| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.loganalyzer.analyzers.httpproxylog.dll| 15.2.858.9| 19,336| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.hxservicelog.dll| 15.2.858.9| 34,184| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.loganalyzer.analyzers.iislog.dll| 15.2.858.9| 103,800| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.lameventlog.dll| 15.2.858.9| 31,624| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.migrationlog.dll| 15.2.858.9| 15,760| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.oabdownloadlog.dll| 15.2.858.9| 20,872| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.loganalyzer.analyzers.oauthcafelog.dll| 15.2.858.9| 16,264| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.loganalyzer.analyzers.outlookservicelog.dll| 15.2.858.9| 49,040| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.owaclientlog.dll| 15.2.858.9| 44,424| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.owalog.dll| 15.2.858.9| 38,296| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.perflog.dll| 15.2.858.9| 10,375,064| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.loganalyzer.analyzers.pfassistantlog.dll| 15.2.858.9| 29,056| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.loganalyzer.analyzers.rca.dll| 15.2.858.9| 21,384| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.loganalyzer.analyzers.restlog.dll| 15.2.858.9| 24,456| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.analyzers.store.dll| 15.2.858.9| 15,240| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.loganalyzer.analyzers.transportsynchealthlog.dll| 15.2.858.9| 21,896| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.core.dll| 15.2.858.9| 89,496| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.loganalyzer.extensions.auditing.dll| 15.2.858.9| 20,864| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.loganalyzer.extensions.certificatelog.dll| 15.2.858.9| 26,512| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.extensions.cmdletinfralog.dll| 15.2.858.9| 21,368| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.loganalyzer.extensions.common.dll| 15.2.858.9| 28,040| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.loganalyzer.extensions.easlog.dll| 15.2.858.9| 28,544| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.loganalyzer.extensions.errordetection.dll| 15.2.858.9| 36,224| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.loganalyzer.extensions.ewslog.dll| 15.2.858.9| 16,792| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.loganalyzer.extensions.griffinperfcounter.dll| 15.2.858.9| 19,832| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.extensions.groupescalationlog.dll| 15.2.858.9| 15,232| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.extensions.httpproxylog.dll| 15.2.858.9| 17,280| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.loganalyzer.extensions.hxservicelog.dll| 15.2.858.9| 19,840| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.loganalyzer.extensions.iislog.dll| 15.2.858.9| 57,224| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.extensions.migrationlog.dll| 15.2.858.9| 17,816| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.loganalyzer.extensions.oabdownloadlog.dll| 15.2.858.9| 18,816| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.loganalyzer.extensions.oauthcafelog.dll| 15.2.858.9| 16,248| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.loganalyzer.extensions.outlookservicelog.dll| 15.2.858.9| 17,792| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.loganalyzer.extensions.owaclientlog.dll| 15.2.858.9| 15,248| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.loganalyzer.extensions.owalog.dll| 15.2.858.9| 15,256| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.loganalyzer.extensions.perflog.dll| 15.2.858.9| 52,624| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.extensions.pfassistantlog.dll| 15.2.858.9| 18,304| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.loganalyzer.extensions.rca.dll| 15.2.858.9| 34,176| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loganalyzer.extensions.restlog.dll| 15.2.858.9| 17,280| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.loganalyzer.extensions.store.dll| 15.2.858.9| 18,832| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.loganalyzer.extensions.transportsynchealthlog.dll| 15.2.858.9| 43,392| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loguploader.dll| 15.2.858.9| 165,256| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.loguploaderproxy.dll| 15.2.858.9| 54,656| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.mailboxassistants.assistants.dll| 15.2.858.10| 9,055,616| 04-Apr-2021| 08:44| x86 \nMicrosoft.exchange.mailboxassistants.attachmentthumbnail.dll| 15.2.858.9| 33,160| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.mailboxassistants.common.dll| 15.2.858.10| 124,304| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.mailboxassistants.crimsonevents.dll| 15.2.858.9| 82,824| 04-Apr-2021| 08:43| x64 \nMicrosoft.exchange.mailboxassistants.eventlog.dll| 15.2.858.9| 14,216| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.mailboxassistants.rightsmanagement.dll| 15.2.858.10| 30,088| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxloadbalance.dll| 15.2.858.10| 661,384| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.mailboxloadbalance.serverstrings.dll| 15.2.858.10| 63,368| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.mailboxreplicationservice.calendarsyncprovider.dll| 15.2.858.10| 175,488| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.mailboxreplicationservice.common.dll| 15.2.858.10| 2,791,808| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.mailboxreplicationservice.complianceprovider.dll| 15.2.858.10| 53,128| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.mailboxreplicationservice.contactsyncprovider.dll| 15.2.858.10| 151,936| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxreplicationservice.dll| 15.2.858.10| 966,528| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxreplicationservice.easprovider.dll| 15.2.858.10| 185,224| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.mailboxreplicationservice.eventlog.dll| 15.2.858.9| 31,616| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.mailboxreplicationservice.googledocprovider.dll| 15.2.858.10| 39,816| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxreplicationservice.imapprovider.dll| 15.2.858.10| 105,856| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxreplicationservice.mapiprovider.dll| 15.2.858.10| 95,104| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.mailboxreplicationservice.popprovider.dll| 15.2.858.10| 43,400| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyclient.dll| 15.2.858.9| 18,816| 04-Apr-2021| 08:44| x86 \nMicrosoft.exchange.mailboxreplicationservice.proxyservice.dll| 15.2.858.10| 172,936| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxreplicationservice.pstprovider.dll| 15.2.858.10| 102,784| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxreplicationservice.remoteprovider.dll| 15.2.858.10| 98,696| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.mailboxreplicationservice.storageprovider.dll| 15.2.858.10| 188,824| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.mailboxreplicationservice.syncprovider.dll| 15.2.858.10| 43,400| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxreplicationservice.xml.dll| 15.2.858.9| 447,368| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.mailboxreplicationservice.xrmprovider.dll| 15.2.858.10| 89,992| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.mailboxtransport.monitoring.dll| 15.2.858.10| 107,928| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.mailboxtransport.storedriveragents.dll| 15.2.858.10| 371,088| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.mailboxtransport.storedrivercommon.dll| 15.2.858.10| 193,928| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.mailboxtransport.storedriverdelivery.dll| 15.2.858.10| 552,320| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.mailboxtransport.storedriverdelivery.eventlog.dll| 15.2.858.9| 16,256| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.mailboxtransport.submission.eventlog.dll| 15.2.858.9| 15,736| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.mailboxtransport.submission.storedriversubmission.dll| 15.2.858.10| 321,416| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxtransport.submission.storedriversubmission.eventlog.dll| 15.2.858.9| 17,800| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.mailboxtransport.syncdelivery.dll| 15.2.858.10| 45,464| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxtransportwatchdogservicelet.dll| 15.2.858.10| 18,296| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.mailboxtransportwatchdogservicelet.eventlog.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.managedlexruntime.mppgruntime.dll| 15.2.858.9| 20,888| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.management.activedirectory.dll| 15.2.858.9| 415,112| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.management.classificationdefinitions.dll| 15.2.858.9| 1,269,648| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.management.compliancepolicy.dll| 15.2.858.10| 39,312| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.management.controlpanel.basics.dll| 15.2.858.9| 433,528| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.management.controlpanel.dll| 15.2.858.10| 4,566,400| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.management.controlpanel.owaoptionstrings.dll| 15.2.858.9| 261,000| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.management.controlpanelmsg.dll| 15.2.858.9| 33,672| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.management.deployment.analysis.dll| 15.2.858.9| 94,096| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.management.deployment.dll| 15.2.858.10| 586,136| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.management.deployment.xml.dll| 15.2.858.9| 3,543,424| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.management.detailstemplates.dll| 15.2.858.10| 67,992| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.management.dll| 15.2.858.10| 16,496,008| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.management.edge.systemmanager.dll| 15.2.858.10| 58,776| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.management.infrastructure.asynchronoustask.dll| 15.2.858.10| 23,952| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.management.jitprovisioning.dll| 15.2.858.10| 101,768| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.management.migration.dll| 15.2.858.10| 543,624| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.management.mobility.dll| 15.2.858.10| 305,024| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.management.nativeresources.dll| 15.2.858.9| 273,800| 04-Apr-2021| 08:44| x64 \nMicrosoft.exchange.management.powershell.support.dll| 15.2.858.10| 418,688| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.management.provisioning.dll| 15.2.858.10| 275,856| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.management.psdirectinvoke.dll| 15.2.858.10| 70,536| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.management.rbacdefinition.dll| 15.2.858.9| 7,873,944| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.management.recipient.dll| 15.2.858.10| 1,502,096| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.management.snapin.esm.dll| 15.2.858.10| 71,576| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.management.systemmanager.dll| 15.2.858.10| 1,249,152| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.management.transport.dll| 15.2.858.10| 1,876,872| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.managementgui.dll| 15.2.858.9| 5,366,656| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.managementmsg.dll| 15.2.858.9| 36,224| 04-Apr-2021| 08:39| x64 \nMicrosoft.exchange.mapihttpclient.dll| 15.2.858.9| 117,624| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.mapihttphandler.dll| 15.2.858.10| 209,792| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.messagesecurity.dll| 15.2.858.9| 79,744| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.messagesecurity.messagesecuritymsg.dll| 15.2.858.9| 17,288| 04-Apr-2021| 08:43| x64 \nMicrosoft.exchange.messagingpolicies.dlppolicyagent.dll| 15.2.858.10| 156,056| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.messagingpolicies.edgeagents.dll| 15.2.858.10| 65,944| 04-Apr-2021| 08:40| x86 \nMicrosoft.exchange.messagingpolicies.eventlog.dll| 15.2.858.9| 30,600| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.messagingpolicies.filtering.dll| 15.2.858.10| 58,248| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.messagingpolicies.hygienerules.dll| 15.2.858.10| 29,576| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.messagingpolicies.journalagent.dll| 15.2.858.10| 175,512| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.messagingpolicies.redirectionagent.dll| 15.2.858.10| 28,568| 04-Apr-2021| 08:37| x86 \nMicrosoft.exchange.messagingpolicies.retentionpolicyagent.dll| 15.2.858.10| 75,144| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.messagingpolicies.rmsvcagent.dll| 15.2.858.10| 207,240| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.messagingpolicies.rules.dll| 15.2.858.10| 440,712| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.messagingpolicies.supervisoryreviewagent.dll| 15.2.858.10| 83,336| 04-Apr-2021| 08:36| x86 \nMicrosoft.exchange.messagingpolicies.transportruleagent.dll| 15.2.858.10| 35,224| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.messagingpolicies.unifiedpolicycommon.dll| 15.2.858.10| 53,128| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.messagingpolicies.unjournalagent.dll| 15.2.858.10| 96,656| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.migration.dll| 15.2.858.10| 1,110,424| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.migrationworkflowservice.eventlog.dll| 15.2.858.9| 14,712| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.mobiledriver.dll| 15.2.858.10| 135,576| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.monitoring.activemonitoring.local.components.dll| 15.2.858.10| 5,065,600| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.monitoring.servicecontextprovider.dll| 15.2.858.9| 19,848| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.mrsmlbconfiguration.dll| 15.2.858.9| 68,480| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.net.dll| 15.2.858.9| 5,086,104| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.net.rightsmanagement.dll| 15.2.858.9| 265,608| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.networksettings.dll| 15.2.858.9| 37,768| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.notifications.broker.eventlog.dll| 15.2.858.9| 14,200| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.notifications.broker.exe| 15.2.858.10| 549,776| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.oabauthmodule.dll| 15.2.858.9| 22,920| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.oabrequesthandler.dll| 15.2.858.10| 106,392| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.oauth.core.dll| 15.2.858.9| 291,736| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.objectstoreclient.dll| 15.2.858.9| 17,280| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.odata.configuration.dll| 15.2.858.9| 277,912| 04-Apr-2021| 08:44| x86 \nMicrosoft.exchange.odata.dll| 15.2.858.10| 2,993,536| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.officegraph.common.dll| 15.2.858.9| 90,496| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.officegraph.grain.dll| 15.2.858.9| 101,768| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.officegraph.graincow.dll| 15.2.858.9| 38,272| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.officegraph.graineventbasedassistants.dll| 15.2.858.9| 45,456| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.officegraph.grainpropagationengine.dll| 15.2.858.9| 58,240| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.officegraph.graintransactionstorage.dll| 15.2.858.9| 147,336| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.officegraph.graintransportdeliveryagent.dll| 15.2.858.9| 26,496| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.officegraph.graphstore.dll| 15.2.858.9| 184,208| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.officegraph.permailboxkeys.dll| 15.2.858.9| 26,496| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.officegraph.secondarycopyquotamanagement.dll| 15.2.858.9| 38,288| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.officegraph.secondaryshallowcopylocation.dll| 15.2.858.9| 55,688| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.officegraph.security.dll| 15.2.858.9| 147,320| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.officegraph.semanticgraph.dll| 15.2.858.9| 191,880| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.officegraph.tasklogger.dll| 15.2.858.9| 33,688| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.partitioncache.dll| 15.2.858.9| 28,040| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.passivemonitoringsettings.dll| 15.2.858.9| 32,648| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.photogarbagecollectionservicelet.dll| 15.2.858.10| 15,240| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.pop3.eventlog.dll| 15.2.858.9| 17,280| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.pop3.eventlog.dll.fe| 15.2.858.9| 17,280| 04-Apr-2021| 08:34| Not applicable \nMicrosoft.exchange.pop3.exe| 15.2.858.9| 106,888| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.pop3.exe.fe| 15.2.858.9| 106,888| 04-Apr-2021| 08:27| Not applicable \nMicrosoft.exchange.pop3service.exe| 15.2.858.9| 24,976| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.pop3service.exe.fe| 15.2.858.9| 24,976| 04-Apr-2021| 08:27| Not applicable \nMicrosoft.exchange.popconfiguration.dl1| 15.2.858.9| 42,888| 04-Apr-2021| 08:32| Not applicable \nMicrosoft.exchange.popimap.core.dll| 15.2.858.9| 264,600| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.popimap.core.dll.fe| 15.2.858.9| 264,600| 04-Apr-2021| 08:29| Not applicable \nMicrosoft.exchange.powersharp.dll| 15.2.858.9| 358,280| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.powersharp.management.dll| 15.2.858.10| 4,166,528| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.powershell.configuration.dll| 15.2.858.10| 308,632| 04-Apr-2021| 08:44| x64 \nMicrosoft.exchange.powershell.rbachostingtools.dll| 15.2.858.10| 41,344| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.protectedservicehost.exe| 15.2.858.9| 30,584| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.protocols.fasttransfer.dll| 15.2.858.9| 137,088| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.protocols.mapi.dll| 15.2.858.9| 441,736| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.provisioning.eventlog.dll| 15.2.858.9| 14,216| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.provisioningagent.dll| 15.2.858.10| 224,664| 04-Apr-2021| 08:35| x86 \nMicrosoft.exchange.provisioningservicelet.dll| 15.2.858.10| 105,864| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.pst.dll| 15.2.858.9| 168,840| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.pst.dll.deploy| 15.2.858.9| 168,840| 04-Apr-2021| 08:27| Not applicable \nMicrosoft.exchange.pswsclient.dll| 15.2.858.9| 259,472| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.publicfolders.dll| 15.2.858.9| 72,072| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.pushnotifications.crimsonevents.dll| 15.2.858.9| 215,952| 04-Apr-2021| 08:37| x64 \nMicrosoft.exchange.pushnotifications.dll| 15.2.858.9| 106,872| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.pushnotifications.publishers.dll| 15.2.858.9| 425,856| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.pushnotifications.server.dll| 15.2.858.9| 70,520| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.query.analysis.dll| 15.2.858.10| 46,472| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.query.configuration.dll| 15.2.858.9| 215,944| 04-Apr-2021| 08:36| x86 \nMicrosoft.exchange.query.core.dll| 15.2.858.10| 168,832| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.query.ranking.dll| 15.2.858.10| 343,424| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.query.retrieval.dll| 15.2.858.10| 174,488| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.query.suggestions.dll| 15.2.858.10| 95,112| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.realtimeanalyticspublisherservicelet.dll| 15.2.858.10| 127,360| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.relevance.core.dll| 15.2.858.9| 63,368| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.relevance.data.dll| 15.2.858.9| 36,728| 04-Apr-2021| 08:43| x64 \nMicrosoft.exchange.relevance.mailtagger.dll| 15.2.858.9| 17,800| 04-Apr-2021| 08:43| x64 \nMicrosoft.exchange.relevance.people.dll| 15.2.858.10| 9,666,968| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.relevance.peopleindex.dll| 15.2.858.9| 20,788,120| 04-Apr-2021| 08:43| x64 \nMicrosoft.exchange.relevance.peopleranker.dll| 15.2.858.9| 36,728| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.relevance.perm.dll| 15.2.858.9| 97,672| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.relevance.sassuggest.dll| 15.2.858.9| 28,552| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.relevance.upm.dll| 15.2.858.9| 72,088| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.routing.client.dll| 15.2.858.9| 15,744| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.routing.eventlog.dll| 15.2.858.9| 13,184| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.routing.server.exe| 15.2.858.9| 59,280| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.rpc.dll| 15.2.858.9| 1,647,496| 04-Apr-2021| 08:29| x64 \nMicrosoft.exchange.rpcclientaccess.dll| 15.2.858.9| 209,816| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.rpcclientaccess.exmonhandler.dll| 15.2.858.9| 60,288| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.rpcclientaccess.handler.dll| 15.2.858.9| 518,024| 04-Apr-2021| 08:44| x86 \nMicrosoft.exchange.rpcclientaccess.monitoring.dll| 15.2.858.9| 161,160| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.rpcclientaccess.parser.dll| 15.2.858.9| 724,360| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.rpcclientaccess.server.dll| 15.2.858.9| 243,088| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.rpcclientaccess.service.eventlog.dll| 15.2.858.9| 20,888| 04-Apr-2021| 08:29| x64 \nMicrosoft.exchange.rpcclientaccess.service.exe| 15.2.858.10| 35,216| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.rpchttpmodules.dll| 15.2.858.9| 42,376| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.rpcoverhttpautoconfig.dll| 15.2.858.10| 56,216| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.rpcoverhttpautoconfig.eventlog.dll| 15.2.858.9| 27,544| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.rules.common.dll| 15.2.858.9| 130,440| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.saclwatcher.eventlog.dll| 15.2.858.9| 14,728| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.saclwatcherservicelet.dll| 15.2.858.10| 20,360| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.safehtml.dll| 15.2.858.9| 21,384| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.sandbox.activities.dll| 15.2.858.9| 267,672| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.sandbox.contacts.dll| 15.2.858.9| 111,000| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.sandbox.core.dll| 15.2.858.9| 112,520| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.sandbox.services.dll| 15.2.858.9| 622,472| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.search.bigfunnel.dll| 15.2.858.10| 185,224| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.search.bigfunnel.eventlog.dll| 15.2.858.9| 12,168| 04-Apr-2021| 08:39| x64 \nMicrosoft.exchange.search.blingwrapper.dll| 15.2.858.9| 19,320| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.search.core.dll| 15.2.858.9| 211,864| 04-Apr-2021| 08:36| x86 \nMicrosoft.exchange.search.ediscoveryquery.dll| 15.2.858.10| 17,800| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.search.engine.dll| 15.2.858.9| 97,672| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.search.fast.configuration.dll| 15.2.858.9| 16,792| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.search.fast.dll| 15.2.858.9| 436,616| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.search.files.dll| 15.2.858.10| 274,304| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.search.flighting.dll| 15.2.858.9| 24,968| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.search.mdb.dll| 15.2.858.9| 218,008| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.search.service.exe| 15.2.858.9| 26,520| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.security.applicationencryption.dll| 15.2.858.9| 221,056| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.security.dll| 15.2.858.9| 1,559,960| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.security.msarpsservice.exe| 15.2.858.9| 19,840| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.security.securitymsg.dll| 15.2.858.9| 28,544| 04-Apr-2021| 08:43| x64 \nMicrosoft.exchange.server.storage.admininterface.dll| 15.2.858.9| 225,152| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.server.storage.common.dll| 15.2.858.9| 5,151,120| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.server.storage.diagnostics.dll| 15.2.858.9| 214,920| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.server.storage.directoryservices.dll| 15.2.858.9| 115,576| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.server.storage.esebackinterop.dll| 15.2.858.9| 82,824| 04-Apr-2021| 08:44| x64 \nMicrosoft.exchange.server.storage.eventlog.dll| 15.2.858.9| 80,768| 04-Apr-2021| 08:39| x64 \nMicrosoft.exchange.server.storage.fulltextindex.dll| 15.2.858.9| 66,440| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.server.storage.ha.dll| 15.2.858.9| 81,288| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.server.storage.lazyindexing.dll| 15.2.858.9| 211,840| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.server.storage.logicaldatamodel.dll| 15.2.858.9| 1,341,320| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.server.storage.mapidisp.dll| 15.2.858.9| 511,864| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.server.storage.multimailboxsearch.dll| 15.2.858.9| 47,488| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.server.storage.physicalaccess.dll| 15.2.858.9| 873,856| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.server.storage.propertydefinitions.dll| 15.2.858.9| 1,352,584| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.server.storage.propertytag.dll| 15.2.858.9| 30,600| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.server.storage.rpcproxy.dll| 15.2.858.9| 130,440| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.server.storage.storecommonservices.dll| 15.2.858.9| 1,018,776| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.server.storage.storeintegritycheck.dll| 15.2.858.9| 111,480| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.server.storage.workermanager.dll| 15.2.858.9| 34,696| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.server.storage.xpress.dll| 15.2.858.9| 19,328| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.servicehost.eventlog.dll| 15.2.858.9| 14,720| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.servicehost.exe| 15.2.858.10| 60,824| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.servicelets.globallocatorcache.dll| 15.2.858.9| 50,576| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.servicelets.globallocatorcache.eventlog.dll| 15.2.858.9| 14,208| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.servicelets.unifiedpolicysyncservicelet.eventlog.dll| 15.2.858.9| 14,208| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.services.common.dll| 15.2.858.10| 74,120| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.services.dll| 15.2.858.10| 8,480,656| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.services.eventlogs.dll| 15.2.858.9| 30,088| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.services.ewshandler.dll| 15.2.858.10| 633,728| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.services.ewsserialization.dll| 15.2.858.10| 1,651,064| 04-Apr-2021| 08:36| x86 \nMicrosoft.exchange.services.json.dll| 15.2.858.10| 296,344| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.services.messaging.dll| 15.2.858.10| 43,392| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.services.onlinemeetings.dll| 15.2.858.9| 233,336| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.services.surface.dll| 15.2.858.10| 178,560| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.services.wcf.dll| 15.2.858.10| 348,560| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.setup.acquirelanguagepack.dll| 15.2.858.9| 56,712| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.setup.bootstrapper.common.dll| 15.2.858.9| 93,064| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.setup.common.dll| 15.2.858.10| 296,328| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.setup.commonbase.dll| 15.2.858.10| 35,736| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.setup.console.dll| 15.2.858.10| 27,032| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.setup.gui.dll| 15.2.858.10| 114,584| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.setup.parser.dll| 15.2.858.10| 53,648| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.setup.signverfwrapper.dll| 15.2.858.9| 75,136| 04-Apr-2021| 08:30| x64 \nMicrosoft.exchange.sharedcache.caches.dll| 15.2.858.9| 142,712| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.sharedcache.client.dll| 15.2.858.9| 24,960| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.sharedcache.eventlog.dll| 15.2.858.9| 15,232| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.sharedcache.exe| 15.2.858.9| 58,768| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.sharepointsignalstore.dll| 15.2.858.9| 27,016| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.slabmanifest.dll| 15.2.858.9| 46,976| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.sqm.dll| 15.2.858.9| 46,968| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.store.service.exe| 15.2.858.9| 28,032| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.store.worker.exe| 15.2.858.9| 26,504| 04-Apr-2021| 08:44| x86 \nMicrosoft.exchange.storeobjectsservice.eventlog.dll| 15.2.858.9| 13,696| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.storeobjectsservice.exe| 15.2.858.9| 31,640| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.storeprovider.dll| 15.2.858.9| 1,205,128| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.structuredquery.dll| 15.2.858.9| 158,600| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.symphonyhandler.dll| 15.2.858.10| 628,104| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.syncmigration.eventlog.dll| 15.2.858.9| 13,176| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.syncmigrationservicelet.dll| 15.2.858.10| 16,256| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.systemprobemsg.dll| 15.2.858.9| 13,200| 04-Apr-2021| 08:30| x64 \nMicrosoft.exchange.textprocessing.dll| 15.2.858.9| 221,568| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.textprocessing.eventlog.dll| 15.2.858.9| 13,704| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.transport.agent.addressbookpolicyroutingagent.dll| 15.2.858.10| 29,064| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.transport.agent.antispam.common.dll| 15.2.858.10| 138,648| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.transport.agent.contentfilter.cominterop.dll| 15.2.858.9| 21,896| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.transport.agent.controlflow.dll| 15.2.858.10| 40,320| 04-Apr-2021| 08:28| x86 \nMicrosoft.exchange.transport.agent.faultinjectionagent.dll| 15.2.858.10| 22,912| 04-Apr-2021| 08:42| x86 \nMicrosoft.exchange.transport.agent.frontendproxyagent.dll| 15.2.858.10| 21,376| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.transport.agent.hygiene.dll| 15.2.858.10| 212,352| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.transport.agent.interceptoragent.dll| 15.2.858.10| 98,696| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.transport.agent.liveidauth.dll| 15.2.858.10| 22,920| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.transport.agent.malware.dll| 15.2.858.10| 169,352| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.transport.agent.malware.eventlog.dll| 15.2.858.9| 18,304| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.transport.agent.phishingdetection.dll| 15.2.858.9| 20,880| 04-Apr-2021| 08:35| x86 \nMicrosoft.exchange.transport.agent.prioritization.dll| 15.2.858.10| 31,624| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.transport.agent.protocolanalysis.dbaccess.dll| 15.2.858.10| 46,976| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.transport.agent.search.dll| 15.2.858.10| 30,088| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.transport.agent.senderid.core.dll| 15.2.858.9| 53,136| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.transport.agent.sharedmailboxsentitemsroutingagent.dll| 15.2.858.10| 44,936| 04-Apr-2021| 08:35| x86 \nMicrosoft.exchange.transport.agent.systemprobedrop.dll| 15.2.858.9| 18,328| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.transport.agent.transportfeatureoverrideagent.dll| 15.2.858.10| 46,488| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.transport.agent.trustedmailagents.dll| 15.2.858.10| 46,472| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.transport.cloudmonitor.common.dll| 15.2.858.9| 28,024| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.transport.common.dll| 15.2.858.9| 457,088| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.transport.contracts.dll| 15.2.858.9| 18,304| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.transport.decisionengine.dll| 15.2.858.9| 30,592| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.transport.dll| 15.2.858.10| 4,183,936| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.transport.dsapiclient.dll| 15.2.858.9| 182,168| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.transport.eventlog.dll| 15.2.858.9| 121,752| 04-Apr-2021| 08:33| x64 \nMicrosoft.exchange.transport.extensibility.dll| 15.2.858.9| 403,848| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.transport.extensibilityeventlog.dll| 15.2.858.9| 14,728| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.transport.flighting.dll| 15.2.858.9| 90,000| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.transport.logging.dll| 15.2.858.9| 88,960| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.transport.logging.search.dll| 15.2.858.9| 68,496| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.transport.loggingcommon.dll| 15.2.858.9| 63,360| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.transport.monitoring.dll| 15.2.858.10| 430,488| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.transport.net.dll| 15.2.858.9| 122,248| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.transport.protocols.contracts.dll| 15.2.858.9| 17,784| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.transport.protocols.dll| 15.2.858.9| 29,048| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.transport.protocols.httpsubmission.dll| 15.2.858.9| 60,800| 04-Apr-2021| 08:43| x86 \nMicrosoft.exchange.transport.requestbroker.dll| 15.2.858.9| 50,072| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.transport.scheduler.contracts.dll| 15.2.858.9| 33,152| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.transport.scheduler.dll| 15.2.858.9| 113,032| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.transport.smtpshared.dll| 15.2.858.9| 18,320| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.transport.storage.contracts.dll| 15.2.858.9| 52,104| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.transport.storage.dll| 15.2.858.9| 675,208| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.transport.storage.management.dll| 15.2.858.10| 23,936| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.transport.sync.agents.dll| 15.2.858.10| 17,808| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.transport.sync.common.dll| 15.2.858.10| 487,320| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.transport.sync.common.eventlog.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.transport.sync.manager.dll| 15.2.858.10| 306,056| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.transport.sync.manager.eventlog.dll| 15.2.858.9| 15,744| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.transport.sync.migrationrpc.dll| 15.2.858.10| 46,464| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.transport.sync.worker.dll| 15.2.858.10| 1,044,376| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.transport.sync.worker.eventlog.dll| 15.2.858.9| 15,224| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.transportlogsearch.eventlog.dll| 15.2.858.9| 18,840| 04-Apr-2021| 08:32| x64 \nMicrosoft.exchange.transportsyncmanagersvc.exe| 15.2.858.10| 18,832| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.um.troubleshootingtool.shared.dll| 15.2.858.9| 118,656| 04-Apr-2021| 08:34| x86 \nMicrosoft.exchange.um.umcommon.dll| 15.2.858.10| 924,552| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.um.umcore.dll| 15.2.858.10| 1,469,320| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.um.umvariantconfiguration.dll| 15.2.858.9| 32,648| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.unifiedcontent.dll| 15.2.858.9| 41,864| 04-Apr-2021| 08:33| x86 \nMicrosoft.exchange.unifiedcontent.exchange.dll| 15.2.858.9| 24,960| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.unifiedpolicyfilesync.eventlog.dll| 15.2.858.9| 15,240| 04-Apr-2021| 08:28| x64 \nMicrosoft.exchange.unifiedpolicyfilesyncservicelet.dll| 15.2.858.10| 83,336| 04-Apr-2021| 08:44| x86 \nMicrosoft.exchange.unifiedpolicysyncservicelet.dll| 15.2.858.10| 50,056| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.variantconfiguration.antispam.dll| 15.2.858.9| 642,456| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.variantconfiguration.core.dll| 15.2.858.9| 186,248| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.variantconfiguration.dll| 15.2.858.9| 67,464| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.variantconfiguration.eventlog.dll| 15.2.858.9| 12,664| 04-Apr-2021| 08:27| x64 \nMicrosoft.exchange.variantconfiguration.excore.dll| 15.2.858.9| 56,712| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.variantconfiguration.globalsettings.dll| 15.2.858.9| 27,528| 04-Apr-2021| 08:27| x86 \nMicrosoft.exchange.variantconfiguration.hygiene.dll| 15.2.858.9| 120,720| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.variantconfiguration.protectionservice.dll| 15.2.858.9| 31,624| 04-Apr-2021| 08:32| x86 \nMicrosoft.exchange.variantconfiguration.threatintel.dll| 15.2.858.9| 57,224| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.webservices.auth.dll| 15.2.858.9| 35,704| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.webservices.dll| 15.2.858.9| 1,054,088| 04-Apr-2021| 08:29| x86 \nMicrosoft.exchange.webservices.xrm.dll| 15.2.858.9| 67,976| 04-Apr-2021| 08:39| x86 \nMicrosoft.exchange.wlmservicelet.dll| 15.2.858.10| 23,432| 04-Apr-2021| 08:38| x86 \nMicrosoft.exchange.wopiclient.dll| 15.2.858.9| 77,176| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.workingset.signalapi.dll| 15.2.858.9| 17,288| 04-Apr-2021| 08:44| x86 \nMicrosoft.exchange.workingsetabstraction.signalapiabstraction.dll| 15.2.858.9| 29,056| 04-Apr-2021| 08:44| x86 \nMicrosoft.exchange.workloadmanagement.dll| 15.2.858.9| 505,240| 04-Apr-2021| 08:30| x86 \nMicrosoft.exchange.workloadmanagement.eventlogs.dll| 15.2.858.9| 14,728| 04-Apr-2021| 08:34| x64 \nMicrosoft.exchange.workloadmanagement.throttling.configuration.dll| 15.2.858.9| 36,744| 04-Apr-2021| 08:31| x86 \nMicrosoft.exchange.workloadmanagement.throttling.dll| 15.2.858.9| 66,448| 04-Apr-2021| 08:29| x86 \nMicrosoft.fast.contextlogger.json.dll| 15.2.858.9| 19,352| 04-Apr-2021| 08:39| x86 \nMicrosoft.filtering.dll| 15.2.858.9| 113,016| 04-Apr-2021| 08:32| x86 \nMicrosoft.filtering.exchange.dll| 15.2.858.10| 57,224| 04-Apr-2021| 08:32| x86 \nMicrosoft.filtering.interop.dll| 15.2.858.9| 15,256| 04-Apr-2021| 08:31| x86 \nMicrosoft.forefront.activedirectoryconnector.dll| 15.2.858.9| 46,992| 04-Apr-2021| 08:44| x86 \nMicrosoft.forefront.activedirectoryconnector.eventlog.dll| 15.2.858.9| 15,768| 04-Apr-2021| 08:43| x64 \nMicrosoft.forefront.filtering.common.dll| 15.2.858.9| 23,936| 04-Apr-2021| 08:28| x86 \nMicrosoft.forefront.filtering.diagnostics.dll| 15.2.858.9| 22,408| 04-Apr-2021| 08:28| x86 \nMicrosoft.forefront.filtering.eventpublisher.dll| 15.2.858.9| 34,688| 04-Apr-2021| 08:27| x86 \nMicrosoft.forefront.management.powershell.format.ps1xml| Not applicable| 48,945| 04-Apr-2021| 08:31| Not applicable \nMicrosoft.forefront.management.powershell.types.ps1xml| Not applicable| 16,325| 04-Apr-2021| 08:31| Not applicable \nMicrosoft.forefront.monitoring.activemonitoring.local.components.dll| 15.2.858.10| 1,518,472| 04-Apr-2021| 08:35| x86 \nMicrosoft.forefront.monitoring.activemonitoring.local.components.messages.dll| 15.2.858.9| 13,192| 04-Apr-2021| 08:32| x64 \nMicrosoft.forefront.monitoring.management.outsidein.dll| 15.2.858.10| 33,168| 04-Apr-2021| 08:31| x86 \nMicrosoft.forefront.recoveryactionarbiter.contract.dll| 15.2.858.9| 18,312| 04-Apr-2021| 08:31| x86 \nMicrosoft.forefront.reporting.common.dll| 15.2.858.10| 46,488| 04-Apr-2021| 08:31| x86 \nMicrosoft.forefront.reporting.ondemandquery.dll| 15.2.858.10| 50,568| 04-Apr-2021| 08:31| x86 \nMicrosoft.isam.esent.collections.dll| 15.2.858.9| 72,584| 04-Apr-2021| 08:39| x86 \nMicrosoft.isam.esent.interop.dll| 15.2.858.9| 541,576| 04-Apr-2021| 08:31| x86 \nMicrosoft.managementgui.dll| 15.2.858.9| 133,520| 04-Apr-2021| 08:39| x86 \nMicrosoft.mce.interop.dll| 15.2.858.9| 24,448| 04-Apr-2021| 08:32| x86 \nMicrosoft.office.audit.dll| 15.2.858.9| 124,800| 04-Apr-2021| 08:29| x86 \nMicrosoft.office.client.discovery.unifiedexport.dll| 15.2.858.9| 593,296| 04-Apr-2021| 08:27| x86 \nMicrosoft.office.common.ipcommonlogger.dll| 15.2.858.9| 42,376| 04-Apr-2021| 08:32| x86 \nMicrosoft.office.compliance.console.core.dll| 15.2.858.10| 217,976| 04-Apr-2021| 08:29| x86 \nMicrosoft.office.compliance.console.dll| 15.2.858.10| 854,936| 04-Apr-2021| 08:28| x86 \nMicrosoft.office.compliance.console.extensions.dll| 15.2.858.10| 485,760| 04-Apr-2021| 08:27| x86 \nMicrosoft.office.compliance.core.dll| 15.2.858.9| 413,064| 04-Apr-2021| 08:32| x86 \nMicrosoft.office.compliance.ingestion.dll| 15.2.858.9| 36,232| 04-Apr-2021| 08:33| x86 \nMicrosoft.office.compliancepolicy.exchange.dar.dll| 15.2.858.10| 84,864| 04-Apr-2021| 08:33| x86 \nMicrosoft.office.compliancepolicy.platform.dll| 15.2.858.9| 1,782,136| 04-Apr-2021| 08:29| x86 \nMicrosoft.office.datacenter.activemonitoring.management.common.dll| 15.2.858.10| 49,536| 04-Apr-2021| 08:27| x86 \nMicrosoft.office.datacenter.activemonitoring.management.dll| 15.2.858.10| 27,544| 04-Apr-2021| 08:27| x86 \nMicrosoft.office.datacenter.activemonitoringlocal.dll| 15.2.858.9| 174,976| 04-Apr-2021| 08:28| x86 \nMicrosoft.office.datacenter.monitoring.activemonitoring.recovery.dll| 15.2.858.9| 166,272| 04-Apr-2021| 08:28| x86 \nMicrosoft.office365.datainsights.uploader.dll| 15.2.858.9| 40,328| 04-Apr-2021| 08:28| x86 \nMicrosoft.online.box.shell.dll| 15.2.858.9| 46,472| 04-Apr-2021| 08:27| x86 \nMicrosoft.powershell.hostingtools.dll| 15.2.858.9| 67,992| 04-Apr-2021| 08:29| x86 \nMicrosoft.powershell.hostingtools_2.dll| 15.2.858.9| 67,992| 04-Apr-2021| 08:29| x86 \nMicrosoft.tailoredexperiences.core.dll| 15.2.858.9| 120,200| 04-Apr-2021| 08:33| x86 \nMigrateumcustomprompts.ps1| Not applicable| 19,150| 04-Apr-2021| 08:38| Not applicable \nModernpublicfoldertomailboxmapgenerator.ps1| Not applicable| 29,088| 04-Apr-2021| 08:38| Not applicable \nMovemailbox.ps1| Not applicable| 61,196| 04-Apr-2021| 08:36| Not applicable \nMovetransportdatabase.ps1| Not applicable| 30,622| 04-Apr-2021| 08:37| Not applicable \nMove_publicfolderbranch.ps1| Not applicable| 17,556| 04-Apr-2021| 08:37| Not applicable \nMpgearparser.dll| 15.2.858.9| 99,720| 04-Apr-2021| 08:29| x64 \nMsclassificationadapter.dll| 15.2.858.9| 248,712| 04-Apr-2021| 08:28| x64 \nMsexchangecompliance.exe| 15.2.858.10| 78,720| 04-Apr-2021| 08:28| x86 \nMsexchangedagmgmt.exe| 15.2.858.10| 25,472| 04-Apr-2021| 08:39| x86 \nMsexchangedelivery.exe| 15.2.858.10| 38,792| 04-Apr-2021| 08:39| x86 \nMsexchangefrontendtransport.exe| 15.2.858.10| 31,616| 04-Apr-2021| 08:39| x86 \nMsexchangehmhost.exe| 15.2.858.10| 27,032| 04-Apr-2021| 08:27| x86 \nMsexchangehmrecovery.exe| 15.2.858.9| 29,584| 04-Apr-2021| 08:32| x86 \nMsexchangemailboxassistants.exe| 15.2.858.10| 72,584| 04-Apr-2021| 08:39| x86 \nMsexchangemailboxreplication.exe| 15.2.858.10| 20,872| 04-Apr-2021| 08:43| x86 \nMsexchangemigrationworkflow.exe| 15.2.858.10| 69,000| 04-Apr-2021| 08:39| x86 \nMsexchangerepl.exe| 15.2.858.10| 71,040| 04-Apr-2021| 08:38| x86 \nMsexchangesubmission.exe| 15.2.858.10| 123,288| 04-Apr-2021| 08:39| x86 \nMsexchangethrottling.exe| 15.2.858.9| 39,832| 04-Apr-2021| 08:39| x86 \nMsexchangetransport.exe| 15.2.858.9| 74,104| 04-Apr-2021| 08:39| x86 \nMsexchangetransportlogsearch.exe| 15.2.858.10| 139,152| 04-Apr-2021| 08:39| x86 \nMsexchangewatchdog.exe| 15.2.858.9| 55,688| 04-Apr-2021| 08:39| x64 \nMspatchlinterop.dll| 15.2.858.9| 53,640| 04-Apr-2021| 08:38| x64 \nNativehttpproxy.dll| 15.2.858.9| 91,528| 04-Apr-2021| 08:42| x64 \nNavigatorparser.dll| 15.2.858.9| 636,800| 04-Apr-2021| 08:29| x64 \nNego2nativeinterface.dll| 15.2.858.9| 19,336| 04-Apr-2021| 08:38| x64 \nNegotiateclientcertificatemodule.dll| 15.2.858.9| 30,080| 04-Apr-2021| 08:32| x64 \nNewtestcasconnectivityuser.ps1| Not applicable| 19,792| 04-Apr-2021| 08:37| Not applicable \nNewtestcasconnectivityuserhosting.ps1| Not applicable| 24,607| 04-Apr-2021| 08:35| Not applicable \nNtspxgen.dll| 15.2.858.9| 80,776| 04-Apr-2021| 08:42| x64 \nOleconverter.exe| 15.2.858.9| 173,960| 04-Apr-2021| 08:39| x64 \nOutsideinmodule.dll| 15.2.858.9| 87,944| 04-Apr-2021| 08:29| x64 \nOwaauth.dll| 15.2.858.9| 92,040| 04-Apr-2021| 08:39| x64 \nPerf_common_extrace.dll| 15.2.858.9| 245,128| 04-Apr-2021| 08:31| x64 \nPerf_exchmem.dll| 15.2.858.9| 86,400| 04-Apr-2021| 08:29| x64 \nPipeline2.dll| 15.2.858.9| 1,454,480| 04-Apr-2021| 08:28| x64 \nPreparemoverequesthosting.ps1| Not applicable| 71,023| 04-Apr-2021| 08:38| Not applicable \nPrepare_moverequest.ps1| Not applicable| 73,257| 04-Apr-2021| 08:37| Not applicable \nProductinfo.managed.dll| 15.2.858.9| 27,024| 04-Apr-2021| 08:29| x86 \nProxybinclientsstringsdll| 15.2.858.9| 924,552| 04-Apr-2021| 08:33| x86 \nPublicfoldertomailboxmapgenerator.ps1| Not applicable| 23,266| 04-Apr-2021| 08:36| Not applicable \nQuietexe.exe| 15.2.858.9| 14,728| 04-Apr-2021| 08:39| x86 \nRedistributeactivedatabases.ps1| Not applicable| 250,572| 04-Apr-2021| 08:39| Not applicable \nReinstalldefaulttransportagents.ps1| Not applicable| 21,659| 04-Apr-2021| 08:38| Not applicable \nRemoteexchange.ps1| Not applicable| 23,577| 04-Apr-2021| 08:43| Not applicable \nRemoveuserfrompfrecursive.ps1| Not applicable| 14,708| 04-Apr-2021| 08:36| Not applicable \nReplaceuserpermissiononpfrecursive.ps1| Not applicable| 15,026| 04-Apr-2021| 08:37| Not applicable \nReplaceuserwithuseronpfrecursive.ps1| Not applicable| 15,040| 04-Apr-2021| 08:38| Not applicable \nReplaycrimsonmsg.dll| 15.2.858.9| 1,104,768| 04-Apr-2021| 08:31| x64 \nResetattachmentfilterentry.ps1| Not applicable| 15,480| 04-Apr-2021| 08:39| Not applicable \nResetcasservice.ps1| Not applicable| 21,731| 04-Apr-2021| 08:36| Not applicable \nReset_antispamupdates.ps1| Not applicable| 14,105| 04-Apr-2021| 08:39| Not applicable \nRestoreserveronprereqfailure.ps1| Not applicable| 15,129| 04-Apr-2021| 08:39| Not applicable \nResumemailboxdatabasecopy.ps1| Not applicable| 17,198| 04-Apr-2021| 08:39| Not applicable \nRightsmanagementwrapper.dll| 15.2.858.9| 86,424| 04-Apr-2021| 08:39| x64 \nRollalternateserviceaccountpassword.ps1| Not applicable| 55,810| 04-Apr-2021| 08:37| Not applicable \nRpcperf.dll| 15.2.858.9| 23,432| 04-Apr-2021| 08:43| x64 \nRpcproxyshim.dll| 15.2.858.9| 39,320| 04-Apr-2021| 08:37| x64 \nRulesauditmsg.dll| 15.2.858.9| 12,680| 04-Apr-2021| 08:39| x64 \nSafehtmlnativewrapper.dll| 15.2.858.9| 34,696| 04-Apr-2021| 08:39| x64 \nScanenginetest.exe| 15.2.858.9| 956,296| 04-Apr-2021| 08:27| x64 \nScanningprocess.exe| 15.2.858.9| 739,208| 04-Apr-2021| 08:32| x64 \nSearchdiagnosticinfo.ps1| Not applicable| 16,840| 04-Apr-2021| 08:36| Not applicable \nServicecontrol.ps1| Not applicable| 52,317| 04-Apr-2021| 08:27| Not applicable \nSetmailpublicfolderexternaladdress.ps1| Not applicable| 20,782| 04-Apr-2021| 08:36| Not applicable \nSettingsadapter.dll| 15.2.858.9| 116,104| 04-Apr-2021| 08:27| x64 \nSetup.exe| 15.2.858.9| 20,352| 04-Apr-2021| 08:30| x86 \nSetupui.exe| 15.2.858.10| 188,296| 04-Apr-2021| 08:43| x86 \nSplit_publicfoldermailbox.ps1| Not applicable| 52,217| 04-Apr-2021| 08:35| Not applicable \nStartdagservermaintenance.ps1| Not applicable| 27,851| 04-Apr-2021| 08:39| Not applicable \nStatisticsutil.dll| 15.2.858.9| 142,232| 04-Apr-2021| 08:29| x64 \nStopdagservermaintenance.ps1| Not applicable| 21,137| 04-Apr-2021| 08:38| Not applicable \nStoretsconstants.ps1| Not applicable| 15,818| 04-Apr-2021| 08:37| Not applicable \nStoretslibrary.ps1| Not applicable| 27,987| 04-Apr-2021| 08:38| Not applicable \nStore_mapi_net_bin_perf_x64_exrpcperf.dll| 15.2.858.9| 28,552| 04-Apr-2021| 08:40| x64 \nSync_mailpublicfolders.ps1| Not applicable| 43,955| 04-Apr-2021| 08:37| Not applicable \nSync_modernmailpublicfolders.ps1| Not applicable| 44,001| 04-Apr-2021| 08:38| Not applicable \nTextconversionmodule.dll| 15.2.858.9| 86,408| 04-Apr-2021| 08:27| x64 \nTroubleshoot_ci.ps1| Not applicable| 22,731| 04-Apr-2021| 08:37| Not applicable \nTroubleshoot_databaselatency.ps1| Not applicable| 33,421| 04-Apr-2021| 08:35| Not applicable \nTroubleshoot_databasespace.ps1| Not applicable| 30,017| 04-Apr-2021| 08:36| Not applicable \nUninstall_antispamagents.ps1| Not applicable| 15,477| 04-Apr-2021| 08:39| Not applicable \nUpdateapppoolmanagedframeworkversion.ps1| Not applicable| 14,058| 04-Apr-2021| 08:38| Not applicable \nUpdatecas.ps1| Not applicable| 35,786| 04-Apr-2021| 08:39| Not applicable \nUpdateconfigfiles.ps1| Not applicable| 19,730| 04-Apr-2021| 08:39| Not applicable \nUpdateserver.exe| 15.2.858.9| 3,014,536| 04-Apr-2021| 08:28| x64 \nUpdate_malwarefilteringserver.ps1| Not applicable| 18,184| 04-Apr-2021| 08:37| Not applicable \nWeb.config_053c31bdd6824e95b35d61b0a5e7b62d| Not applicable| 31,814| 04-Apr-2021| 08:34| Not applicable \nWsbexchange.exe| 15.2.858.9| 125,320| 04-Apr-2021| 08:44| x64 \nX400prox.dll| 15.2.858.9| 103,296| 04-Apr-2021| 08:35| x64 \n_search.lingoperators.a| 15.2.858.9| 34,688| 04-Apr-2021| 08:39| Not applicable \n_search.lingoperators.b| 15.2.858.9| 34,688| 04-Apr-2021| 08:39| Not applicable \n_search.mailboxoperators.a| 15.2.858.10| 290,200| 04-Apr-2021| 08:33| Not applicable \n_search.mailboxoperators.b| 15.2.858.10| 290,200| 04-Apr-2021| 08:33| Not applicable \n_search.operatorschema.a| 15.2.858.9| 485,760| 04-Apr-2021| 08:32| Not applicable \n_search.operatorschema.b| 15.2.858.9| 485,760| 04-Apr-2021| 08:32| Not applicable \n_search.tokenoperators.a| 15.2.858.9| 113,544| 04-Apr-2021| 08:33| Not applicable \n_search.tokenoperators.b| 15.2.858.9| 113,544| 04-Apr-2021| 08:33| Not applicable \n_search.transportoperators.a| 15.2.858.10| 67,976| 04-Apr-2021| 08:39| Not applicable \n_search.transportoperators.b| 15.2.858.10| 67,976| 04-Apr-2021| 08:39| Not applicable \n \n#### \n\n__\n\nMicrosoft Exchange Server 2019 Cumulative Update 8\n\nFile name| File version| File size| Date| Time| Platform \n---|---|---|---|---|--- \nActivemonitoringeventmsg.dll| 15.2.792.13| 71,040| 04-Apr-2021| 10:03| x64 \nActivemonitoringexecutionlibrary.ps1| Not applicable| 29,522| 04-Apr-2021| 10:03| Not applicable \nAdduserstopfrecursive.ps1| Not applicable| 14,965| 04-Apr-2021| 10:05| Not applicable \nAdemodule.dll| 15.2.792.13| 106,384| 04-Apr-2021| 10:04| x64 \nAirfilter.dll| 15.2.792.13| 42,888| 04-Apr-2021| 10:03| x64 \nAjaxcontroltoolkit.dll| 15.2.792.13| 92,552| 04-Apr-2021| 10:03| x86 \nAntispamcommon.ps1| Not applicable| 13,505| 04-Apr-2021| 10:05| Not applicable \nAsdat.msi| Not applicable| 5,087,232| 04-Apr-2021| 10:03| Not applicable \nAsentirs.msi| Not applicable| 77,824| 04-Apr-2021| 10:03| Not applicable \nAsentsig.msi| Not applicable| 73,728| 04-Apr-2021| 10:03| Not applicable \nBigfunnel.bondtypes.dll| 15.2.792.13| 45,464| 04-Apr-2021| 10:04| x86 \nBigfunnel.common.dll| 15.2.792.13| 66,456| 04-Apr-2021| 10:04| x86 \nBigfunnel.configuration.dll| 15.2.792.13| 118,168| 04-Apr-2021| 10:04| x86 \nBigfunnel.entropy.dll| 15.2.792.13| 44,440| 04-Apr-2021| 10:04| x86 \nBigfunnel.filter.dll| 15.2.792.13| 54,168| 04-Apr-2021| 10:04| x86 \nBigfunnel.indexstream.dll| 15.2.792.13| 68,992| 04-Apr-2021| 10:03| x86 \nBigfunnel.neuraltree.dll| Not applicable| 694,160| 04-Apr-2021| 10:03| x64 \nBigfunnel.neuraltreeranking.dll| 15.2.792.13| 19,848| 04-Apr-2021| 10:03| x86 \nBigfunnel.poi.dll| 15.2.792.13| 245,120| 04-Apr-2021| 10:03| x86 \nBigfunnel.postinglist.dll| 15.2.792.13| 189,336| 04-Apr-2021| 10:06| x86 \nBigfunnel.query.dll| 15.2.792.13| 101,256| 04-Apr-2021| 10:06| x86 \nBigfunnel.ranking.dll| 15.2.792.13| 109,448| 04-Apr-2021| 10:05| x86 \nBigfunnel.syntheticdatalib.dll| 15.2.792.13| 3,634,576| 04-Apr-2021| 10:04| x86 \nBigfunnel.tracing.dll| 15.2.792.13| 42,880| 04-Apr-2021| 10:05| x86 \nBigfunnel.wordbreakers.dll| 15.2.792.13| 46,472| 04-Apr-2021| 10:03| x86 \nCafe_airfilter_dll| 15.2.792.13| 42,888| 04-Apr-2021| 10:03| x64 \nCafe_exppw_dll| 15.2.792.13| 83,328| 04-Apr-2021| 10:04| x64 \nCafe_owaauth_dll| 15.2.792.13| 92,032| 04-Apr-2021| 10:04| x64 \nCalcalculation.ps1| Not applicable| 42,113| 04-Apr-2021| 10:06| Not applicable \nCheckdatabaseredundancy.ps1| Not applicable| 94,622| 04-Apr-2021| 10:04| Not applicable \nChksgfiles.dll| 15.2.792.13| 57,216| 04-Apr-2021| 10:07| x64 \nCitsconstants.ps1| Not applicable| 15,821| 04-Apr-2021| 10:04| Not applicable \nCitslibrary.ps1| Not applicable| 82,680| 04-Apr-2021| 10:04| Not applicable \nCitstypes.ps1| Not applicable| 14,480| 04-Apr-2021| 10:04| Not applicable \nClassificationengine_mce| 15.2.792.13| 1,693,064| 04-Apr-2021| 10:04| Not applicable \nClusmsg.dll| 15.2.792.13| 134,024| 04-Apr-2021| 10:05| x64 \nCoconet.dll| 15.2.792.13| 48,008| 04-Apr-2021| 10:06| x64 \nCollectovermetrics.ps1| Not applicable| 81,660| 04-Apr-2021| 10:04| Not applicable \nCollectreplicationmetrics.ps1| Not applicable| 41,886| 04-Apr-2021| 10:04| Not applicable \nCommonconnectfunctions.ps1| Not applicable| 29,971| 04-Apr-2021| 10:03| Not applicable \nComplianceauditservice.exe| 15.2.792.13| 39,800| 04-Apr-2021| 10:07| x86 \nConfigureadam.ps1| Not applicable| 22,804| 04-Apr-2021| 10:06| Not applicable \nConfigurecaferesponseheaders.ps1| Not applicable| 20,344| 04-Apr-2021| 10:05| Not applicable \nConfigurecryptodefaults.ps1| Not applicable| 42,055| 04-Apr-2021| 10:06| Not applicable \nConfigurenetworkprotocolparameters.ps1| Not applicable| 19,806| 04-Apr-2021| 10:05| Not applicable \nConfiguresmbipsec.ps1| Not applicable| 39,868| 04-Apr-2021| 10:06| Not applicable \nConfigure_enterprisepartnerapplication.ps1| Not applicable| 22,323| 04-Apr-2021| 10:05| Not applicable \nConnectfunctions.ps1| Not applicable| 37,165| 04-Apr-2021| 10:06| Not applicable \nConnect_exchangeserver_help.xml| Not applicable| 30,440| 04-Apr-2021| 10:07| Not applicable \nConsoleinitialize.ps1| Not applicable| 24,228| 04-Apr-2021| 10:07| Not applicable \nConvertoabvdir.ps1| Not applicable| 20,093| 04-Apr-2021| 10:06| Not applicable \nConverttomessagelatency.ps1| Not applicable| 14,572| 04-Apr-2021| 10:05| Not applicable \nConvert_distributiongrouptounifiedgroup.ps1| Not applicable| 34,805| 04-Apr-2021| 10:06| Not applicable \nCreate_publicfoldermailboxesformigration.ps1| Not applicable| 27,952| 04-Apr-2021| 10:06| Not applicable \nCts.14.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts.14.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts.14.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts.14.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts.14.4.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts.15.0.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts.15.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts.15.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts.15.20.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts.8.1.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts.8.2.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts.8.3.microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts_exsmime.dll| 15.2.792.13| 380,800| 04-Apr-2021| 10:07| x64 \nCts_microsoft.exchange.data.common.dll| 15.2.792.13| 1,686,416| 04-Apr-2021| 10:05| x86 \nCts_microsoft.exchange.data.common.versionpolicy.cfg| Not applicable| 507| 04-Apr-2021| 07:10| Not applicable \nCts_policy.14.0.microsoft.exchange.data.common.dll| 15.2.792.13| 12,664| 04-Apr-2021| 10:05| x86 \nCts_policy.14.1.microsoft.exchange.data.common.dll| 15.2.792.13| 12,672| 04-Apr-2021| 10:05| x86 \nCts_policy.14.2.microsoft.exchange.data.common.dll| 15.2.792.13| 12,688| 04-Apr-2021| 10:05| x86 \nCts_policy.14.3.microsoft.exchange.data.common.dll| 15.2.792.13| 12,672| 04-Apr-2021| 10:04| x86 \nCts_policy.14.4.microsoft.exchange.data.common.dll| 15.2.792.13| 12,672| 04-Apr-2021| 10:04| x86 \nCts_policy.15.0.microsoft.exchange.data.common.dll| 15.2.792.13| 12,680| 04-Apr-2021| 10:05| x86 \nCts_policy.15.1.microsoft.exchange.data.common.dll| 15.2.792.13| 12,680| 04-Apr-2021| 10:05| x86 \nCts_policy.15.2.microsoft.exchange.data.common.dll| 15.2.792.13| 12,680| 04-Apr-2021| 10:04| x86 \nCts_policy.15.20.microsoft.exchange.data.common.dll| 15.2.792.13| 12,672| 04-Apr-2021| 10:04| x86 \nCts_policy.8.0.microsoft.exchange.data.common.dll| 15.2.792.13| 12,696| 04-Apr-2021| 10:04| x86 \nCts_policy.8.1.microsoft.exchange.data.common.dll| 15.2.792.13| 12,672| 04-Apr-2021| 10:06| x86 \nCts_policy.8.2.microsoft.exchange.data.common.dll| 15.2.792.13| 12,688| 04-Apr-2021| 10:04| x86 \nCts_policy.8.3.microsoft.exchange.data.common.dll| 15.2.792.13| 12,696| 04-Apr-2021| 10:04| x86 \nDagcommonlibrary.ps1| Not applicable| 60,242| 04-Apr-2021| 10:04| Not applicable \nDependentassemblygenerator.exe| 15.2.792.13| 22,400| 04-Apr-2021| 10:06| x86 \nDiaghelper.dll| 15.2.792.13| 66,944| 04-Apr-2021| 10:05| x86 \nDiagnosticscriptcommonlibrary.ps1| Not applicable| 16,374| 04-Apr-2021| 10:03| Not applicable \nDisableinmemorytracing.ps1| Not applicable| 13,402| 04-Apr-2021| 10:06| Not applicable \nDisable_antimalwarescanning.ps1| Not applicable| 15,225| 04-Apr-2021| 10:06| Not applicable \nDisable_outsidein.ps1| Not applicable| 13,694| 04-Apr-2021| 10:06| Not applicable \nDisklockerapi.dll| Not applicable| 22,424| 04-Apr-2021| 10:06| x64 \nDlmigrationmodule.psm1| Not applicable| 39,616| 04-Apr-2021| 10:05| Not applicable \nDsaccessperf.dll| 15.2.792.13| 45,952| 04-Apr-2021| 10:03| x64 \nDscperf.dll| 15.2.792.13| 32,640| 04-Apr-2021| 10:03| x64 \nDup_cts_microsoft.exchange.data.common.dll| 15.2.792.13| 1,686,416| 04-Apr-2021| 10:05| x86 \nDup_ext_microsoft.exchange.data.transport.dll| 15.2.792.13| 601,496| 04-Apr-2021| 10:03| x86 \nEcpperfcounters.xml| Not applicable| 31,144| 04-Apr-2021| 10:04| Not applicable \nEdgeextensibility_microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEdgeextensibility_policy.8.0.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,672| 04-Apr-2021| 10:07| x86 \nEdgetransport.exe| 15.2.792.13| 49,544| 04-Apr-2021| 10:07| x86 \nEext.14.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext.14.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext.14.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext.14.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext.14.4.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext.15.0.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext.15.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext.15.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext.15.20.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext.8.1.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext.8.2.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext.8.3.microsoft.exchange.data.transport.versionpolicy.cfg| Not applicable| 510| 04-Apr-2021| 07:10| Not applicable \nEext_policy.14.0.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,696| 04-Apr-2021| 10:07| x86 \nEext_policy.14.1.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,680| 04-Apr-2021| 10:07| x86 \nEext_policy.14.2.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,680| 04-Apr-2021| 10:06| x86 \nEext_policy.14.3.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,672| 04-Apr-2021| 10:05| x86 \nEext_policy.14.4.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,672| 04-Apr-2021| 10:07| x86 \nEext_policy.15.0.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,672| 04-Apr-2021| 10:07| x86 \nEext_policy.15.1.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,672| 04-Apr-2021| 10:06| x86 \nEext_policy.15.2.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,672| 04-Apr-2021| 10:06| x86 \nEext_policy.15.20.microsoft.exchange.data.transport.dll| 15.2.792.13| 13,184| 04-Apr-2021| 10:06| x86 \nEext_policy.8.1.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,688| 04-Apr-2021| 10:07| x86 \nEext_policy.8.2.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,696| 04-Apr-2021| 10:07| x86 \nEext_policy.8.3.microsoft.exchange.data.transport.dll| 15.2.792.13| 12,680| 04-Apr-2021| 10:07| x86 \nEnableinmemorytracing.ps1| Not applicable| 13,404| 04-Apr-2021| 10:06| Not applicable \nEnable_antimalwarescanning.ps1| Not applicable| 17,579| 04-Apr-2021| 10:05| Not applicable \nEnable_basicauthtooauthconverterhttpmodule.ps1| Not applicable| 18,604| 04-Apr-2021| 10:06| Not applicable \nEnable_crossforestconnector.ps1| Not applicable| 18,638| 04-Apr-2021| 10:06| Not applicable \nEnable_outlookcertificateauthentication.ps1| Not applicable| 22,952| 04-Apr-2021| 10:05| Not applicable \nEnable_outsidein.ps1| Not applicable| 13,683| 04-Apr-2021| 10:05| Not applicable \nEngineupdateserviceinterfaces.dll| 15.2.792.13| 17,800| 04-Apr-2021| 10:07| x86 \nEscprint.dll| 15.2.792.13| 20,360| 04-Apr-2021| 10:05| x64 \nEse.dll| 15.2.792.13| 3,741,592| 04-Apr-2021| 10:04| x64 \nEseback2.dll| 15.2.792.13| 350,080| 04-Apr-2021| 10:03| x64 \nEsebcli2.dll| 15.2.792.13| 318,360| 04-Apr-2021| 10:04| x64 \nEseperf.dll| 15.2.792.13| 108,936| 04-Apr-2021| 10:06| x64 \nEseutil.exe| 15.2.792.13| 425,352| 04-Apr-2021| 10:03| x64 \nEsevss.dll| 15.2.792.13| 44,416| 04-Apr-2021| 10:05| x64 \nEtweseproviderresources.dll| 15.2.792.13| 101,248| 04-Apr-2021| 10:04| x64 \nEventperf.dll| 15.2.792.13| 59,800| 04-Apr-2021| 10:04| x64 \nExchange.depthtwo.types.ps1xml| Not applicable| 40,136| 04-Apr-2021| 10:07| Not applicable \nExchange.format.ps1xml| Not applicable| 649,725| 04-Apr-2021| 10:07| Not applicable \nExchange.partial.types.ps1xml| Not applicable| 44,370| 04-Apr-2021| 10:06| Not applicable \nExchange.ps1| Not applicable| 20,831| 04-Apr-2021| 10:06| Not applicable \nExchange.support.format.ps1xml| Not applicable| 26,551| 04-Apr-2021| 10:07| Not applicable \nExchange.types.ps1xml| Not applicable| 365,180| 04-Apr-2021| 10:07| Not applicable \nExchangeudfcommon.dll| 15.2.792.13| 122,760| 04-Apr-2021| 10:07| x86 \nExchangeudfs.dll| 15.2.792.13| 272,760| 04-Apr-2021| 10:07| x86 \nExchmem.dll| 15.2.792.13| 86,408| 04-Apr-2021| 10:06| x64 \nExchsetupmsg.dll| 15.2.792.13| 19,352| 04-Apr-2021| 10:05| x64 \nExdbfailureitemapi.dll| Not applicable| 27,032| 04-Apr-2021| 10:05| x64 \nExdbmsg.dll| 15.2.792.13| 230,792| 04-Apr-2021| 10:05| x64 \nExeventperfplugin.dll| 15.2.792.13| 25,472| 04-Apr-2021| 10:07| x64 \nExmime.dll| 15.2.792.13| 364,928| 04-Apr-2021| 10:07| x64 \nExportedgeconfig.ps1| Not applicable| 27,427| 04-Apr-2021| 10:06| Not applicable \nExport_mailpublicfoldersformigration.ps1| Not applicable| 18,598| 04-Apr-2021| 10:05| Not applicable \nExport_modernpublicfolderstatistics.ps1| Not applicable| 29,246| 04-Apr-2021| 10:05| Not applicable \nExport_outlookclassification.ps1| Not applicable| 14,414| 04-Apr-2021| 10:04| Not applicable \nExport_publicfolderstatistics.ps1| Not applicable| 23,165| 04-Apr-2021| 10:06| Not applicable \nExport_retentiontags.ps1| Not applicable| 17,084| 04-Apr-2021| 10:06| Not applicable \nExppw.dll| 15.2.792.13| 83,328| 04-Apr-2021| 10:04| x64 \nExprfdll.dll| 15.2.792.13| 26,496| 04-Apr-2021| 10:06| x64 \nExrpc32.dll| 15.2.792.13| 2,029,464| 04-Apr-2021| 10:04| x64 \nExrw.dll| 15.2.792.13| 28,040| 04-Apr-2021| 10:03| x64 \nExsetdata.dll| 15.2.792.13| 2,779,544| 04-Apr-2021| 10:06| x64 \nExsetup.exe| 15.2.792.13| 35,208| 04-Apr-2021| 10:05| x86 \nExsetupui.exe| 15.2.792.13| 471,944| 04-Apr-2021| 10:06| x86 \nExtrace.dll| 15.2.792.13| 245,144| 04-Apr-2021| 10:03| x64 \nExt_microsoft.exchange.data.transport.dll| 15.2.792.13| 601,496| 04-Apr-2021| 10:03| x86 \nExwatson.dll| 15.2.792.13| 44,936| 04-Apr-2021| 10:03| x64 \nFastioext.dll| 15.2.792.13| 60,312| 04-Apr-2021| 10:06| x64 \nFil06f84122c94c91a0458cad45c22cce20| Not applicable| 784,631| 04-Apr-2021| 10:04| Not applicable \nFil143a7a5d4894478a85eefc89a6539fc8| Not applicable| 1,909,228| 04-Apr-2021| 10:04| Not applicable \nFil19f527f284a0bb584915f9994f4885c3| Not applicable| 648,760| 04-Apr-2021| 10:04| Not applicable \nFil1a9540363a531e7fb18ffe600cffc3ce| Not applicable| 358,405| 04-Apr-2021| 10:06| Not applicable \nFil220d95210c8697448312eee6628c815c| Not applicable| 303,657| 04-Apr-2021| 10:06| Not applicable \nFil2cf5a31e239a45fabea48687373b547c| Not applicable| 652,759| 04-Apr-2021| 10:04| Not applicable \nFil397f0b1f1d7bd44d6e57e496decea2ec| Not applicable| 784,628| 04-Apr-2021| 10:04| Not applicable \nFil3ab126057b34eee68c4fd4b127ff7aee| Not applicable| 784,604| 04-Apr-2021| 10:04| Not applicable \nFil41bb2e5743e3bde4ecb1e07a76c5a7a8| Not applicable| 149,154| 04-Apr-2021| 10:03| Not applicable \nFil51669bfbda26e56e3a43791df94c1e9c| Not applicable| 9,345| 04-Apr-2021| 10:04| Not applicable \nFil558cb84302edfc96e553bcfce2b85286| Not applicable| 85,259| 04-Apr-2021| 10:04| Not applicable \nFil55ce217251b77b97a46e914579fc4c64| Not applicable| 648,754| 04-Apr-2021| 10:04| Not applicable \nFil5a9e78a51a18d05bc36b5e8b822d43a8| Not applicable| 1,596,145| 04-Apr-2021| 10:03| Not applicable \nFil5c7d10e5f1f9ada1e877c9aa087182a9| Not applicable| 1,596,145| 04-Apr-2021| 10:03| Not applicable \nFil6569a92c80a1e14949e4282ae2cc699c| Not applicable| 1,596,145| 04-Apr-2021| 10:03| Not applicable \nFil6a01daba551306a1e55f0bf6894f4d9f| Not applicable| 648,730| 04-Apr-2021| 10:05| Not applicable \nFil8863143ea7cd93a5f197c9fff13686bf| Not applicable| 648,760| 04-Apr-2021| 10:04| Not applicable \nFil8a8c76f225c7205db1000e8864c10038| Not applicable| 1,596,145| 04-Apr-2021| 10:03| Not applicable \nFil8cd999415d36ba78a3ac16a080c47458| Not applicable| 784,634| 04-Apr-2021| 10:04| Not applicable \nFil97913e630ff02079ce9889505a517ec0| Not applicable| 1,596,145| 04-Apr-2021| 10:03| Not applicable \nFilaa49badb2892075a28d58d06560f8da2| Not applicable| 785,658| 04-Apr-2021| 10:04| Not applicable \nFilae28aeed23ccb4b9b80accc2d43175b5| Not applicable| 648,757| 04-Apr-2021| 10:04| Not applicable \nFilb17f496f9d880a684b5c13f6b02d7203| Not applicable| 784,634| 04-Apr-2021| 10:05| Not applicable \nFilb94ca32f2654692263a5be009c0fe4ca| Not applicable| 2,564,949| 04-Apr-2021| 10:04| Not applicable \nFilbabdc4808eba0c4f18103f12ae955e5c| Not applicable| 342,875,757| 04-Apr-2021| 10:05| Not applicable \nFilc92cf2bf29bed21bd5555163330a3d07| Not applicable| 652,777| 04-Apr-2021| 10:04| Not applicable \nFilcc478d2a8346db20c4e2dc36f3400628| Not applicable| 784,634| 04-Apr-2021| 10:04| Not applicable \nFild26cd6b13cfe2ec2a16703819da6d043| Not applicable| 1,596,145| 04-Apr-2021| 10:03| Not applicable \nFilf2719f9dc8f7b74df78ad558ad3ee8a6| Not applicable| 785,640| 04-Apr-2021| 10:04| Not applicable \nFilfa5378dc76359a55ef20cc34f8a23fee| Not applicable| 1,427,187| 04-Apr-2021| 10:03| Not applicable \nFilteringconfigurationcommands.ps1| Not applicable| 18,267| 04-Apr-2021| 10:06| Not applicable \nFilteringpowershell.dll| 15.2.792.13| 223,112| 04-Apr-2021| 10:07| x86 \nFilteringpowershell.format.ps1xml| Not applicable| 29,652| 04-Apr-2021| 10:07| Not applicable \nFiltermodule.dll| 15.2.792.13| 180,104| 04-Apr-2021| 10:04| x64 \nFipexeuperfctrresource.dll| 15.2.792.13| 15,232| 04-Apr-2021| 10:05| x64 \nFipexeventsresource.dll| 15.2.792.13| 44,936| 04-Apr-2021| 10:07| x64 \nFipexperfctrresource.dll| 15.2.792.13| 32,640| 04-Apr-2021| 10:05| x64 \nFirewallres.dll| 15.2.792.13| 72,600| 04-Apr-2021| 10:07| x64 \nFms.exe| 15.2.792.13| 1,350,024| 04-Apr-2021| 10:07| x64 \nForefrontactivedirectoryconnector.exe| 15.2.792.13| 110,976| 04-Apr-2021| 10:06| x64 \nFpsdiag.exe| 15.2.792.13| 18,840| 04-Apr-2021| 10:04| x86 \nFsccachedfilemanagedlocal.dll| 15.2.792.13| 822,168| 04-Apr-2021| 10:04| x64 \nFscconfigsupport.dll| 15.2.792.13| 56,712| 04-Apr-2021| 10:04| x86 \nFscconfigurationserver.exe| 15.2.792.13| 430,976| 04-Apr-2021| 10:04| x64 \nFscconfigurationserverinterfaces.dll| 15.2.792.13| 15,752| 04-Apr-2021| 10:07| x86 \nFsccrypto.dll| 15.2.792.13| 208,776| 04-Apr-2021| 10:05| x64 \nFscipcinterfaceslocal.dll| 15.2.792.13| 28,552| 04-Apr-2021| 10:04| x86 \nFscipclocal.dll| 15.2.792.13| 38,272| 04-Apr-2021| 10:04| x86 \nFscsqmuploader.exe| 15.2.792.13| 453,528| 04-Apr-2021| 10:04| x64 \nGetucpool.ps1| Not applicable| 19,811| 04-Apr-2021| 10:05| Not applicable \nGetvalidengines.ps1| Not applicable| 13,314| 04-Apr-2021| 10:04| Not applicable \nGet_antispamfilteringreport.ps1| Not applicable| 15,809| 04-Apr-2021| 10:06| Not applicable \nGet_antispamsclhistogram.ps1| Not applicable| 14,655| 04-Apr-2021| 10:06| Not applicable \nGet_antispamtopblockedsenderdomains.ps1| Not applicable| 15,727| 04-Apr-2021| 10:05| Not applicable \nGet_antispamtopblockedsenderips.ps1| Not applicable| 14,775| 04-Apr-2021| 10:06| Not applicable \nGet_antispamtopblockedsenders.ps1| Not applicable| 15,498| 04-Apr-2021| 10:05| Not applicable \nGet_antispamtoprblproviders.ps1| Not applicable| 14,705| 04-Apr-2021| 10:05| Not applicable \nGet_antispamtoprecipients.ps1| Not applicable| 14,810| 04-Apr-2021| 10:06| Not applicable \nGet_dleligibilitylist.ps1| Not applicable| 42,376| 04-Apr-2021| 10:06| Not applicable \nGet_exchangeetwtrace.ps1| Not applicable| 28,987| 04-Apr-2021| 10:05| Not applicable \nGet_publicfoldermailboxsize.ps1| Not applicable| 15,066| 04-Apr-2021| 10:06| Not applicable \nGet_storetrace.ps1| Not applicable| 51,871| 04-Apr-2021| 10:04| Not applicable \nHuffman_xpress.dll| 15.2.792.13| 32,664| 04-Apr-2021| 10:05| x64 \nImportedgeconfig.ps1| Not applicable| 77,288| 04-Apr-2021| 10:05| Not applicable \nImport_mailpublicfoldersformigration.ps1| Not applicable| 29,516| 04-Apr-2021| 10:05| Not applicable \nImport_retentiontags.ps1| Not applicable| 28,858| 04-Apr-2021| 10:05| Not applicable \nInproxy.dll| 15.2.792.13| 85,904| 04-Apr-2021| 10:08| x64 \nInstallwindowscomponent.ps1| Not applicable| 34,539| 04-Apr-2021| 10:06| Not applicable \nInstall_antispamagents.ps1| Not applicable| 17,929| 04-Apr-2021| 10:06| Not applicable \nInstall_odatavirtualdirectory.ps1| Not applicable| 17,963| 04-Apr-2021| 10:06| Not applicable \nInterop.activeds.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.792.13| 107,392| 04-Apr-2021| 10:04| Not applicable \nInterop.adsiis.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.792.13| 20,376| 04-Apr-2021| 10:03| Not applicable \nInterop.certenroll.dll| 15.2.792.13| 142,744| 04-Apr-2021| 10:03| x86 \nInterop.licenseinfointerface.dll| 15.2.792.13| 14,208| 04-Apr-2021| 10:04| x86 \nInterop.netfw.dll| 15.2.792.13| 34,200| 04-Apr-2021| 10:03| x86 \nInterop.plalibrary.dll| 15.2.792.13| 72,592| 04-Apr-2021| 10:05| x86 \nInterop.stdole2.dll.4b7767dc_2e20_4d95_861a_4629cbc0cabc| 15.2.792.13| 27,024| 04-Apr-2021| 10:04| Not applicable \nInterop.taskscheduler.dll| 15.2.792.13| 46,480| 04-Apr-2021| 10:04| x86 \nInterop.wuapilib.dll| 15.2.792.13| 60,824| 04-Apr-2021| 10:05| x86 \nInterop.xenroll.dll| 15.2.792.13| 39,832| 04-Apr-2021| 10:05| x86 \nKerbauth.dll| 15.2.792.13| 62,848| 04-Apr-2021| 10:05| x64 \nLicenseinfointerface.dll| 15.2.792.13| 643,456| 04-Apr-2021| 10:04| x64 \nLpversioning.xml| Not applicable| 20,454| 04-Apr-2021| 10:06| Not applicable \nMailboxdatabasereseedusingspares.ps1| Not applicable| 31,920| 04-Apr-2021| 10:04| Not applicable \nManagedavailabilitycrimsonmsg.dll| 15.2.792.13| 138,640| 04-Apr-2021| 10:05| x64 \nManagedstorediagnosticfunctions.ps1| Not applicable| 126,253| 04-Apr-2021| 10:04| Not applicable \nManagescheduledtask.ps1| Not applicable| 36,356| 04-Apr-2021| 10:04| Not applicable \nManage_metacachedatabase.ps1| Not applicable| 51,123| 04-Apr-2021| 10:06| Not applicable \nMce.dll| 15.2.792.13| 1,693,064| 04-Apr-2021| 10:04| x64 \nMeasure_storeusagestatistics.ps1| Not applicable| 29,487| 04-Apr-2021| 10:04| Not applicable \nMerge_publicfoldermailbox.ps1| Not applicable| 22,663| 04-Apr-2021| 10:06| Not applicable \nMicrosoft.database.isam.dll| 15.2.792.13| 127,880| 04-Apr-2021| 10:04| x86 \nMicrosoft.dkm.proxy.dll| 15.2.792.13| 25,984| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.activemonitoring.activemonitoringvariantconfig.dll| 15.2.792.13| 68,504| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.activemonitoring.eventlog.dll| 15.2.792.13| 17,816| 04-Apr-2021| 10:05| x64 \nMicrosoft.exchange.addressbook.service.dll| 15.2.792.13| 233,368| 04-Apr-2021| 10:06| x86 \nMicrosoft.exchange.addressbook.service.eventlog.dll| 15.2.792.13| 15,752| 04-Apr-2021| 10:05| x64 \nMicrosoft.exchange.airsync.airsyncmsg.dll| 15.2.792.13| 43,392| 04-Apr-2021| 10:06| x64 \nMicrosoft.exchange.airsync.comon.dll| 15.2.792.13| 1,776,024| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.airsync.dll1| 15.2.792.13| 505,240| 04-Apr-2021| 10:05| Not applicable \nMicrosoft.exchange.airsynchandler.dll| 15.2.792.13| 76,184| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.anchorservice.dll| 15.2.792.13| 135,560| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.antispam.eventlog.dll| 15.2.792.13| 23,424| 04-Apr-2021| 10:05| x64 \nMicrosoft.exchange.antispamupdate.eventlog.dll| 15.2.792.13| 15,744| 04-Apr-2021| 10:06| x64 \nMicrosoft.exchange.antispamupdatesvc.exe| 15.2.792.13| 27,000| 04-Apr-2021| 10:07| x86 \nMicrosoft.exchange.approval.applications.dll| 15.2.792.13| 53,656| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.assistants.dll| 15.2.792.13| 925,048| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.assistants.eventlog.dll| 15.2.792.13| 26,008| 04-Apr-2021| 10:06| x64 \nMicrosoft.exchange.assistants.interfaces.dll| 15.2.792.13| 43,384| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.audit.azureclient.dll| 15.2.792.13| 15,240| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.auditlogsearch.eventlog.dll| 15.2.792.13| 14,728| 04-Apr-2021| 10:07| x64 \nMicrosoft.exchange.auditlogsearchservicelet.dll| 15.2.792.13| 70,528| 04-Apr-2021| 10:07| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.dll| 15.2.792.13| 94,600| 04-Apr-2021| 10:07| x86 \nMicrosoft.exchange.auditstoragemonitorservicelet.eventlog.dll| 15.2.792.13| 13,184| 04-Apr-2021| 10:03| x64 \nMicrosoft.exchange.authadmin.eventlog.dll| 15.2.792.13| 15,744| 04-Apr-2021| 10:07| x64 \nMicrosoft.exchange.authadminservicelet.dll| 15.2.792.13| 36,752| 04-Apr-2021| 10:07| x86 \nMicrosoft.exchange.authservicehostservicelet.dll| 15.2.792.13| 15,760| 04-Apr-2021| 10:07| x86 \nMicrosoft.exchange.autodiscover.configuration.dll| 15.2.792.13| 79,768| 04-Apr-2021| 10:07| x86 \nMicrosoft.exchange.autodiscover.dll| 15.2.792.13| 396,184| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.autodiscover.eventlogs.dll| 15.2.792.13| 21,400| 04-Apr-2021| 10:06| x64 \nMicrosoft.exchange.autodiscoverv2.dll| 15.2.792.13| 57,224| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.bandwidthmonitorservicelet.dll| 15.2.792.13| 14,712| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.batchservice.dll| 15.2.792.13| 35,720| 04-Apr-2021| 10:04| x86 \nMicrosoft.exchange.cabutility.dll| 15.2.792.13| 276,368| 04-Apr-2021| 10:03| x64 \nMicrosoft.exchange.certificatedeployment.eventlog.dll| 15.2.792.13| 16,256| 04-Apr-2021| 10:07| x64 \nMicrosoft.exchange.certificatedeploymentservicelet.dll| 15.2.792.13| 26,008| 04-Apr-2021| 10:07| x86 \nMicrosoft.exchange.certificatenotification.eventlog.dll| 15.2.792.13| 13,704| 04-Apr-2021| 10:06| x64 \nMicrosoft.exchange.certificatenotificationservicelet.dll| 15.2.792.13| 23,424| 04-Apr-2021| 10:07| x86 \nMicrosoft.exchange.clients.common.dll| 15.2.792.13| 377,728| 04-Apr-2021| 10:04| x86 \nMicrosoft.exchange.clients.eventlogs.dll| 15.2.792.13| 83,864| 04-Apr-2021| 10:06| x64 \nMicrosoft.exchange.clients.owa.dll| 15.2.792.13| 2,971,000| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.clients.owa2.server.dll| 15.2.792.13| 5,029,768| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.clients.owa2.servervariantconfiguration.dll| 15.2.792.13| 893,848| 04-Apr-2021| 10:06| x86 \nMicrosoft.exchange.clients.security.dll| 15.2.792.13| 413,560| 04-Apr-2021| 10:07| x86 \nMicrosoft.exchange.clients.strings.dll| 15.2.792.13| 924,568| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.cluster.bandwidthmonitor.dll| 15.2.792.13| 31,624| 04-Apr-2021| 10:06| x86 \nMicrosoft.exchange.cluster.common.dll| 15.2.792.13| 52,112| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.cluster.common.extensions.dll| 15.2.792.13| 21,912| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.cluster.diskmonitor.dll| 15.2.792.13| 33,672| 04-Apr-2021| 10:07| x86 \nMicrosoft.exchange.cluster.replay.dll| 15.2.792.13| 3,515,288| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.cluster.replicaseeder.dll| 15.2.792.13| 108,424| 04-Apr-2021| 10:05| x64 \nMicrosoft.exchange.cluster.replicavsswriter.dll| 15.2.792.13| 288,640| 04-Apr-2021| 10:07| x64 \nMicrosoft.exchange.cluster.shared.dll| 15.2.792.13| 625,536| 04-Apr-2021| 10:04| x86 \nMicrosoft.exchange.common.agentconfig.transport.dll| 15.2.792.13| 86,416| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.common.componentconfig.transport.dll| 15.2.792.13| 1,830,296| 04-Apr-2021| 10:04| x86 \nMicrosoft.exchange.common.directory.adagentservicevariantconfig.dll| 15.2.792.13| 31,640| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.common.directory.directoryvariantconfig.dll| 15.2.792.13| 466,312| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.common.directory.domtvariantconfig.dll| 15.2.792.13| 26,000| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.common.directory.ismemberofresolverconfig.dll| 15.2.792.13| 38,296| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.common.directory.tenantrelocationvariantconfig.dll| 15.2.792.13| 102,784| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.common.directory.topologyservicevariantconfig.dll| 15.2.792.13| 48,536| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.common.diskmanagement.dll| 15.2.792.13| 67,448| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.common.dll| 15.2.792.13| 172,952| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.common.encryption.variantconfig.dll| 15.2.792.13| 113,536| 04-Apr-2021| 10:04| x86 \nMicrosoft.exchange.common.il.dll| 15.2.792.13| 13,720| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.common.inference.dll| 15.2.792.13| 130,432| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.common.optics.dll| 15.2.792.13| 63,880| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.common.processmanagermsg.dll| 15.2.792.13| 19,848| 04-Apr-2021| 10:04| x64 \nMicrosoft.exchange.common.protocols.popimap.dll| 15.2.792.13| 15,256| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.common.search.dll| 15.2.792.13| 108,928| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.common.search.eventlog.dll| 15.2.792.13| 17,792| 04-Apr-2021| 10:06| x64 \nMicrosoft.exchange.common.smtp.dll| 15.2.792.13| 51,592| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.common.suiteservices.suiteservicesvariantconfig.dll| 15.2.792.13| 36,728| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.common.transport.azure.dll| 15.2.792.13| 27,544| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.common.transport.monitoringconfig.dll| 15.2.792.13| 1,042,304| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.commonmsg.dll| 15.2.792.13| 29,072| 04-Apr-2021| 10:05| x64 \nMicrosoft.exchange.compliance.auditlogpumper.messages.dll| 15.2.792.13| 13,184| 04-Apr-2021| 10:06| x64 \nMicrosoft.exchange.compliance.auditservice.core.dll| 15.2.792.13| 181,128| 04-Apr-2021| 10:07| x86 \nMicrosoft.exchange.compliance.auditservice.messages.dll| 15.2.792.13| 30,088| 04-Apr-2021| 10:07| x64 \nMicrosoft.exchange.compliance.common.dll| 15.2.792.13| 22,424| 04-Apr-2021| 10:04| x86 \nMicrosoft.exchange.compliance.crimsonevents.dll| 15.2.792.13| 85,912| 04-Apr-2021| 10:04| x64 \nMicrosoft.exchange.compliance.dll| 15.2.792.13| 41,344| 04-Apr-2021| 10:03| x86 \nMicrosoft.exchange.compliance.recordreview.dll| 15.2.792.13| 37,248| 04-Apr-2021| 10:05| x86 \nMicrosoft.exchange.compliance.supervision.dll| 15.2.792.13| 50,584| 04-Apr-2021| 10:04| x86 \nMicrosoft.exchange.compliance.taskcreator.dll| 15.2.792.13| 33,176| 04-Apr-2021| 10:04| x86 \nMicrosoft.exchange.compli